WO2022170759A1 - Information processing method and apparatus, and electronic device, server and medium - Google Patents

Information processing method and apparatus, and electronic device, server and medium Download PDF

Info

Publication number
WO2022170759A1
WO2022170759A1 PCT/CN2021/117232 CN2021117232W WO2022170759A1 WO 2022170759 A1 WO2022170759 A1 WO 2022170759A1 CN 2021117232 W CN2021117232 W CN 2021117232W WO 2022170759 A1 WO2022170759 A1 WO 2022170759A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
user
identity
authenticated
identity authentication
Prior art date
Application number
PCT/CN2021/117232
Other languages
French (fr)
Chinese (zh)
Inventor
李定洲
郭伟
祖立军
钱进
Original Assignee
中国银联股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中国银联股份有限公司 filed Critical 中国银联股份有限公司
Publication of WO2022170759A1 publication Critical patent/WO2022170759A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
    • G06Q20/40975Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor

Definitions

  • the present disclosure belongs to the field of Internet technologies, and in particular, relates to an information processing method, an apparatus, an electronic device, a server and a medium.
  • identity authentication can be performed by comparing the image of the user's identity document with the image of the user, or by reading the identity information of the chip in the user's identity document.
  • the former identity authentication method is difficult to identify the authenticity of the user's identity document.
  • the wear of the surface information of the user's identity document or the poor image capture effect will also reduce the accuracy of the identity authentication result.
  • the latter method of identity authentication will also cause the user's identity information to be maliciously tampered with and leaked due to the low security of the platform that reads the user's identity document.
  • the embodiments of the present disclosure provide an information processing method, apparatus, electronic device, server and medium, which can effectively improve the accuracy of identity authentication results, prevent user identity information from being leaked and tampered with, and improve network information security.
  • an embodiment of the present disclosure provides an information processing method, which is applied to an electronic device, including:
  • the target information includes the user's first biometric information, and a user image acquired within a preset time period, the user image includes the user's second biometrics information;
  • the user identity authentication result of the identity information to be authenticated is determined.
  • an embodiment of the present disclosure provides an information processing method, applied to an electronic device, including:
  • an embodiment of the present disclosure provides an information processing method, applied to a server, including:
  • the device type of the electronic device When it is detected that the device type of the electronic device is the preset target device type, acquire target information corresponding to the user's identity information to be authenticated and used to characterize the user's identity, the target information including the user's first biometric feature information ;
  • an embodiment of the present disclosure provides an information processing apparatus, which is applied to an electronic device, including:
  • a receiving module for receiving the first input for user identity authentication
  • an acquisition module configured to acquire the user's identity information to be authenticated through near field communication in a trusted execution environment in response to the first input;
  • the processing module is configured to determine target information used to characterize the user's identity according to the user's identity information to be authenticated, the target information includes the user's first biometric information, and the user image obtained within a preset time period, and the user image includes the user's first biometric information. the second biometric information;
  • the determining module is configured to determine the user identity authentication result of the identity information to be authenticated based on the comparison result between the first biometric information and the second biometric information.
  • an embodiment of the present disclosure provides an information processing apparatus, which is applied to an electronic device, and may specifically include:
  • a receiving module for receiving the first input for user identity authentication
  • an acquisition module configured to acquire the user's identity information to be authenticated through near field communication in a trusted execution environment in response to the first input;
  • a sending module configured to send the user's identity information to be authenticated to the server, and the user's identity information to be authenticated is used to determine the user identity authentication result of the identity information to be authenticated;
  • the sending module is further configured to acquire a user image within a preset time period, and send the user image to the server, where the user image is used to compare with the user's identity to be authenticated to determine the user identity authentication result;
  • the receiving module is further configured to receive the user identity authentication result of the identity information to be authenticated sent by the server.
  • an embodiment of the present disclosure provides an information processing apparatus, which is applied to a server, and may specifically include:
  • a receiving module configured to receive the identity information to be authenticated of the user sent by the electronic device
  • the acquisition module is configured to acquire target information corresponding to the user's identity information to be authenticated and used to characterize the user's identity when it is detected that the device type of the electronic device is a preset target device type, and the target information includes the user's first biometric information;
  • the receiving module is also used for receiving the user image sent by the electronic device
  • a determination module for determining the user identity authentication result of the identity information to be authenticated based on the comparison result of the first biometric information and the second biometric information in the user image;
  • the sending module is used for sending the user identity authentication result to the electronic device.
  • an embodiment of the present disclosure provides an electronic device, the electronic device comprising: a processor and a memory storing computer program instructions;
  • the information processing method shown in the first aspect or the second aspect is implemented when the processor executes the computer program instructions.
  • an embodiment of the present disclosure provides a server, the server comprising: a processor and a memory storing computer program instructions;
  • the information processing method shown in the third aspect is implemented when the processor executes the computer program instructions.
  • an embodiment of the present disclosure provides a computer-readable storage medium, where computer program instructions are stored on the computer-readable storage medium, and when the computer program instructions are executed by a processor, the information processing method shown in the first aspect is implemented .
  • the information processing method, device, device, and medium of the embodiments of the present disclosure obtain the trusted target information for characterizing the user's identity by obtaining the user's identity information to be authenticated in the trusted execution environment TEE and the near field communication NFC.
  • the identity document information can avoid the problem of forging identity documents, and also avoid the problem of inaccurate target information obtained due to poor photographing effect or insufficient photographing hardware, resulting in incorrect user identity authentication results.
  • TEE Trusted Execution Environment
  • FIG. 1 is a schematic diagram of an information processing architecture of an embodiment of an information processing method according to the first aspect of the present disclosure
  • FIG. 2 is a schematic structural diagram of an electronic device and a server according to an embodiment of the information processing method of the first aspect of the present disclosure
  • FIG. 3 is a schematic architectural diagram of an application scenario of an embodiment of the information processing method according to the first aspect of the present disclosure
  • FIG. 4 is a schematic diagram of an APDU instruction execution position corresponding to a category to which an electronic device belongs according to an embodiment of the information processing method of the first aspect of the present disclosure
  • FIG. 5 is a schematic flowchart of an information processing method according to an embodiment of the information processing method of the first aspect of the present disclosure
  • FIG. 6 is a schematic diagram of an information processing interface according to an embodiment of the information processing method of the first aspect of the present disclosure
  • FIG. 7 is a schematic diagram of an original image histogram of an embodiment of the information processing method according to the first aspect of the present disclosure
  • FIG. 8 is a schematic diagram of a trusted identity authentication initialization process according to an embodiment of the information processing method of the first aspect of the present disclosure
  • FIG. 9 is a schematic flowchart of a trusted identity authentication comparison according to an embodiment of the information processing method of the first aspect of the present disclosure.
  • FIG. 10 is a schematic structural diagram of an embodiment of an information processing apparatus based on an electronic device of the information processing apparatus according to the fourth aspect of the present disclosure
  • FIG. 11 is a schematic structural diagram of an embodiment of an electronic device-based information processing apparatus of the information processing apparatus according to the fifth aspect of the present disclosure.
  • FIG. 12 is a schematic structural diagram of an embodiment of a server-based information processing apparatus of the information processing apparatus according to the sixth aspect of the present disclosure.
  • FIG. 13 is a schematic diagram of a hardware structure of an embodiment of an information processing apparatus according to a seventh aspect of the present disclosure.
  • the operating system of the identity authentication scheme is mostly Android system, so the security of identity authentication is highly dependent on the security of the Android system itself. There are also loopholes in the scheme. If the identity authentication process is initiated by an application and executed in the Android environment, and the security of the Android system environment itself is low, once an attacker is attacked, such as an attacker obtaining root privileges, by implanting a Trojan horse and other means, stealing and Tampering with the information in the user's identity authentication process, falsifying the identity authentication results that are inconsistent with the actual situation, and even using the forged identity information to carry out illegal activities, resulting in the disclosure of the user's identity information.
  • identity authentication can be performed by comparing the user image in the user's identity document and obtaining the user's image in real time, or by reading the identity information of the chip in the user's identity document.
  • the former identity authentication method is difficult to identify the authenticity of the user's identity document, and the result of identity authentication is inaccurate due to the wear and tear of the surface information of the user's identity document or the poor image capture effect of the electronic device.
  • the latter identity authentication scheme is usually authorized to the operating organization of the application for reading and identity authentication. If the personnel of the operating organization intentionally disclose the authorization credentials to the unauthorized organization, or the unauthorized organization uses reverse engineering, malicious debugging and other means If the authorization certificate is stolen, the unauthorized organization may use the certificate to obtain improper benefits.
  • the identity authentication process of performing face comparison in the method of obtaining the identity information of the chip in the user's identity document is performed in an Android control in the Android system, or as a part of the Android application. Low security, resulting in malicious tampering and disclosure of user identity information.
  • the embodiments of the present disclosure provide an information processing method, apparatus, device, and storage medium, which can obtain a user's waiting list by using a trusted execution environment (TEE) and near field communication (NFC).
  • TEE trusted execution environment
  • NFC near field communication
  • TEE Trusted Execution Environment
  • FIG. 1 is a schematic diagram of an information processing architecture of an embodiment of an information processing method according to the first aspect of the present disclosure.
  • the information processing system includes an electronic device 10 , a server 20 and a near field communication chip 30 , such as a chip in an ID document, a chip in a bank card document, a chip in a recharge card, and other chips that support near field communication.
  • a near field communication chip 30 such as a chip in an ID document, a chip in a bank card document, a chip in a recharge card, and other chips that support near field communication.
  • the electronic device 10 establishes a communication link with the server 20
  • a first input for user identity authentication is received.
  • the electronic device 10 acquires the identity information to be authenticated of the user in the near field communication chip 30 through near field communication in a trusted execution environment.
  • the electronic device 10 determines target information for characterizing the user's identity according to the user's identity information to be authenticated, the target information includes the user's first biometric information, and the user image acquired within a preset time period, and the user image includes the user's first biometric information. two biometric information, and based on the comparison result of the first biometric information and the second biometric information, determine the user identity authentication result of the identity information to be authenticated.
  • the electronic device 10 may also send the user's identity information to be authenticated to the server 20, so that the server 20 determines a target for characterizing the user's identity according to the user's identity information to be authenticated information, and determine the user identity authentication result of the identity information to be authenticated through the user image captured by the electronic device 10, and then feed back the user identity authentication result of the identity information to be authenticated to the electronic device 10, so that the electronic device 10 displays the user identity to the user. Authentication result.
  • the electronic device 10 in the embodiment of the present disclosure may include an electronic device application 101 , a trusted identity authentication service control 102 and a trusted identity authentication service TA103 .
  • the electronic device application 101 include the trusted identity authentication service SDK1011, which is a software development kit (SDK), and the trusted identity authentication service TA103, which is a trusted application (trusted application, TA).
  • the electronic device 10 has a trusted execution environment TEE, and the electronic device 10 passes a third-party application (Application, APP) related to the trusted identity authentication service, which is provided by a platform that needs to carry out user authentication service, such as a shopping application or an industry party.
  • APP application
  • the trusted identity authentication service control 102 runs on the electronic device as an independent application
  • the trusted identity authentication service TA103 runs in the trusted execution environment TEE.
  • the server 20 in the embodiment of the present disclosure may run a platform supporting management classes, such as a trusted identity service platform.
  • the operating trusted identity service platform may include an authoritative identity authentication module 201 , a trusted identity authentication background module 202 and a face authentication comparison module 203 .
  • the authoritative identity authentication module 201 is used to interact with the identity authentication server of the identity authentication platform, and parse the identity information plaintext data of the identity information to be authenticated of the user.
  • the trusted identity service platform in the embodiment of the present disclosure is used to manage third-party applications that access and use the trusted identity service platform.
  • the authentication service control 102 provides the business function processing flow.
  • the existing identity document information such as the user's identity document image and the identity document number
  • the technical basis of the example There are two prerequisites to realize the safe reading and parsing of the ID card through NFC. One is to realize the safe transmission of ID information from the electronic device 10 through the server to the identity authentication server, and the other is to realize the safe reading of the ID information through NFC.
  • the embodiments of the present disclosure propose a security information interaction method from the electronic device to the server based on the TEE security guarantee mechanism.
  • the embodiment of the present disclosure grants the authoritative identity authentication module 201 the function of docking with an identity authentication server, and pre-installs the server certificate granted by the identity authentication server in the server, and the server certificate is used to indicate that the server has the authority to authenticate the user's identity to be authenticated. information for identification.
  • the trusted application management platform Truste.g., TAM
  • TAM Trusted Application Management
  • the electronic device when the electronic device receives the user's first input for user identity authentication, the electronic device can use the trusted identity authentication service SDK 1011 and the trusted identity authentication service control 102 in the Android system and/or the ios system in the electronic device to realize the authentication of the user's identity. Invoke the trusted identity authentication service TA103, and initiate the collection and processing of the identity information to be authenticated, and then it is credibly connected to the trusted identity service platform to communicate with the trusted identity authentication background module 202. Finally, the verification and parsing processing of the identity information to be authenticated is completed by the authoritative identity authentication module 201 .
  • the trusted identity authentication service TA generates a pair of public and private keys based on the digital certificate of the electronic device such as the root trust certificate. Among them, the device public key and user address (UserId) and the unique identifier of the electronic device in the public-private key pair will be recorded on the trusted identity service platform. When a risk is found in an electronic device, it will quickly locate an electronic device and Terminate its continued access to the trusted identity service platform, which provides effective support for the trusted identity service platform to carry out risk prevention and control of electronic equipment.
  • the identity authentication platform After ensuring the security of the identity authentication information transmission from the electronic device to the identity authentication platform, it has the ability to securely accept the verification and analysis of the identity information to be authenticated.
  • the information and the process of securely docking with the trusted identity service platform can be described in detail with reference to FIG. 3 .
  • FIG. 3 is an architectural schematic diagram of an application scenario of an embodiment of an information processing system provided according to the present disclosure.
  • the near field communication chip is a chip that includes the user's identity information to be authenticated, and the chip supports NFC communication, such as a second-generation identity document.
  • the electronic device 10 includes an NFC module and a trusted identity authentication service TA103.
  • the NFC module is used to read and transmit the identity information to be authenticated of the user in the second-generation identity document.
  • the trusted identity authentication service TA103 runs in the TEE trusted execution environment.
  • the second-generation ID card When the second-generation ID card communicates with the NFC using Application Protocol Data Unit (APDU) commands, it judges and compares the current Internet of Things electronic devices, and determines the communication process between the NFC access and the second-generation ID card. For example, in some IoT electronic devices with severely limited resources, such as wearable devices, smart door locks and other devices that cannot carry a large amount of computing, it is necessary to further customize the process in the NFC communication process, and access the NFC
  • the APDU command interaction with the second-generation ID document is executed in the device TEE, and the generation, assembly and APDU response processing of the second-generation ID document access APDU command are carried out on the background of the trusted identity authentication service.
  • the specific content can be Specifically refer to the content shown in FIG. 4 .
  • the server 20 runs a trusted identity service platform, which is used as a support management platform for the information processing method based on the trusted identity authentication service.
  • the operating trusted identity service platform may include an APDU instruction operation module and an authoritative identity authentication module 201, wherein the APDU instruction operation module is used to process the generation, assembly and response of the second-generation identity document access APDU instruction, which is mainly related to the authoritative identity authentication.
  • Module 201 interacts.
  • the authoritative identity authentication module 201 is used for securely interacting with the identity authentication platform to determine the identity information plaintext data of the identity information to be authenticated of the user.
  • the embodiment of the present disclosure implements secure reading of NFC information through TEE, and then enables the trusted identity authentication service TA103 to comprehensively monitor NFC reading operations outside the device.
  • the trusted identity authentication service TA103 receives the ID card operation request, it will safely call the NFC module of the electronic device, execute the APDU command set according to the second-generation ID card specification, and execute the command response to the identity information to be authenticated. return.
  • the trusted identity authentication service TA103 sends the received ciphertext information of the identity information to be authenticated to the authoritative identity authentication module 201 through the secure link between the electronic device and the server.
  • the authoritative identity authentication module 201 establishes a secure communication with the identity authentication server after receiving the ciphertext information of the identity information to be authenticated, and parses it through the identity authentication server and splices and assembles it into a target for characterizing the user identity through the identity authentication server attribute format.
  • the trusted identity service service platform responds the original text string of the target information to the trusted identity authentication service TA103.
  • the trusted identity authentication service TA103 can decrypt the original character string of the authorization certificate and the target information according to the target information data of the pre-saved authoritative identity authentication agency, and the identity information to be authenticated, such as the identity document number, the identity document image and the identity document image Decrypt the user's face image, etc., to obtain target information such as the user's face image in the ID document image.
  • the trusted identity authentication service TA103 reads the identity information to be authenticated of the second-generation identity document through the NFC near field, and then hands it over to the authoritative identity authentication module 201 to process and parse the identity information of the identity information to be authenticated. data.
  • the information processing method in the embodiment of the present disclosure may be executed on the side of the electronic device, and may also be executed on the electronic device and the server. Therefore, in some possible embodiments, for example, in some IoT electronic devices with severely limited resources, such as wearable devices, smart door locks, etc. that cannot carry a large amount of computing, it is also necessary to check the NFC communication process. Its process is further customized. These Internet of Things electronic devices can be specifically described with reference to FIG. 4 . As shown in FIG. 4 , for some IoT electronic devices (such as wearable devices, smart door locks, etc.) with severely limited resources provided by the embodiments of the present disclosure, the process needs to be further customized in the NFC communication process.
  • the access to NFC and the APDU command interaction with the ID document are executed in the device TEE, and the generation, assembly and APDU response processing of the ID document access APDU command are carried out on the trusted identity service platform. That is, the embodiment of the present disclosure realizes the secure reading of NFC information through TEE, and then enables the trusted identity authentication service TA103 to comprehensively monitor the reading operation of NFC outside the device.
  • the trusted identity authentication service TA103 receives the ID card swiping operation request, it will safely call the NFC module of the electronic device, and execute the near field communication command in the APDU command set according to the second-generation ID card specification, and will execute the command response to the waiting list.
  • the authenticated identity information is returned.
  • the instructions in the APDU instruction set are determined by the server.
  • the trusted identity authentication service TA103 sends the received ciphertext information of the identity information to be authenticated to the authoritative identity authentication module 201 through the secure link between the electronic device and the server.
  • the authoritative identity authentication module 201 establishes a secure communication with the identity authentication server after receiving the ciphertext information of the identity information to be authenticated, and is parsed by the identity authentication server and assembled into a target for characterizing the user identity by splicing and splicing according to the identity document attribute format.
  • the original text string of the information is returned to the authoritative identity authentication module 201 .
  • the authoritative identity authentication module 201 can decrypt the original character string of the authorization certificate and the target information according to the target information data of the authoritative identity authentication agency saved in advance, such as the identity information to be authenticated, such as the identity document number, the identity document image and the identity document image. Decryption of the user's face image, etc., to obtain target information such as the user's face image in the identity document image.
  • the trusted identity authentication service TA103 reads the identity information to be authenticated of the second-generation identity document through the NFC near field, and then hands it over to the authoritative identity authentication module 201 to process and parse the identity information of the identity information to be authenticated. data.
  • the Internet of Things electronic device When customizing the communication process between NFC access and ID documents according to the Internet of Things electronic device, select the appropriate processing process according to the performance, use and type of the Internet of Things electronic device, such as smart phones, portable/tablet computers, smart POS equipment, smart cars, Self-service vending machines and self-service gates use the scheme of calling NFC in the TEE to perform APDU command interaction between NFC and second-generation ID documents; smart watches/bands, smart door locks/access control use the device to execute APDU commands, and the trusted identity
  • the service platform generates, assembles and processes APDU instructions.
  • the electronic device when the electronic device receives the user's first input for user identity authentication, in response to the first input, in a trusted execution environment, the user's identity information to be authenticated is obtained through near field communication, and the user's identity information to be authenticated is sent to the server. Authentication identity information, the user's identity information to be authenticated is used to determine the user identity authentication result of the identity information to be authenticated.
  • the server receives the identity information to be authenticated of the user sent by the electronic device, and when it detects that the device type of the electronic device is the preset target device type, that is, the device type of the electronic device conforms to the wearable device, smart door lock, etc., it cannot bear the computational burden.
  • target information corresponding to the user's identity information to be authenticated and used to characterize the user's identity is acquired, and the target information includes the user's first biometric feature information. Furthermore, the electronic device acquires the user image within a preset time period, and sends the user image to the server, where the user image is used to compare with the user's identity to be authenticated to determine the user identity authentication result.
  • the server receives the user image sent by the electronic device, determines the second biometric information of the user in the user image, and determines the user identity authentication of the identity information to be authenticated based on the comparison result between the first biometric information and the second biometric information
  • the user identity authentication result of the identity information to be authenticated is sent to the electronic device.
  • the electronic device receives the user identity authentication result of the identity information to be authenticated sent by the server, so as to prompt the user with the user identity authentication result of the identity information to be authenticated.
  • the server may send an instruction to acquire the user image to the electronic device, where the user image instruction is used to instruct the electronic device to acquire the user image within a preset time period.
  • the electronic device acquires the user image when receiving the instruction for acquiring the user image sent by the server.
  • the electronic device may also acquire the user image.
  • the electronic device may obtain the user's identity information to be authenticated by executing the near field communication instruction in the protocol data instruction set provided by the server in a trusted execution environment.
  • the server When the server is in the target information, it can specifically go through the following steps, that is, according to the ciphertext information of the identity information to be authenticated, determine the original character string assembled and assembled according to the attribute format of the identity document and used to represent the target information of the user's identity, according to the pre-stored target information
  • the information data decrypts the original character string of the authorization certificate and the target information, decrypts the identity information to be authenticated, and obtains the target information.
  • the server sends a protocol data instruction to the identity authentication server, and the protocol data instruction is used to instruct the identity authentication server to splicing and assemble the original text of the target information used to represent the user identity according to the identity document attribute format.
  • String receiving the original text string of the target information sent by the authentication server.
  • an embodiment of the present disclosure proposes an information processing method for trusted identity authentication based on TEE and NFC, which can securely access NFC through the TEE to read the identity information to be authenticated of the identity document to obtain reliable and trusted identity information.
  • Target information representing the user's identity and in some embodiments, can interact with the trusted identity service platform running in the server in the trusted execution environment TEE, so as to avoid the problem of forgery of ID cards, and also avoid the problem of ineffective photographing. This will result in inaccurate target information obtained and improve the accuracy of identity authentication.
  • the problem that the identity information to be authenticated may be stolen by the Trojan virus during the interaction between the electronic device and the server is eliminated.
  • the source of the user image used for comparison and authentication that is, the real-time user image, can be trusted, preventing the injection of fake face photos or videos.
  • the embodiments of the present disclosure utilize the 4th generation mobile communication technology (4G), the fifth generation mobile communication technology ( 5th generation mobile networks, 5G) has the characteristics of higher transmission rate and lower delay, and splits the commands for interaction between NFC and second-generation ID cards.
  • 4G the 4th generation mobile communication technology
  • 5G 5th generation mobile networks
  • the part that obtains the user's identity information to be authenticated through near field communication is electronic
  • the device is implemented, mainly dealing with the identity document APDU request response and interaction protocol, and the back-end part is moved to the server to run, and is mainly responsible for the generation and assembly of the identity document access APDU command and the processing of the APDU response.
  • the space ratio of the NFC interaction protocol of electronic devices is reduced, and it has stronger applicability to IoT terminal devices with limited resources such as wearable devices.
  • the method of determining the comparison result between the electronic equipment and the server is determined, which ensures the availability and adaptability of ID card reading and face comparison functions in the case of limited TEE space resources of electronic equipment.
  • TEE to securely access NFC to read the user's identity information to be authenticated ensures that the data source of the acquired identity card information is true and accurate, and has the effect of anti-counterfeiting identity cards.
  • the trusted execution environment TEE prevents malware from intercepting identity card information data. replaced and tampered with.
  • the embodiments of the present disclosure are implemented based on the security closed loop between the electronic device TEE and the server, which can ensure that the information is sent to the trusted identity authentication background decrypted in ciphertext and then transmitted back through the secure TEE secure channel for use, which is applicable to more authentication scenarios.
  • FIG. 5 is a schematic flowchart of an information processing method according to an embodiment of the information processing method of the first aspect of the present disclosure.
  • the information processing method may be applied to the electronic device shown in FIG. 1 , and the information processing method may specifically include the following steps.
  • step 510 a first input for user identity authentication is received.
  • step 520 in response to the first input, in a trusted execution environment, acquire the user's identity information to be authenticated through near field communication.
  • step 530 according to the user's identity information to be authenticated, determine the target information used to represent the user's identity, the target information includes the user's first biometric information, and the user image obtained within a preset time period, the user image Include second biometric information of the user.
  • step 540 based on the comparison result of the first biometric information and the second biometric information, determine the user identity authentication result of the identity information to be authenticated.
  • the trusted target information for characterizing the user's identity such as identity document information
  • the trusted target information can be obtained to avoid the problem of forging identity documents.
  • it also avoids the problem that the obtained target information is inaccurate due to poor photographing effect or insufficient photographing hardware, resulting in incorrect user identity authentication results.
  • malware can effectively prevent malicious software from intercepting and tampering with identity document information.
  • secure access to the cameras of electronic devices through the Trusted Execution Environment ensures the accuracy of user images used for comparison authentication and prevents the injection of fake facial images or videos.
  • the embodiment of the present disclosure provides the following at least two ways to obtain the to-be-authenticated identity information of the user of the identity certificate, as shown in detail below.
  • step 320 may specifically include:
  • the data interaction environment When the data interaction environment satisfies the preset interaction environment and in the trusted execution environment, read the near field communication chip through near field communication, and obtain the label content and user identity of the near field communication chip;
  • the identity information to be authenticated of the user is generated.
  • the information processing method further includes:
  • the data interaction environment includes the distance value between the electronic device and the near field communication chip and the contact time between the electronic device and the near field communication chip within the preset distance;
  • the distance value satisfies the preset distance value and/or the contact with the market satisfies the preset contact duration, it is determined that the data interaction environment satisfies the preset interaction environment.
  • a target near field communication chip in response to the first input, in a trusted execution environment, a target near field communication chip is determined, and the data interaction environment between the near field communication chip and the electronic device satisfies a preset near field communication environment;
  • the embodiment of the present disclosure provides that the target application protocol data corresponding to the target near field communication chip is acquired according to the preset correspondence between the near field communication chip and the application protocol data.
  • the near field communication chip is an identity document
  • the preset correspondence indicates that the electronic device can access the user's face image in the identity document image
  • the electronic device can obtain the user's face image in the identity document image.
  • the preset correspondence indicates that the electronic device can access the ID number, ID image, and ID user identity information
  • the electronic device can obtain the ID number, ID image, and ID user ID information. , you can obtain its information according to the user's previous settings.
  • the preset corresponding relationship between the near field communication chip and the application protocol data in the embodiment of the present disclosure can be determined by the following steps, that is, obtaining the near field corresponding to the target through the preset corresponding relationship between the near field communication chip and the application protocol data Before the step of the target application protocol data corresponding to the communication chip, the information processing method provided by the embodiment of the present disclosure further includes:
  • the permission request includes the identity information of the electronic device, and the permission request is used to obtain the permission of the near field communication chip;
  • the preset correspondence between the near field communication chip and the application protocol data is obtained.
  • step 330 is involved, and this step can be divided into two parts, that is, one part is determining target information used to characterize the user's identity, and the other part is acquiring a photographed image of the user. Based on this, two parts will be explained separately.
  • the process of determining the target information in the embodiment of the present disclosure is as follows, that is, according to the user's identity information to be authenticated, the target information used to characterize the user's identity is determined, including:
  • Step 3301 Determine the identity information plaintext data of the identity information to be authenticated according to the identity information to be authenticated.
  • this step 3301 may specifically include:
  • Step 33011 Send an identity authentication request to the server, the identity authentication request includes the identity information to be authenticated, and the identity authentication request is used to request the server to parse the identity information to be authenticated to obtain the identity information plaintext data of the identity information to be authenticated;
  • Step 33012 Receive the identity authentication feedback information sent by the server, where the identity authentication feedback information includes the identity information plaintext data of the identity information to be authenticated.
  • Step 3302 Decrypt the authorization certificate according to the plaintext data of the identity information and the target information data to determine the first biometric information.
  • the target information data decryption authorization credential can be determined according to the following steps, which may specifically include steps 33021-33023.
  • Step 33021 Generate a device public-private key pair according to the digital certificate in the electronic device.
  • Step 33022 send a user identity authentication initialization request to the server through the trusted identity authentication initialization interface, the user identity authentication initialization request includes the device public and private key pair, and the user identity authentication initialization request is used to establish a secure communication link with the server, and through the secure communication link Perform key exchange.
  • the trusted identity authentication initialization interface corresponding to the server may be obtained based on the pre-stored server public key.
  • Step 33023 Receive the user identity authentication initialization feedback information from the server, where the user identity authentication initialization feedback information includes the target information data decryption authorization certificate.
  • the user identity authentication initialization request also includes application program information
  • the application program information includes at least one of the following: application program identification, signature certificate information, and certificate fingerprint information, and the application program information is used to determine the identity information to be authenticated.
  • the execution environment of the user authentication result includes at least one of the following: application program identification, signature certificate information, and certificate fingerprint information, and the application program information is used to determine the identity information to be authenticated.
  • step 3302 in this embodiment of the present disclosure may specifically include: sending a biometric information request to the server, where the biometric information request includes the identity information plaintext data and the target information data decryption authorization credential, and the biometric information request It is used to request the server to decrypt the authorization certificate based on the plaintext data of the identity information and the target information data, and determine the first biometric information;
  • the biometric feedback information sent by the server is received, where the biometric feedback information includes the first biometric information encrypted by the public key of the device.
  • the method before executing the step of sending the identity authentication request to the server, the method further includes:
  • the identity authentication request is sent to the server under the condition that the identity identification feedback information indicates that the electronic device does not meet the identity authentication condition.
  • the embodiment of the present disclosure also has a key point in that the parsed first biometric information, such as the user's face image in the identity document image and the identity card holder
  • the second biometric information in the user image of the person is compared to the user image.
  • there is a key problem that needs to be solved urgently that is, there is a difference between the user's current facial information and the original photo when the ID document was collected.
  • the embodiment of the present disclosure also proposes a feature model that is insensitive to the clarity of the image, that is, the target ID document portrait feature model, which is used to optimize the false rejection rate of face comparison ( false reject rate, FRR).
  • step 330 that is, the process of acquiring the user image specifically includes steps 3311-3303.
  • Step 3311 Display the fixed portrait position area, and the fixed portrait position area is used to obtain the human body part image corresponding to the user and the fixed portrait position area.
  • the image of the human body part is acquired by fixing the position area of the portrait.
  • more face feature points are selected for detection, which also consumes more performance resources.
  • the embodiments of the present disclosure propose to use a fixed portrait position on the portrait capture interface of the electronic device, delineate the fixed portrait position area on the portrait capture interface to match the best position of the face, and at the same time discard some special processing of face rotation and alignment, so as to Quickly locate the position of the face in the image and improve the positioning accuracy of the facial feature points.
  • Step 3312 When receiving the second input of the image captured by the user, acquire the image of the human body part to be processed.
  • the target feature points are screened from a plurality of feature points in the human body part through the fixed position area, and the human body part image corresponding to the target feature point is acquired according to the target feature points.
  • Step 3313 Perform grayscale normalization on the image of the human body part to be processed to obtain a user image.
  • the first grayscale value corresponds to the first grayscale level
  • adjusting the human body part image to be processed by grayscale stretching according to the first grayscale level A user image with the first gray level is obtained.
  • grayscale normalization processing may be performed on the photograph of the face in the captured user image.
  • the grayscale normalization process is to perform illumination compensation processing on the user image to overcome the influence of illumination changes.
  • the grayscale stretching method can be used to expand the grayscale distribution in the original image to have the entire grayscale level.
  • Image For example, the collected image is an 8-bit grayscale image, and there should be 256 grayscale levels.
  • the grayscale levels of the image are concentrated in one or several grayscale segments.
  • the grayscale stretching method can be used to expand the image to 256 grayscales.
  • grayscale normalization processing is performed according to the RGB color mode of the user image, according to the following two formulas:
  • D is the brightness
  • R is the red color channel
  • G is the green color channel
  • B is the blue color channel.
  • D' is the color level
  • 255*LOW and 255*HIGH are the lowest point of D and the highest point of D in the original image histogram of the user image, respectively.
  • Image histograms are all grayscale images
  • the x-axis is the grayscale value (usually 0 to 255)
  • the y-axis is the number of pixels corresponding to each grayscale in the y-axis image.
  • step 340 based on the user image obtained in step 330, in some embodiments, before step 340, in the case where the first biometric information includes an image of an identification document, the image of the identification document and the image of the identification document are compared by geometric normalization A user image to obtain a comparison result between the first biometric information and the second biometric information.
  • this proposal uses geometric normalization and grayscale normalization to transform the collected living photos.
  • the processing improves the recognition rate of the comparison between the face photo and the image photo on the ID card, and improves the false rejection rate (False Reject Rate, FRR) of the face comparison.
  • this step may specifically include steps 3401-3403.
  • Step 3401 Identify the user's face area in the identity document image, and obtain a user's face image corresponding to the user's face area.
  • Step 3402 Perform proportional enlargement or reduction of the user face image or the face area in the user image, and calculate the feature values of the user image and the user face image.
  • Step 3403 Obtain a comparison result between the first biometric information and the second biometric information according to the at least one feature value.
  • a geometric normalization algorithm is used to compare the first biometric information with the second biometric information.
  • the face authentication and comparison module in the trusted identity service platform finds the user's face area in the ID document image by locating the face feature model for the ID document image, determines the face position in the user image according to the geometric normalization algorithm, and compares the feature values of the two , in the process of determining the face position in the user image, the geometric figures of the face in the live face photo are compared using proportional enlargement and reduction.
  • the geometric normalization algorithm refers to changing the face position in the user image in the user face region in the ID document image to the same position and size according to the comparison target positioning result.
  • Step 1 find out the area where the eyes and nose of the person in the ID document image are located through face model matching
  • Step 2 set the distance between the two eyes as D, and its center point as O;
  • Step 4 Find out the areas where the eyes and nose are located in the user image through the same face model matching
  • Step 5 the distance between the two eyes in the user image is set to be D', and its center point is O';
  • Step 8 Extract the feature values of the two cropped area pictures for comparison, and convert them into similarity as a comparison result between the first biometric information and the second biometric information according to the equal index of the two feature values.
  • the process of comparing images involved in the embodiments of the present disclosure may be as shown in the above steps 1 to 8.
  • the comparison result between the two may be determined through the target identity document portrait feature model, that is, further, at least A feature value is input into the portrait feature model of the target ID document, and a comparison result between the first biometric information and the second biometric information is obtained.
  • the above-mentioned target ID document portrait feature model can be determined, and the specific process is as follows. Since the ID document image photo is small and the image resolution is low, in order to improve the target ID document portrait feature The comparison accuracy of the model focuses on selecting points with obvious facial features, and discarding the feature points that are easy to be misdetected at low resolution.
  • an embodiment of the present disclosure also provides a method for determining a portrait feature model of a target identity document, which is specifically as follows:
  • the preset ID document portrait feature model is simplified to obtain the target ID document portrait feature model.
  • an embodiment of the present disclosure provides a process for determining a comparison result between the first biometric information and the second biometric information, which is specifically as follows, that is, before step 340 , the information processing method Also includes:
  • the similarity of the biometric comparison result is decrypted by encrypting the private key of the device to obtain the similarity of the biometric comparison result, and the similarity of the biometric comparison result is used to represent the comparison result between the first biometric information and the second biometric information.
  • step 340 may specifically include: in the case that the similarity of the biometric comparison result meets the preset similarity, determining that the user identity authentication of the identity information to be authenticated is successful.
  • the target information in the embodiments of the present disclosure also includes at least one of the following: ID number, ID image, ID user identity information, such as the user's name, gender, ethnicity, and date of birth in the ID. ,address.
  • the first biometric information includes at least one of the following: an image of the user's face in the identity document image, and an iris image of the user corresponding to the identity document.
  • an embodiment of the present disclosure proposes an information processing method for trusted identity authentication based on TEE and NFC, which can securely access NFC through the TEE to read the identity information to be authenticated of the identity document to obtain reliable and trusted identity information.
  • Target information representing the user's identity and in some embodiments, can interact with the trusted identity service platform running in the server in the trusted execution environment TEE, so as to avoid the problem of forgery of ID cards, and also avoid the problem of ineffective photographing. This will result in inaccurate target information obtained and improve the accuracy of identity authentication.
  • the problem that the identity information to be authenticated may be stolen by the Trojan virus during the interaction between the electronic device and the server is eliminated.
  • the source of the user image used for comparison and authentication that is, the real-time user image, can be trusted, preventing the injection of fake face photos or videos.
  • the embodiments of the present disclosure utilize the 4th generation mobile communication technology (4G), the fifth generation mobile communication technology ( 5th generation mobile networks, 5G) has the characteristics of higher transmission rate and lower delay, splitting the commands for interaction between NFC and the second-generation ID card, and obtaining the user's identity information to be authenticated through near field communication.
  • 4G 4th generation mobile communication technology
  • 5G 5th generation mobile networks
  • the back-end part is moved to the server to run, mainly responsible for the generation and assembly of ID document access APDU instructions and the processing of APDU response.
  • the space ratio of the NFC interaction protocol of electronic devices is reduced, and it has stronger applicability to IoT terminal devices with limited resources such as wearable devices.
  • the method of determining the comparison result between the electronic equipment and the server is determined, which ensures the availability and adaptability of ID card reading and face comparison functions in the case of limited TEE space resources of electronic equipment.
  • TEE to securely access NFC to read the user's identity information to be authenticated ensures that the data source of the acquired identity card information is true and accurate, and has the effect of anti-counterfeiting identity cards.
  • the trusted execution environment TEE prevents malware from intercepting identity card information data. replaced and tampered with.
  • the embodiments of the present disclosure are implemented based on the security closed loop between the electronic device TEE and the server, which can ensure that the information is sent to the trusted identity authentication background decrypted in ciphertext and then transmitted back through the secure TEE secure channel for use, which is applicable to more authentication scenarios.
  • FIG. 8 is a process of initializing trusted identity authentication provided by an embodiment of the present disclosure
  • FIG. 9 is a trusted identity authentication initialization process provided by an embodiment of the present disclosure.
  • the process of identity authentication comparison is as follows.
  • the third-party application When a third-party application is a consumer application, the third-party application needs to integrate the trusted authentication service SDK in advance, and install the trusted authentication service control on the electronic device running the third-party application, and use the electronic device to install the trusted authentication service control.
  • the corresponding trusted application management (TAM) installs the trusted identity authentication service TA into the device TEE trusted execution environment. Subsequently, the application identification (AppId), signature certificate information and certificate fingerprint information of the third-party application need to be entered in the trusted identity service platform.
  • the process of initializing trusted identity authentication in the resource processing method may include steps 801 to 813, as shown in detail below.
  • Step 801 the electronic device receives an operation of initializing trusted identity authentication initiated by a user for application A.
  • Step 802 Application A initiates a trusted identity authentication initialization request to the integrated trusted identity authentication service SDK, and transmits the transaction element Context.
  • the transaction elements are detailed in Table 4.
  • Step 803 the trusted identity authentication service SDK obtains the AppId, signature certificate information and certificate fingerprint information of application A through the Context context, calls the trusted identity authentication initialization interface of the trusted identity authentication service control, and passes in the transaction element application program A's AppId, signature certificate information, and certificate fingerprint information.
  • Step 804 the trusted identity authentication service control invokes the trusted identity authentication service TA initialization interface, and inputs the transaction element AppId, signature certificate information and certificate fingerprint information.
  • Step 805 the trusted identity authentication service TA generates a pair of device public and private key pairs according to the device root trust certificate.
  • Step 806 the trusted identity authentication service TA requests the trusted identity service platform, and inputs the AppId of the application A, the signature certificate information and the certificate fingerprint information.
  • Step 807 the server public key of the trusted identity service platform is preset in the trusted identity authentication service TA.
  • the trusted identity authentication service TA establishes a secure link with the trusted identity service platform through the server public key, uses the device public key and the server public key of the trusted identity service platform for session key negotiation, and subsequently uses the negotiated session key for interaction.
  • the trusted identity authentication service TA encrypts the AppId, signature certificate information and certificate fingerprint information of application A with the session key, and transmits it to the trusted identity service platform.
  • Step 808 the trusted identity service platform decrypts using the session key, and verifies whether the AppId, signature certificate information and certificate fingerprint information of application A are consistent with those previously entered in the trusted identity service platform.
  • the trusted identity authentication service TA returns the ciphertext of the authorization certificate for decryption of the target information data of the identity authentication platform encrypted by the public key of the device, such as the identity authentication service of the subordinate institutions of the Ministry of Public Security.
  • Step 809 after receiving the response, the trusted identity authentication service TA verifies the validity of the message containing the ciphertext of the received target information data decryption authorization certificate. In the case of valid verification, decrypt the ciphertext of the authorization certificate for the target information data decryption of the identity authentication platform through the private key of the device, and save the target information data decryption authorization certificate of the identity authentication platform to the trusted identity authentication service TA.
  • Step 810 the trusted identity authentication service TA returns an operation result corresponding to the operation of the trusted identity authentication initialization to the trusted identity authentication service control.
  • Step 811 the trusted identity authentication service control returns an operation result corresponding to the trusted identity authentication initialization operation to the trusted identity authentication service SDK.
  • Step 812 the trusted identity authentication service SDK returns the trusted identity authentication initialization result to application A.
  • Step 813 the application A displays the trusted identity authentication initialization result to the user through the electronic device.
  • the trusted identity authentication and comparison process in the resource processing method includes steps 901 to 916 , as shown in detail below.
  • Step 901 the electronic device receives a comparison operation of the trusted identity authentication initiated by the user with respect to the application A.
  • Step 902 the application A initiates a trusted identity authentication comparison request to the integrated trusted identity authentication service SDK, and passes in the transaction element to be authenticated identity information UserId, such as the transaction element, as shown in FIG. 4 .
  • Step 903 the trusted identity authentication service SDK invokes the authentication comparison interface of the trusted identity authentication service control, and inputs the identity information UserId of the transaction element to be authenticated.
  • Step 904 the trusted identity authentication service control invokes the trusted identity authentication service TA authentication comparison interface.
  • Step 905 the trusted identity authentication service TA accesses the NFC module of the device, so that the electronic device displays the ID card swiping interface.
  • Step 906 the electronic device obtains the identity information to be authenticated in the near field communication chip, the NFC module responds the identity information to be authenticated to the trusted identity authentication service TA, and the trusted identity authentication service TA sends the identity information to be authenticated to the authoritative identity authentication module Such as the identity authentication service platform of the subordinate institutions of the Ministry of Public Security.
  • Step 907 The authoritative identity authentication module processes the received identity information to be authenticated, and returns the processed identity information to be authenticated in plaintext to the trusted identity authentication service TA.
  • Step 908 the trusted identity authentication service TA sends the target information data decryption authorization certificate of the authoritative identity authentication module and the information plaintext of the identity information to be authenticated to the trusted identity service platform.
  • Step 909 the trusted identity service platform obtains target information through the authoritative identity authentication module, the target information includes the user's face image in the identity document image, encrypted with the device public key, and returned to the trusted identity authentication service TA.
  • Step 910 the trusted identity authentication service TA securely accesses the camera of the electronic device to obtain the user image.
  • Step 911 the trusted identity authentication service TA submits the user's face image in the identity document image and the user image decrypted using the device private key to the trusted identity service platform using symmetric key encryption.
  • Step 912 the trusted identity service platform uses the symmetric key to decrypt to obtain the face image in the user image, compares the two images according to the preprocessing process of the face image in the user image and the user face image in the identity document image, and returns to use the device public image. Key-encrypted biometric comparison results similarity.
  • Step 913 the trusted identity authentication service TA decrypts the biometric comparison result similarity using the device private key, and returns it to the trusted identity authentication service control.
  • Step 914 the trusted identity authentication service control returns the similarity of the biometric comparison result to the trusted identity authentication service SDK.
  • Step 915 the trusted identity authentication service SDK returns the similarity of the biometric comparison result to the application A.
  • Step 916 the application A displays the user identity authentication result of the identity information to be authenticated corresponding to the similarity of the biometric comparison result to the user.
  • the life cycle based on the trusted identity authentication service operation may include the trusted identity authentication service initialization function, the trusted identity authentication service registration function, the trusted identity authentication function, the trusted identity witness comparison function, and the trusted identity authentication function.
  • the authentication service logout function in which the trusted identity authentication service can be initialized first, and if the initialization verification is passed, the trusted identity authentication registration, trusted identity witness comparison and trusted identity authentication logout operations can be performed.
  • an embodiment of the present disclosure proposes an information processing method for trusted identity authentication based on TEE and NFC, which can securely access NFC through the TEE to read the identity information to be authenticated of the identity document to obtain reliable and trusted identity information.
  • Target information representing the user's identity and in some embodiments, can interact with the trusted identity service platform running in the server in the trusted execution environment TEE, so as to avoid the problem of forgery of ID cards, and also avoid the problem of ineffective photographing. This will result in inaccurate target information obtained and improve the accuracy of identity authentication.
  • the problem that the identity information to be authenticated may be stolen by the Trojan virus during the interaction between the electronic device and the server is eliminated.
  • the source of the user image used for comparison and authentication that is, the real-time user image, can be trusted, preventing the injection of fake face photos or videos.
  • the embodiments of the present disclosure utilize the 4th generation mobile communication technology (4G), the fifth generation mobile communication technology ( 5th generation mobile networks, 5G) has the characteristics of higher transmission rate and lower delay, and splits the commands for interaction between NFC and second-generation ID cards.
  • 4G the 4th generation mobile communication technology
  • 5G 5th generation mobile networks
  • the part that obtains the user's identity information to be authenticated through near field communication is electronic
  • the device is implemented, mainly dealing with the identity document APDU request response and interaction protocol, and the back-end part is moved to the server to run, mainly responsible for the generation and assembly of the identity document access APDU command and the processing of the APDU response.
  • the space ratio of the NFC interaction protocol of electronic devices is reduced, and it has stronger applicability to IoT terminal devices with limited resources such as wearable devices.
  • the method of determining the comparison result between the electronic device and the server ensures the availability and adaptability of ID card reading and face comparison functions in the case of limited TEE space resources of electronic devices.
  • TEE to securely access NFC to read the user's identity information to be authenticated ensures that the data source of the acquired identity card information is true and accurate, and has the effect of anti-counterfeiting identity cards.
  • the trusted execution environment TEE prevents malware from intercepting identity card information data. replaced and tampered with.
  • the embodiments of the present disclosure are implemented based on the security closed loop between the electronic device TEE and the server, which can ensure that the information is sent to the trusted identity authentication background decrypted in ciphertext and then transmitted back through the secure TEE secure channel for use, which is applicable to more authentication scenarios.
  • the present disclosure also provides an information processing apparatus. Specifically, detailed description is given with reference to FIG. 10 .
  • FIG. 10 is a schematic structural diagram of an embodiment of an electronic device-based information processing apparatus provided according to the present disclosure.
  • the apparatus shown in FIG. 10 may be provided in the electronic device shown in FIG. 1 .
  • the information processing apparatus 100 may specifically include:
  • a receiving module 1001 configured to receive a first input for user identity authentication
  • an obtaining module 1002 configured to obtain the user's identity information to be authenticated through near field communication in a trusted execution environment in response to the first input;
  • the processing module 1003 is configured to determine target information used to characterize the user's identity according to the user's identity information to be authenticated, the target information includes the user's first biometric information, and the user image obtained within a preset time period, the user image include the user's second biometric information;
  • the determining module 1004 is configured to determine the user identity authentication result of the identity information to be authenticated based on the comparison result between the first biometric information and the second biometric information.
  • the trusted target information for characterizing the user's identity such as identity document information
  • the trusted target information can be obtained to avoid the problem of forging identity documents.
  • it also avoids the problem that the obtained target information is inaccurate due to poor photographing effect or insufficient photographing hardware, resulting in incorrect user identity authentication results.
  • malware can effectively prevent malicious software from intercepting and tampering with identity document information.
  • secure access to the camera of the electronic device through the Trusted Execution Environment (TEE) ensures the accuracy of the user image used for comparison authentication and prevents the injection of fake facial photos or videos.
  • the information processing apparatus 100 in the embodiments of the present disclosure will be described in detail below.
  • the acquiring module 1002 may be specifically configured to, in response to the first input, read the near field communication chip through near field communication when the data interaction environment satisfies the preset interaction environment and under the trusted execution environment , to obtain the label content and user ID of the near field communication chip,
  • the identity information to be authenticated of the user is generated.
  • the information processing apparatus 100 may further include a detection module for detecting a data interaction environment with the near field communication chip, where the data interaction environment includes a distance value between the electronic device and the near field communication chip and/or the electronic device within a preset distance For the contact duration with the near field communication chip, when the distance value meets the preset distance value and/or the contact market meets the preset contact duration, it is determined that the data interaction environment meets the preset interaction environment.
  • the acquiring module 1002 can be specifically configured to, in response to the first input, determine the target near field communication chip under the trusted execution environment, and the data interaction environment between the near field communication chip and the electronic device satisfies the preset near field communication environment, and through According to the preset correspondence between the near field communication chip and the application protocol data, the target application protocol data corresponding to the target near field communication chip is obtained, and the user's identity information to be authenticated is obtained according to the target application protocol data.
  • the processing module 1003 in the embodiment of the present disclosure may be specifically configured to, according to the identity information to be authenticated, determine the identity information plaintext data of the identity information to be authenticated, and determine the identity information plaintext data of the identity information to be authenticated according to the identity information plaintext data and the target information data. Decrypt the authorization credential to determine the first biometric information.
  • the information processing apparatus 100 in the embodiment of the present disclosure may further include a sending module. Based on this, a sending module is used to send an identity authentication request to the server, where the identity authentication request includes the identity information to be authenticated, and the identity authentication request is used to request the server to parse the identity information to be authenticated to obtain the identity information of the identity information to be authenticated plaintext data.
  • a sending module is used to send an identity authentication request to the server, where the identity authentication request includes the identity information to be authenticated, and the identity authentication request is used to request the server to parse the identity information to be authenticated to obtain the identity information of the identity information to be authenticated plaintext data.
  • the receiving module 1001 in the embodiment of the present disclosure receives the identity authentication feedback information sent by the server, and the identity authentication feedback information includes the identity information plaintext data of the identity information to be authenticated.
  • the sending module in the embodiments of the present disclosure may also be configured to send the identity identification of the electronic device to the server, where the electronic identification of the electronic device is used to determine whether the electronic device satisfies the conditions for identity authentication.
  • the receiving module 1001 in the embodiment of the present disclosure is further configured to receive the identity feedback information sent by the server.
  • the sending module in the embodiment of the present disclosure may also be configured to send an identity authentication request to the server under the condition that the identity identification feedback information indicates that the electronic device does not meet the identity authentication condition.
  • the information processing apparatus 100 in this embodiment of the present disclosure may further include a generating module, configured to generate a device public-private key pair according to the digital certificate in the electronic device.
  • the sending module in the embodiment of the present disclosure can also be used to send a user identity authentication initialization request to the server through a trusted identity authentication initialization interface, where the user identity authentication initialization request includes the device public and private key pair, and the user identity authentication initialization request uses It establishes a secure communication link with the server and performs key exchange through the secure communication link.
  • the receiving module 1001 in the embodiment of the present disclosure is further configured to receive the user identity authentication initialization feedback information of the server, where the user identity authentication initialization feedback information includes the target information data decryption authorization certificate.
  • the obtaining module in the embodiments of the present disclosure may also be used to obtain a trusted identity authentication initialization interface corresponding to the server based on the server public key.
  • the user identity authentication initialization request in the embodiment of the present disclosure further includes application program information, and the application program information includes at least one of the following: an application program identifier, signature certificate information, and certificate fingerprint information, wherein the application program information is used to determine the pending The execution environment of the user authentication result that authenticates the identity information.
  • the processing module 1003 in this embodiment of the present disclosure may be specifically configured to send a biometric information request to the server, where the biometric information request includes the identity information plaintext data and the target information data decryption authorization credential, and the biometric information request It is used to request the server to decrypt the authorization certificate based on the plaintext data of the identity information and the target information data, determine the first biometric information, and receive the biometric feedback information sent by the server, where the biometric feedback information includes the first biometric information encrypted by the device public key.
  • the information processing apparatus 100 in this embodiment of the present disclosure may further include a display module, configured to display a fixed portrait position area, and the fixed portrait position area is used to obtain a human body part image corresponding to the user and the fixed portrait position area.
  • the acquiring module 1002 in the embodiment of the present disclosure may be specifically configured to acquire the image of the human body part to be processed through the fixed location area when receiving the second input of the captured image by the user.
  • the processing module 1003 in the embodiment of the present disclosure may be specifically configured to perform grayscale normalization processing on the image of the human body part to be processed to obtain a user image.
  • the acquisition module 1002 in the embodiment of the present disclosure can be specifically used to select target feature points from a plurality of feature points in a human body part through a fixed location area, and obtain a human body part image corresponding to the target feature point according to the target feature points .
  • the processing module 1003 in this embodiment of the present disclosure can be specifically configured to obtain a first grayscale value of a human body part image to be processed, where the first grayscale value corresponds to the first grayscale level, and according to the first grayscale level Stretch and adjust the image of the human body part to be processed to obtain a user image with a first gray level.
  • the determining module 1004 in this embodiment of the present disclosure may be specifically configured to, in the case that the first biometric information includes an image of an ID document, compare the image of the ID document and the user image through geometric normalization, and obtain The comparison result of the first biometric information and the second biometric information.
  • the determining module 1004 in the embodiment of the present disclosure can be specifically used to identify the user's face area in the ID document image, obtain the user's face image corresponding to the user's face area, perform the user's face image or the face area in the user image, etc.
  • the ratio is enlarged or reduced, and the feature values of the user image and the user face image are calculated, and a comparison result between the first biometric information and the second biometric information is obtained according to at least one feature value.
  • the determining module 1004 in this embodiment of the present disclosure may be specifically configured to input at least one feature value into the target ID document portrait feature model to obtain a comparison result between the first biometric information and the second biometric information.
  • the information processing apparatus 100 in this embodiment of the present disclosure may further include a simplification module, configured to simplify the preset identity document portrait feature model according to the training feature values of the user's face image in the target identity document, to obtain The target identity document portrait feature model.
  • the information processing apparatus 100 may further include an encryption module configured to encrypt the first biometric information and the second biometric information by using a symmetric key to obtain encrypted biometric information.
  • the sending module in the embodiment of the present disclosure is further configured to send an identity authentication result request to the server, where the identity authentication result request includes encrypted biometric information, and the identity authentication result request is used to request the server according to the first biometric information and the second biometric information , and calculate the similarity of the biometric comparison results between the first biometric information and the second biometric information.
  • the receiving module 1001 in the embodiment of the present disclosure is further configured to receive the identity authentication result feedback information sent by the server, where the identity authentication result feedback information includes the similarity of the biometric comparison result encrypted by the public key of the device.
  • the processing module 1003 in this embodiment of the present disclosure is further configured to decrypt the similarity of the biometric comparison result by encrypting the device private key to obtain the similarity of the biometric comparison result, and the similarity of the biometric comparison result is used to represent the first biometric information Comparison result with the second biometric information.
  • the determining module 1004 in this embodiment of the present disclosure may be specifically configured to determine that the user identity authentication of the identity information to be authenticated is successful if the similarity of the biometric comparison result meets the preset similarity.
  • the target information involved in the above also includes at least one of the following: ID number and ID image.
  • the first biometric information includes at least one of the following: an image of the user's face in the identity document image, and an iris image of the user corresponding to the identity document.
  • the trusted target information for characterizing the user's identity such as identity document information
  • the trusted target information can be obtained to avoid the problem of forging identity documents.
  • it also avoids the problem that the obtained target information is inaccurate due to poor photographing effect or insufficient photographing hardware, resulting in incorrect user identity authentication results.
  • TEE Trusted Execution Environment
  • the information processing apparatus 100 shown in FIG. 10 can execute various steps in the information processing method embodiments shown in FIGS. 1-9 , and implement each step in the method embodiments shown in FIGS. 1-9 . The process and effect will not be repeated here.
  • the present disclosure also provides an information processing device based on electronic devices such as wearable devices, smart door locks, etc. that cannot carry a large amount of computation. Specifically, detailed description is given with reference to FIG. 11 .
  • FIG. 11 is a schematic structural diagram of another embodiment of an electronic device-based information processing apparatus provided according to the present disclosure.
  • the apparatus shown in FIG. 11 may be set in a wearable device, a smart door lock, or other information processing equipment that cannot carry a large amount of computation.
  • the information processing apparatus 1100 may specifically include:
  • a receiving module 1110 configured to receive a first input for user identity authentication
  • an obtaining module 1120 configured to, in response to the first input, obtain the user's identity information to be authenticated through near field communication in a trusted execution environment;
  • the sending module 1130 is configured to send the user's identity information to be authenticated to the server, and the user's identity information to be authenticated is used to determine the user identity authentication result of the identity information to be authenticated;
  • the sending module 1130 is further configured to obtain a user image within a preset time period, and send the user image to the server, where the user image is used to compare with the user's identity to be authenticated to determine the user identity authentication result;
  • the receiving module 1110 is further configured to receive the user identity authentication result of the identity information to be authenticated sent by the server.
  • the obtaining module 1120 provided by the embodiment of the present disclosure is specifically configured to obtain the user's identity information to be authenticated by executing the near field communication instruction in the protocol data instruction set in a trusted execution environment; wherein the near field communication instruction is set by Server OK.
  • the present disclosure also provides a server. Specifically, detailed description is given with reference to FIG. 12 .
  • FIG. 12 is a schematic structural diagram of an embodiment of a server-based information processing apparatus provided according to the present disclosure.
  • the information processing apparatus 1200 may specifically include:
  • a receiving module 1210 configured to receive the identity information to be authenticated of the user sent by the electronic device
  • the obtaining module 1220 is configured to obtain target information corresponding to the user's to-be-authenticated identity information and used to characterize the user's identity when it is detected that the user's to-be-authenticated identity information is used to determine the user's identity authentication result of the to-be-authenticated identity information, the target information including the user's first biometric information;
  • the receiving module 1210 is further configured to receive the user image sent by the electronic device
  • a determination module 1230 configured to determine the user identity authentication result of the identity information to be authenticated based on the comparison result between the first biometric information and the second biometric information in the user image;
  • the sending module 1240 is further configured to send the user identity authentication result to the electronic device.
  • the obtaining module 1220 in the embodiment of the present disclosure is specifically used to determine a protocol data instruction according to the ciphertext information of the identity information to be authenticated, and the protocol data instruction is used to indicate that the user identity is represented by splicing and assembling according to the attribute format of the identity document.
  • the original character string of the target information is decrypted according to the pre-stored target information data and the original character string of the authorization certificate and the target information, and the identity information to be authenticated is decrypted to obtain the target information.
  • the sending module 1230 can also be used to send a protocol data instruction to the identity authentication server, where the protocol data instruction is used to instruct the identity authentication server to spliced and assembled according to the identity document attribute format and is used to characterize the original character string of the target information of the user identity.
  • the receiving module 1210 may also be configured to receive the original character string of the target information sent by the identity authentication server.
  • the present disclosure also provides an information processing device. Specifically, detailed description is given with reference to FIG. 13 .
  • FIG. 13 shows a schematic diagram of a hardware structure of an information processing device provided by an embodiment of the present disclosure.
  • the information processing 1300 may include an electronic device or a server involved in the embodiments of the present disclosure.
  • Information processing 1300 may include a processor 1301 and a memory 1302 storing computer program instructions.
  • the above-mentioned processor 1301 may include a central processing unit (CPU), or a specific integrated circuit (Application Specific Integrated Circuit, ASIC), or may be configured to implement one or more integrated circuits of the embodiments of the present disclosure.
  • CPU central processing unit
  • ASIC Application Specific Integrated Circuit
  • Memory 1302 may include mass storage for data or instructions.
  • memory 1302 may include a Hard Disk Drive (HDD), a floppy disk drive, a flash memory, an optical disk, a magneto-optical disk, a magnetic tape, or a Universal Serial Bus (USB) drive or two or more A combination of more than one of the above.
  • Memory 1302 may include removable or non-removable (or fixed) media, where appropriate.
  • Storage 1302 may be internal or external to the integrated gateway disaster recovery device, where appropriate.
  • memory 1302 is non-volatile solid state memory.
  • memory 1302 includes read only memory (ROM).
  • the ROM may be a mask programmed ROM, programmable ROM (PROM), erasable PROM (EPROM), electrically erasable PROM (EEPROM), electrically rewritable ROM (EAROM) or flash memory or A combination of two or more of the above.
  • PROM programmable ROM
  • EPROM erasable PROM
  • EEPROM electrically erasable PROM
  • EAROM electrically rewritable ROM
  • flash memory or A combination of two or more of the above.
  • the processor 1301 reads and executes the computer program instructions stored in the memory 1302 to implement any one of the information processing methods in the foregoing embodiments.
  • the data processing device may also include a communication interface 1303 and a bus 1310 .
  • the processor 1301 , the memory 1302 , and the communication interface 1303 are connected through the bus 1310 and complete the mutual communication.
  • the communication interface 1303 is mainly used to implement communication between modules, apparatuses, units and/or devices in the embodiments of the present disclosure.
  • the bus 1310 includes hardware, software, or both, coupling the components of the flow control device to each other.
  • the bus may include Accelerated Graphics Port (AGP) or other graphics bus, Enhanced Industry Standard Architecture (EISA) bus, Front Side Bus (FSB), HyperTransport (HT) Interconnect, Industry Standard Architecture (ISA) Bus, Infiniband Interconnect, Low Pin Count (LPC) Bus, Memory Bus, Microchannel Architecture (MCA) Bus, Peripheral Component Interconnect (PCI) Bus, PCI-Express (PCI-X) Bus, Serial Advanced Technology Attachment (SATA) bus, Video Electronics Standards Association Local (VLB) bus or other suitable bus or a combination of two or more of the above.
  • Bus 1310 may include one or more buses, where appropriate. Although embodiments of the present disclosure describe and illustrate a particular bus, this disclosure contemplates any suitable bus or interconnect.
  • the data processing device can execute the information processing method in the embodiment of the present disclosure, thereby realizing the information processing method and apparatus described in conjunction with FIG. 1 to FIG. 10 .
  • the embodiments of the present disclosure may be implemented by providing a computer-readable storage medium.
  • Computer program instructions are stored on the computer-readable storage medium, and when the computer program instructions are executed by the processor, any one of the information processing methods in the foregoing embodiments is implemented.
  • Examples of computer-readable storage media include non-transitory computer-readable storage media, such as read-only memory (Read-Only Memory, ROM for short), random access memory (Random Access Memory, RAM for short), magnetic disk, or optical disk, and the like.
  • the functional blocks shown in the above structural block diagrams may be implemented as hardware, software, firmware, or a combination thereof.
  • hardware When implemented in hardware, it may be, for example, an electronic circuit, an application specific integrated circuit (ASIC), suitable firmware, a plug-in, a function card, or the like.
  • ASIC application specific integrated circuit
  • elements of the present disclosure are programs or code segments used to perform the required tasks.
  • the program or code segments may be stored in a machine-readable medium or transmitted over a transmission medium or communication link by a data signal carried in a carrier wave.
  • a "machine-readable medium” may include any medium that can store or transmit information.
  • machine-readable media examples include electronic circuits, semiconductor memory devices, ROM, flash memory, erasable ROM (EROM), floppy disks, CD-ROMs, optical disks, hard disks, fiber optic media, radio frequency (RF) links, and the like.
  • the code segments may be downloaded via a computer network such as the Internet, an intranet, or the like.
  • the exemplary embodiments mentioned in the present disclosure describe some methods or systems based on a series of steps or devices.
  • the present disclosure is not limited to the order of the above steps, that is, the steps may be performed in the order mentioned in the embodiment, or may be different from the order in the embodiment, or several steps may be performed simultaneously.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Collating Specific Patterns (AREA)

Abstract

Disclosed are an information processing method and apparatus, and an electronic device, a server and a medium. The information processing method comprises: firstly, receiving a first input for user identity authentication; next, in response to the first input, acquiring identity information to be authenticated of a user by means of near field communication in a trusted execution environment; then, determining, according to the identity information to be authenticated of the user, target information for representing the identity of the user, wherein the target information comprises first biological characteristic information of the user, and acquiring a user image within a pre-set time period, wherein the user image comprises second biological characteristic information of the user; and then, on the basis of a comparison result between the first biological characteristic information and the second biological characteristic information, determining a user identity authentication result of the identity information to be authenticated. By means of the method, the accuracy of an identity authentication result can be effectively improved, user identity information is prevented from being leaked and tampered with, and network information security is improved.

Description

信息处理方法、装置、电子设备、服务器及介质Information processing method, apparatus, electronic device, server and medium
相关申请的交叉引用CROSS-REFERENCE TO RELATED APPLICATIONS
本申请要求享有于2021年02月09日提交的名称为“信息处理方法、装置、电子设备、服务器及介质”的中国专利申请202110179442.7的优先权,该申请的全部内容通过引用并入本文中。This application claims the priority of Chinese Patent Application No. 202110179442.7, which was filed on February 9, 2021, and is entitled "Information Processing Method, Device, Electronic Device, Server, and Medium", the entire content of which is incorporated herein by reference.
技术领域technical field
本公开属于互联网技术领域,尤其涉及一种信息处理方法、装置、电子设备、服务器及介质。The present disclosure belongs to the field of Internet technologies, and in particular, relates to an information processing method, an apparatus, an electronic device, a server and a medium.
背景技术Background technique
随着计算机和互联网的发展,需要用户身份认证的场景也越来越多,如在帐户登录或者网络支付的场景中进行身份认证。With the development of computers and the Internet, there are more and more scenarios that require user identity authentication, such as identity authentication in account login or online payment scenarios.
目前,可以通过对比用户身份证件图像和用户图像的方式,或者通过读取用户身份证件内芯片的身份信息的方式进行身份认证。但是,前者的身份认证方式难以识别用户身份证件的真伪,另外,用户身份证件表面信息磨损或者图像拍摄效果不佳,也会降低身份认证结果的准确性。而后者的身份认证方式,也会因为读取用户身份证件的平台自身安全性低,导致用户身份信息被恶意篡改和泄露。At present, identity authentication can be performed by comparing the image of the user's identity document with the image of the user, or by reading the identity information of the chip in the user's identity document. However, the former identity authentication method is difficult to identify the authenticity of the user's identity document. In addition, the wear of the surface information of the user's identity document or the poor image capture effect will also reduce the accuracy of the identity authentication result. The latter method of identity authentication will also cause the user's identity information to be maliciously tampered with and leaked due to the low security of the platform that reads the user's identity document.
发明内容SUMMARY OF THE INVENTION
本公开实施例提供一种信息处理方法、装置、电子设备、服务器及介质,能够有效提高身份认证结果的准确性,防止用户身份信息被泄露和被篡改,提高网络信息安全。The embodiments of the present disclosure provide an information processing method, apparatus, electronic device, server and medium, which can effectively improve the accuracy of identity authentication results, prevent user identity information from being leaked and tampered with, and improve network information security.
第一方面,本公开实施例提供了一种信息处理方法,应用于电子设备,包括:In a first aspect, an embodiment of the present disclosure provides an information processing method, which is applied to an electronic device, including:
接收对用户身份认证的第一输入;receiving a first input for user identity authentication;
响应于第一输入,在可信执行环境下,通过近场通信获取用户的待认证身份信息;In response to the first input, in a trusted execution environment, obtain the user's identity information to be authenticated through near field communication;
根据用户的待认证身份信息,确定用于表征用户身份的目标信息,目标信息包括用户的第一生物特征信息,以及在预设时间段内获取的用户图像,用户图像包括用户的第二生物特征信息;According to the user's identity information to be authenticated, determine target information for characterizing the user's identity, the target information includes the user's first biometric information, and a user image acquired within a preset time period, the user image includes the user's second biometrics information;
基于第一生物特征信息与第二生物特征信息的对比结果,确定待认证身份信息的用户身份认证结果。Based on the comparison result between the first biometric information and the second biometric information, the user identity authentication result of the identity information to be authenticated is determined.
第二方面,本公开实施例提供了一种信息处理方法,应用于电子设备,包括:In a second aspect, an embodiment of the present disclosure provides an information processing method, applied to an electronic device, including:
接收对用户身份认证的第一输入;receiving a first input for user identity authentication;
响应于第一输入,在可信执行环境下,通过近场通信获取用户的待认证身份信息;In response to the first input, in a trusted execution environment, obtain the user's identity information to be authenticated through near field communication;
向服务器发送用户的待认证身份信息,用户的待认证身份信息用于确定待认证身份信息的用户身份认证结果;Send the user's identity information to be authenticated to the server, and the user's identity information to be authenticated is used to determine the user identity authentication result of the identity information to be authenticated;
在预设时间段内获取用户图像,并向服务器发送用户图像,用户图像用于与用户的待认证身份进行对比,以确定用户身份认证结果;Acquire a user image within a preset time period, and send the user image to the server, where the user image is used to compare with the user's identity to be authenticated to determine the user identity authentication result;
接收服务器发送的待认证身份信息的用户身份认证结果。Receive the user identity authentication result of the identity information to be authenticated sent by the server.
第三方面,本公开实施例提供了一种信息处理方法,应用于服务器,包括:In a third aspect, an embodiment of the present disclosure provides an information processing method, applied to a server, including:
接收电子设备发送的用户的待认证身份信息;Receive the identity information to be authenticated of the user sent by the electronic device;
在检测到电子设备的设备类型为预设目标设备类型的情况下,获取与用户的待认证身份信息对应的且用于表征用户身份的目标信息,所述目标信息包括用户的第一生物特征信息;When it is detected that the device type of the electronic device is the preset target device type, acquire target information corresponding to the user's identity information to be authenticated and used to characterize the user's identity, the target information including the user's first biometric feature information ;
接收电子设备发送的用户图像;Receive user images sent by electronic devices;
基于第一生物特征信息与用户图像中的第二生物特征信息的对比结果,确定待认证身份信息的用户身份认证结果;Determine the user identity authentication result of the identity information to be authenticated based on the comparison result between the first biometric information and the second biometric information in the user image;
向电子设备发送用户身份认证结果。Send the user authentication result to the electronic device.
第四方面,本公开实施例提供了一种信息处理装置,应用于电子设 备,包括:In a fourth aspect, an embodiment of the present disclosure provides an information processing apparatus, which is applied to an electronic device, including:
接收模块,用于接收对用户身份认证的第一输入;a receiving module for receiving the first input for user identity authentication;
获取模块,用于响应于第一输入,在可信执行环境下,通过近场通信获取用户的待认证身份信息;an acquisition module, configured to acquire the user's identity information to be authenticated through near field communication in a trusted execution environment in response to the first input;
处理模块,用于根据用户的待认证身份信息,确定用于表征用户身份的目标信息,目标信息包括用户的第一生物特征信息,以及在预设时间段内获取的用户图像,用户图像包括用户的第二生物特征信息;The processing module is configured to determine target information used to characterize the user's identity according to the user's identity information to be authenticated, the target information includes the user's first biometric information, and the user image obtained within a preset time period, and the user image includes the user's first biometric information. the second biometric information;
确定模块,用于基于第一生物特征信息与第二生物特征信息的对比结果,确定待认证身份信息的用户身份认证结果。The determining module is configured to determine the user identity authentication result of the identity information to be authenticated based on the comparison result between the first biometric information and the second biometric information.
第五方面,本公开实施例提供了一种信息处理装置,应用于电子设备,具体可以包括:In a fifth aspect, an embodiment of the present disclosure provides an information processing apparatus, which is applied to an electronic device, and may specifically include:
接收模块,用于接收对用户身份认证的第一输入;a receiving module for receiving the first input for user identity authentication;
获取模块,用于响应于第一输入,在可信执行环境下,通过近场通信获取用户的待认证身份信息;an acquisition module, configured to acquire the user's identity information to be authenticated through near field communication in a trusted execution environment in response to the first input;
发送模块,用于向服务器发送用户的待认证身份信息,用户的待认证身份信息用于确定待认证身份信息的用户身份认证结果;a sending module, configured to send the user's identity information to be authenticated to the server, and the user's identity information to be authenticated is used to determine the user identity authentication result of the identity information to be authenticated;
发送模块还用于,在预设时间段内获取用户图像,并向服务器发送用户图像,用户图像用于与用户的待认证身份进行对比,以确定用户身份认证结果;The sending module is further configured to acquire a user image within a preset time period, and send the user image to the server, where the user image is used to compare with the user's identity to be authenticated to determine the user identity authentication result;
接收模块还用于,接收服务器发送的待认证身份信息的用户身份认证结果。The receiving module is further configured to receive the user identity authentication result of the identity information to be authenticated sent by the server.
第六方面,本公开实施例提供了一种信息处理装置,应用于服务器,具体可以包括:In a sixth aspect, an embodiment of the present disclosure provides an information processing apparatus, which is applied to a server, and may specifically include:
接收模块,用于接收电子设备发送的用户的待认证身份信息;a receiving module, configured to receive the identity information to be authenticated of the user sent by the electronic device;
获取模块,用于在检测到电子设备的设备类型为预设目标设备类型的情况下,获取与用户的待认证身份信息对应的且用于表征用户身份的目标信息,目标信息包括用户的第一生物特征信息;The acquisition module is configured to acquire target information corresponding to the user's identity information to be authenticated and used to characterize the user's identity when it is detected that the device type of the electronic device is a preset target device type, and the target information includes the user's first biometric information;
接收模块还用于,接收电子设备发送的用户图像;The receiving module is also used for receiving the user image sent by the electronic device;
确定模块,用于基于第一生物特征信息与用户图像中的第二生物特征 信息的对比结果,确定待认证身份信息的用户身份认证结果;A determination module, for determining the user identity authentication result of the identity information to be authenticated based on the comparison result of the first biometric information and the second biometric information in the user image;
发送模块,用于向电子设备发送用户身份认证结果。The sending module is used for sending the user identity authentication result to the electronic device.
第七方面,本公开实施例提供了一种电子设备,该电子设备包括:处理器和存储有计算机程序指令的存储器;In a seventh aspect, an embodiment of the present disclosure provides an electronic device, the electronic device comprising: a processor and a memory storing computer program instructions;
处理器执行计算机程序指令时实现如第一方面或者第二方面所示的信息处理方法。The information processing method shown in the first aspect or the second aspect is implemented when the processor executes the computer program instructions.
第八方面,本公开实施例提供了一种服务器,该服务器包括:处理器和存储有计算机程序指令的存储器;In an eighth aspect, an embodiment of the present disclosure provides a server, the server comprising: a processor and a memory storing computer program instructions;
处理器执行计算机程序指令时实现如第三方面所示的信息处理方法。The information processing method shown in the third aspect is implemented when the processor executes the computer program instructions.
第九方面,本公开实施例提供了一种计算机可读存储介质,该计算机可读存储介质上存储有计算机程序指令,计算机程序指令被处理器执行时实现如第一方面所示的信息处理方法。In a ninth aspect, an embodiment of the present disclosure provides a computer-readable storage medium, where computer program instructions are stored on the computer-readable storage medium, and when the computer program instructions are executed by a processor, the information processing method shown in the first aspect is implemented .
本公开实施例的信息处理方法、装置、设备及介质,通过在可信执行环境TEE和近场通信NFC获取用户的待认证身份信息的方式,来获取可信任的用于表征用户身份的目标信息如身份证件信息,以避免伪造身份证件的问题,同时也避免了因拍照效果不佳或者拍摄硬件不足造成获取到的目标信息不准确,从而导致用户身份认证结果不正确的问题。The information processing method, device, device, and medium of the embodiments of the present disclosure obtain the trusted target information for characterizing the user's identity by obtaining the user's identity information to be authenticated in the trusted execution environment TEE and the near field communication NFC. For example, the identity document information can avoid the problem of forging identity documents, and also avoid the problem of inaccurate target information obtained due to poor photographing effect or insufficient photographing hardware, resulting in incorrect user identity authentication results.
另外,通过在可信执行环境TEE中获取目标信息、对比目标信息中的第一生物特征信息和拍摄的用户图像中的第二生物特征信息,有效防止恶意软件截获身份证件信息被替换和篡改的问题,同时,通过可信执行环境TEE安全访问电子设备的摄像头,确保用于对比认证的用户图像的准确性,防止注入伪造人脸面部照片或视频的行为。In addition, by acquiring target information in the trusted execution environment TEE, comparing the first biometric information in the target information with the second biometric information in the captured user image, it can effectively prevent malware from intercepting the identity document information that has been replaced and tampered with. At the same time, secure access to the camera of the electronic device through the Trusted Execution Environment (TEE) ensures the accuracy of the user image used for comparison authentication and prevents the injection of fake facial photos or videos.
附图说明Description of drawings
为了更清楚地说明本公开实施例的技术方案,下面将对本公开实施例中所需要使用的附图作简单的介绍,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to illustrate the technical solutions of the embodiments of the present disclosure more clearly, the accompanying drawings required in the embodiments of the present disclosure will be briefly introduced below. For those of ordinary skill in the art, under the premise of no creative work, the Additional drawings can be obtained from these drawings.
图1是根据本公开第一方面的信息处理方法的实施例的信息处理架构示意图;1 is a schematic diagram of an information processing architecture of an embodiment of an information processing method according to the first aspect of the present disclosure;
图2是根据本公开第一方面的信息处理方法的实施例的电子设备和服务器中结构示意图;2 is a schematic structural diagram of an electronic device and a server according to an embodiment of the information processing method of the first aspect of the present disclosure;
图3是根据本公开第一方面的信息处理方法的实施例的应用场景的架构示意图;3 is a schematic architectural diagram of an application scenario of an embodiment of the information processing method according to the first aspect of the present disclosure;
图4是根据本公开第一方面的信息处理方法的实施例的电子设备所属类别对应的APDU指令执行位置的示意图;4 is a schematic diagram of an APDU instruction execution position corresponding to a category to which an electronic device belongs according to an embodiment of the information processing method of the first aspect of the present disclosure;
图5是根据本公开第一方面的信息处理方法的实施例的信息处理方法的流程示意图;5 is a schematic flowchart of an information processing method according to an embodiment of the information processing method of the first aspect of the present disclosure;
图6是根据本公开第一方面的信息处理方法的实施例的信息处理界面示意图;6 is a schematic diagram of an information processing interface according to an embodiment of the information processing method of the first aspect of the present disclosure;
图7是根据本公开第一方面的信息处理方法的实施例的原图像直方图的示意图;7 is a schematic diagram of an original image histogram of an embodiment of the information processing method according to the first aspect of the present disclosure;
图8是根据本公开第一方面的信息处理方法的实施例的可信身份认证初始化流程示意图;8 is a schematic diagram of a trusted identity authentication initialization process according to an embodiment of the information processing method of the first aspect of the present disclosure;
图9是根据本公开第一方面的信息处理方法的实施例的可信身份认证对比的流程示意图;9 is a schematic flowchart of a trusted identity authentication comparison according to an embodiment of the information processing method of the first aspect of the present disclosure;
图10是根据本公开第四方面的信息处理装置的基于电子设备的信息处理装置的实施例结构示意图;10 is a schematic structural diagram of an embodiment of an information processing apparatus based on an electronic device of the information processing apparatus according to the fourth aspect of the present disclosure;
图11是根据本公开第五方面的信息处理装置的基于电子设备的信息处理装置的实施例结构示意图;11 is a schematic structural diagram of an embodiment of an electronic device-based information processing apparatus of the information processing apparatus according to the fifth aspect of the present disclosure;
图12是根据本公开第六方面的信息处理装置的基于服务器的信息处理装置的实施例结构示意图;12 is a schematic structural diagram of an embodiment of a server-based information processing apparatus of the information processing apparatus according to the sixth aspect of the present disclosure;
图13是根据本公开第七方面的信息处理设备的实施例的硬件结构示意图。13 is a schematic diagram of a hardware structure of an embodiment of an information processing apparatus according to a seventh aspect of the present disclosure.
具体实施方式Detailed ways
下面将详细描述本公开的各个方面的特征和示例性实施例,为了使本公开的目的、技术方案及优点更加清楚明白,以下结合附图及具体实施例,对本公开进行进一步详细描述。应理解,此处所描述的具体实施例仅 被配置为解释本公开,并不被配置为限定本公开。对于本领域技术人员来说,本公开可以在不需要这些具体细节中的一些细节的情况下实施。下面对实施例的描述仅仅是为了通过示出本公开的示例来提供对本公开更好的理解。The features and exemplary embodiments of various aspects of the present disclosure will be described in detail below. In order to make the purpose, technical solutions and advantages of the present disclosure more clear, the present disclosure will be further described in detail below with reference to the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described herein are only configured to explain the present disclosure, and not to limit the present disclosure. It will be apparent to those skilled in the art that the present disclosure may be practiced without some of these specific details. The following description of the embodiments is merely intended to provide a better understanding of the present disclosure by illustrating examples of the present disclosure.
需要说明的是,在本文中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括……”限定的要素,并不排除在包括要素的过程、方法、物品或者设备中还存在另外的相同要素。It should be noted that, in this document, relational terms such as first and second are only used to distinguish one entity or operation from another entity or operation, and do not necessarily require or imply any relationship between these entities or operations. any such actual relationship or sequence exists. Moreover, the terms "comprising", "comprising" or any other variation thereof are intended to encompass a non-exclusive inclusion such that a process, method, article or device that includes a list of elements includes not only those elements, but also includes not explicitly listed or other elements inherent to such a process, method, article or apparatus. Without further limitation, an element defined by the phrase "comprising" does not preclude the presence of additional identical elements in the process, method, article or device that includes the element.
目前身份认证方案所处的操作系统大多为安卓系统,这样,身份认证的安全性高度依赖于安卓系统自身的安全性,一旦安卓系统的安全机制失效,那么依赖于安卓系统的安全机制的身份认证方案也会出现漏洞。若身份认证的过程由某个应用程序发起并在安卓环境下执行、且安卓系统环境自身安全性较低时,一旦被攻击者攻击如攻击者获取root权限,通过植入木马等手段,窃取并篡改用户的身份认证过程中的信息,伪造与实际不符的身份认证结果,有甚者还会利用伪造的身份信息实施违法活动,造成用户的身份信息的泄露。At present, the operating system of the identity authentication scheme is mostly Android system, so the security of identity authentication is highly dependent on the security of the Android system itself. There are also loopholes in the scheme. If the identity authentication process is initiated by an application and executed in the Android environment, and the security of the Android system environment itself is low, once an attacker is attacked, such as an attacker obtaining root privileges, by implanting a Trojan horse and other means, stealing and Tampering with the information in the user's identity authentication process, falsifying the identity authentication results that are inconsistent with the actual situation, and even using the forged identity information to carry out illegal activities, resulting in the disclosure of the user's identity information.
现有的身份认证方案,可以通过对比用户身份证件中的用户图像和实时获取用户图像的方式,或者通过读取用户身份证件内芯片的身份信息的方式进行身份认证。但是,前者的身份认证方式难以识别用户身份证件的真伪,以及因用户身份证件表面信息磨损或者电子设备拍摄图像的效果不佳,都会导致身份认证结果不准确。而后者的身份认证方案,通常是授权给应用程序的运营机构进行读取和身份认证,如果运营机构的人员有意泄露授权凭证给非授权机构,或者非授权机构通过反向工程、恶意调试等手段窃取授权凭证,那么非授权机构就存在冒用该凭证取得不当收益的可 能。另外,取用户身份证件内芯片的身份信息的方式中执行人脸比对的身份认证过程在安卓系统内的一个安卓控件内,或者作为安卓应用的一部分来执行,这样,也会因为安卓系统自身安全性低,导致用户的身份信息被恶意篡改和泄露。In the existing identity authentication scheme, identity authentication can be performed by comparing the user image in the user's identity document and obtaining the user's image in real time, or by reading the identity information of the chip in the user's identity document. However, the former identity authentication method is difficult to identify the authenticity of the user's identity document, and the result of identity authentication is inaccurate due to the wear and tear of the surface information of the user's identity document or the poor image capture effect of the electronic device. The latter identity authentication scheme is usually authorized to the operating organization of the application for reading and identity authentication. If the personnel of the operating organization intentionally disclose the authorization credentials to the unauthorized organization, or the unauthorized organization uses reverse engineering, malicious debugging and other means If the authorization certificate is stolen, the unauthorized organization may use the certificate to obtain improper benefits. In addition, the identity authentication process of performing face comparison in the method of obtaining the identity information of the chip in the user's identity document is performed in an Android control in the Android system, or as a part of the Android application. Low security, resulting in malicious tampering and disclosure of user identity information.
由此,本公开实施例提供了一种信息处理方法、装置、设备及存储介质,通过在可信执行环境(trusted execution environment,TEE)和近场通信(near field communication,NFC)获取用户的待认证身份信息的方式,来获取可信任的用于表征用户身份的目标信息如身份证件信息,以避免伪造身份证件的问题,同时也避免了因拍照效果不佳或者拍摄硬件不足造成获取到的目标信息不准确,从而导致用户身份认证结果不正确的问题。Thus, the embodiments of the present disclosure provide an information processing method, apparatus, device, and storage medium, which can obtain a user's waiting list by using a trusted execution environment (TEE) and near field communication (NFC). The method of authenticating identity information to obtain trustworthy target information used to characterize the user's identity, such as identity document information, to avoid the problem of forging identity documents, and also to avoid the target obtained due to poor photographing effect or insufficient photographing hardware. Inaccurate information, resulting in incorrect user authentication results.
另外,通过在可信执行环境TEE中获取目标信息、对比目标信息中的第一生物特征信息和拍摄的用户图像中的第二生物特征信息,有效防止恶意软件截获身份证件信息被替换和篡改的问题,同时,通过可信执行环境TEE安全访问电子设备的摄像头,确保用于对比认证的用户图像的准确性,防止注入伪造人脸面部照片或视频的行为。In addition, by acquiring target information in the trusted execution environment TEE, comparing the first biometric information in the target information with the second biometric information in the captured user image, it can effectively prevent malware from intercepting the identity document information that has been replaced and tampered with. At the same time, secure access to the camera of the electronic device through the Trusted Execution Environment (TEE) ensures the accuracy of the user image used for comparison authentication and prevents the injection of fake facial photos or videos.
为了更好的理解本公开,下面将结合附图1至图11,详细描述根据本公开实施例的信息处理方法、装置、电子设备、服务器及存储介质,应注意,这些实施例并不是用来限制本公开公开的范围。For a better understanding of the present disclosure, the information processing method, apparatus, electronic device, server, and storage medium according to the embodiments of the present disclosure will be described in detail below with reference to FIG. 1 to FIG. 11 . It should be noted that these embodiments are not used for limit the scope of this disclosure.
图1是根据本公开第一方面的信息处理方法的实施例的信息处理架构示意图。FIG. 1 is a schematic diagram of an information processing architecture of an embodiment of an information processing method according to the first aspect of the present disclosure.
如图1所示,该信息处理系统包括电子设备10、服务器20和近场通信芯片30如身份证件中的芯片、银行卡证件中的芯片、充值卡中的芯片等支持近场通讯的芯片。在电子设备10与服务器20建立通讯链接的情况下,接收对用户身份认证的第一输入。电子设备10响应于第一输入,在可信执行环境下,通过近场通信获取近场通信芯片30中用户的待认证身份信息。电子设备10根据用户的待认证身份信息,确定用于表征用户身份的目标信息,目标信息包括用户的第一生物特征信息,以及在预设时间段内获取的用户图像,用户图像包括用户的第二生物特征信息,以及基于 第一生物特征信息与第二生物特征信息的对比结果,确定待认证身份信息的用户身份认证结果。As shown in FIG. 1 , the information processing system includes an electronic device 10 , a server 20 and a near field communication chip 30 , such as a chip in an ID document, a chip in a bank card document, a chip in a recharge card, and other chips that support near field communication. When the electronic device 10 establishes a communication link with the server 20, a first input for user identity authentication is received. In response to the first input, the electronic device 10 acquires the identity information to be authenticated of the user in the near field communication chip 30 through near field communication in a trusted execution environment. The electronic device 10 determines target information for characterizing the user's identity according to the user's identity information to be authenticated, the target information includes the user's first biometric information, and the user image acquired within a preset time period, and the user image includes the user's first biometric information. two biometric information, and based on the comparison result of the first biometric information and the second biometric information, determine the user identity authentication result of the identity information to be authenticated.
这里,在电子设备10获取到用户的待认证身份信息之后,也可以将用户的待认证身份信息发送到服务器20,以使服务器20根据用户的待认证身份信息,确定用于表征用户身份的目标信息,并通过电子设备10拍摄的用户图像,确定待认证身份信息的用户身份认证结果,然后,将待认证身份信息的用户身份认证结果反馈到电子设备10,以便电子设备10向用户显示用户身份认证结果。Here, after the electronic device 10 obtains the user's identity information to be authenticated, it may also send the user's identity information to be authenticated to the server 20, so that the server 20 determines a target for characterizing the user's identity according to the user's identity information to be authenticated information, and determine the user identity authentication result of the identity information to be authenticated through the user image captured by the electronic device 10, and then feed back the user identity authentication result of the identity information to be authenticated to the electronic device 10, so that the electronic device 10 displays the user identity to the user. Authentication result.
基于上述架构,下面分别对电子设备10和服务器20进行详细说明。如图2所示,本公开实施例中电子设备10可以包括电子设备应用程序101、可信身份认证服务控件102和可信身份认证服务TA103。电子设备应用程序101的示例包括可信身份认证服务SDK1011即软件开发工具包(software development kit,SDK),可信身份认证服务TA103即可信应用程序(trusted application,TA)。Based on the above architecture, the electronic device 10 and the server 20 will be described in detail below, respectively. As shown in FIG. 2 , the electronic device 10 in the embodiment of the present disclosure may include an electronic device application 101 , a trusted identity authentication service control 102 and a trusted identity authentication service TA103 . Examples of the electronic device application 101 include the trusted identity authentication service SDK1011, which is a software development kit (SDK), and the trusted identity authentication service TA103, which is a trusted application (trusted application, TA).
进一步地,电子设备10具备可信执行环境TEE,电子设备10通过可信身份认证服务相关的第三方应用程序(Application,APP),由需要开展用户认证服务平台如购物类应用程序或者行业方提供,其通过集成可信身份认证服务SDK1011获取可信身份认证服务能力,可信身份认证服务控件102作为独立应用程序运行在电子设备上,可信身份认证服务TA103运行在可信执行环境TEE中。Further, the electronic device 10 has a trusted execution environment TEE, and the electronic device 10 passes a third-party application (Application, APP) related to the trusted identity authentication service, which is provided by a platform that needs to carry out user authentication service, such as a shopping application or an industry party. , which obtains the trusted identity authentication service capability by integrating the trusted identity authentication service SDK1011, the trusted identity authentication service control 102 runs on the electronic device as an independent application, and the trusted identity authentication service TA103 runs in the trusted execution environment TEE.
本公开实施例中的服务器20,可以运行可信身份服务平台等支撑管理类的平台。该运行可信身份服务平台可以包括权威身份认证模块201、可信身份认证后台模块202和人脸认证对比模块203。权威身份认证模块201用于与身份鉴别平台的身份鉴别服务器进行交互,解析用户的待认证的身份信息的身份信息明文数据。这里,本公开实施例中的可信身份服务平台,用于管理接入和使用可信身份服务平台的第三方应用程序,可结合权威身份认证模块201和人脸认证对比模块203为可信身份认证服务控件102提供业务功能处理流程。The server 20 in the embodiment of the present disclosure may run a platform supporting management classes, such as a trusted identity service platform. The operating trusted identity service platform may include an authoritative identity authentication module 201 , a trusted identity authentication background module 202 and a face authentication comparison module 203 . The authoritative identity authentication module 201 is used to interact with the identity authentication server of the identity authentication platform, and parse the identity information plaintext data of the identity information to be authenticated of the user. Here, the trusted identity service platform in the embodiment of the present disclosure is used to manage third-party applications that access and use the trusted identity service platform. The authentication service control 102 provides the business function processing flow.
基于上述电子设备10和服务器20所示的结构,对本公开实施例提供 的信息处理方法进行详细说明,具体如下所示。Based on the structures shown in the above-mentioned electronic device 10 and server 20, the information processing method provided by the embodiment of the present disclosure will be described in detail, and the details are as follows.
基于上述可知,现有的身份证件信息如用户身份证件图像和身份证件号码存在被滥用、盗用、恶意泄露等问题。因此,要想确保身份证件信息安全、合规的使用,首先,要保证用户所使用的身份证件是真实的且就在其身边,这样,通过NFC安全读取和解析身份证件信息是本公开实施例的技术基础。而要实现通过NFC安全读取和解析身份证有两个前提条件,一是实现从电子设备10通过服务器到身份鉴别服务器安全的传输身份证件信息,二是实现NFC安全读取身份证件信息。Based on the above, it can be seen that the existing identity document information, such as the user's identity document image and the identity document number, has problems such as abuse, theft, and malicious disclosure. Therefore, in order to ensure the safe and compliant use of identity document information, first of all, it is necessary to ensure that the identity document used by the user is real and close to him. In this way, the safe reading and parsing of identity document information through NFC is implemented in this disclosure. The technical basis of the example. There are two prerequisites to realize the safe reading and parsing of the ID card through NFC. One is to realize the safe transmission of ID information from the electronic device 10 through the server to the identity authentication server, and the other is to realize the safe reading of the ID information through NFC.
针对此,本公开实施例基于TEE安全保障机制提出从电子设备到服务器的安全信息交互方式。首先,本公开实施例将对接身份鉴别服务器的功能授予权威身份认证模块201,并预先在服务器中预身份鉴别服务器授予的服务器证书,该服务器证书用于表示该服务器有权限对用户的待认证身份信息进行鉴别。其次,进一步通过与电子设备对应的可信应用管理平台(Trusted Application Management,TAM)将身份鉴别服务器提供的目标信息数据解密授权凭证安全地下载到可信身份认证服务中,实现从电子设备到可信身份服务平台再到身份鉴别平台的安全通讯闭环。In view of this, the embodiments of the present disclosure propose a security information interaction method from the electronic device to the server based on the TEE security guarantee mechanism. First, the embodiment of the present disclosure grants the authoritative identity authentication module 201 the function of docking with an identity authentication server, and pre-installs the server certificate granted by the identity authentication server in the server, and the server certificate is used to indicate that the server has the authority to authenticate the user's identity to be authenticated. information for identification. Secondly, through the trusted application management platform (Trusted Application Management, TAM) corresponding to the electronic device, the target information data decryption authorization certificate provided by the identity authentication server is securely downloaded to the trusted identity authentication service, so as to realize the transition from electronic device to reliable authentication service. A closed loop of secure communication from the identity service platform to the identity authentication platform.
基于此,当电子设备接收到用户对用户身份认证的第一输入时,可通过电子设备中安卓系统和/或ios系统中的可信身份认证服务SDK1011和可信身份认证服务控件102实现对可信身份认证服务TA103的调用,以及发起对待认证身份信息的采集和处理,再由其可信地连接到可信身份服务平台与可信身份认证后台模块202进行通讯。最后,通过权威身份认证模块201完成对待认证身份信息的校验和解析处理。Based on this, when the electronic device receives the user's first input for user identity authentication, the electronic device can use the trusted identity authentication service SDK 1011 and the trusted identity authentication service control 102 in the Android system and/or the ios system in the electronic device to realize the authentication of the user's identity. Invoke the trusted identity authentication service TA103, and initiate the collection and processing of the identity information to be authenticated, and then it is credibly connected to the trusted identity service platform to communicate with the trusted identity authentication background module 202. Finally, the verification and parsing processing of the identity information to be authenticated is completed by the authoritative identity authentication module 201 .
如此,一方面有效规避了电子设备中TEE空间较小能力受限的问题,降低了识读待认证身份信息对电子设备的硬件资源的要求。另一方面,通过可信身份认证服务TA基于电子设备数字证书如根信任证书生成一对公私密钥对。其中,公私密钥对中的设备公钥与用户地址(UserId)及电子设备唯一标识会一并记录在可信身份服务平台,当发现某电子设备存在风险时,迅速定位到某台电子设备并终止其继续访问可信身份服务平台,为可信身份服务平台进行电子设备风险防控提供了有效的支持。另外,在确 保了从电子设备到身份鉴别平台的身份认证信息传输的安全后,就已经具备了安全受理待认证身份信息校验和解析的能力,接下来就可以进一步解决NFC安全读取身份证件信息和与可信身份服务平台安全对接的过程,具体可以结合图3进行详细说明。In this way, on the one hand, the problem of limited capability due to the small TEE space in the electronic device is effectively avoided, and the requirements on the hardware resources of the electronic device for reading the identity information to be authenticated are reduced. On the other hand, the trusted identity authentication service TA generates a pair of public and private keys based on the digital certificate of the electronic device such as the root trust certificate. Among them, the device public key and user address (UserId) and the unique identifier of the electronic device in the public-private key pair will be recorded on the trusted identity service platform. When a risk is found in an electronic device, it will quickly locate an electronic device and Terminate its continued access to the trusted identity service platform, which provides effective support for the trusted identity service platform to carry out risk prevention and control of electronic equipment. In addition, after ensuring the security of the identity authentication information transmission from the electronic device to the identity authentication platform, it has the ability to securely accept the verification and analysis of the identity information to be authenticated. The information and the process of securely docking with the trusted identity service platform can be described in detail with reference to FIG. 3 .
图3是根据本公开提供的信息处理系统的一个实施例的应用场景的架构示意图。如图3所示,近场通讯芯片为包括用户的待认证身份信息的芯片,该芯片支持NFC通讯,例如二代身份证件。电子设备10包括NFC模块和可信身份认证服务TA103,NFC模块用于读取和传输二代身份证件中用户的待认证身份信息,可信身份认证服务TA103运行在TEE可信执行环境中,在二代身份证件与NFC进行应用协议数据单元(Application Protocol,APDU)指令通讯时,判断和比对当前物联网电子设备,并确定NFC的访问与二代身份证件之间通讯流程。如在一些资源严重受限的物联网电子设备如可穿戴式设备、智能门锁等无法承载计算量较大的设备,还需在NFC通讯过程中对其流程做进一步定制,并对NFC的访问和与二代身份证件之间的APDU指令交互放在设备TEE内执行,将二代身份证件访问APDU指令的生成、组装和APDU响应的处理放在可信身份认证服务后台上进行,具体内容可以具体参照图4所示的内容。FIG. 3 is an architectural schematic diagram of an application scenario of an embodiment of an information processing system provided according to the present disclosure. As shown in FIG. 3 , the near field communication chip is a chip that includes the user's identity information to be authenticated, and the chip supports NFC communication, such as a second-generation identity document. The electronic device 10 includes an NFC module and a trusted identity authentication service TA103. The NFC module is used to read and transmit the identity information to be authenticated of the user in the second-generation identity document. The trusted identity authentication service TA103 runs in the TEE trusted execution environment. When the second-generation ID card communicates with the NFC using Application Protocol Data Unit (APDU) commands, it judges and compares the current Internet of Things electronic devices, and determines the communication process between the NFC access and the second-generation ID card. For example, in some IoT electronic devices with severely limited resources, such as wearable devices, smart door locks and other devices that cannot carry a large amount of computing, it is necessary to further customize the process in the NFC communication process, and access the NFC The APDU command interaction with the second-generation ID document is executed in the device TEE, and the generation, assembly and APDU response processing of the second-generation ID document access APDU command are carried out on the background of the trusted identity authentication service. The specific content can be Specifically refer to the content shown in FIG. 4 .
服务器20运行可信身份服务平台,该运行可信身份服务平台用于基于可信身份认证服务的处理信息方法的支撑管理平台。另外,该运行可信身份服务平台可以包括APDU指令操作模块和权威身份认证模块201,其中,APDU指令操作模块用于处理二代身份证件访问APDU指令的生成、组装和响应,主要与权威身份认证模块201进行交互。权威身份认证模块201用于与身份鉴别平台进行安全交互确定用户的待认证的身份信息的身份信息明文数据。The server 20 runs a trusted identity service platform, which is used as a support management platform for the information processing method based on the trusted identity authentication service. In addition, the operating trusted identity service platform may include an APDU instruction operation module and an authoritative identity authentication module 201, wherein the APDU instruction operation module is used to process the generation, assembly and response of the second-generation identity document access APDU instruction, which is mainly related to the authoritative identity authentication. Module 201 interacts. The authoritative identity authentication module 201 is used for securely interacting with the identity authentication platform to determine the identity information plaintext data of the identity information to be authenticated of the user.
基于图3所示的系统架构,本公开实施例是通过TEE实现对NFC信息的安全读取,然后使可信身份认证服务TA103全面监听设备外对NFC的读取操作。待可信身份认证服务TA103收到刷身份证操作请求时,即安全调用电子设备的NFC模块,并按照二代身份证件卡规范执行APDU指令集,以及将执行指令响应的待认证的身份信息进行回传。接着,可信身 份认证服务TA103通过电子设备和服务器之间的安全链接把接收到的待认证的身份信息的密文信息发送到权威身份认证模块201中。权威身份认证模块201在收到待认证的身份信息的密文信息后即建立与身份鉴别服务器的安全通信,并通过身份鉴别服务器解析和按身份证件属性格式拼接组装成用于表征用户身份的目标信息的原文字符串返回时,由可信身份服务服务平台把目标信息的原文字符串响应回给可信身份认证服务TA103。此时,可信身份认证服务TA103就可以根据事先保存的权威身份鉴别机构的目标信息数据解密授权凭证和目标信息的原文字符串对待认证的身份信息如身份证件号码、身份证件图像和身份证件图像中用户面部图像等进行解密,得到目标信息如身份证件图像中用户面部图像。在上述过程中,可信身份认证服务TA103通过NFC近场读取到二代身份证件的待认证的身份信息再交由权威身份认证模块201服务处理和解析出待认证的身份信息的身份信息明文数据。Based on the system architecture shown in FIG. 3 , the embodiment of the present disclosure implements secure reading of NFC information through TEE, and then enables the trusted identity authentication service TA103 to comprehensively monitor NFC reading operations outside the device. When the trusted identity authentication service TA103 receives the ID card operation request, it will safely call the NFC module of the electronic device, execute the APDU command set according to the second-generation ID card specification, and execute the command response to the identity information to be authenticated. return. Next, the trusted identity authentication service TA103 sends the received ciphertext information of the identity information to be authenticated to the authoritative identity authentication module 201 through the secure link between the electronic device and the server. The authoritative identity authentication module 201 establishes a secure communication with the identity authentication server after receiving the ciphertext information of the identity information to be authenticated, and parses it through the identity authentication server and splices and assembles it into a target for characterizing the user identity through the identity authentication server attribute format. When the original text string of the information is returned, the trusted identity service service platform responds the original text string of the target information to the trusted identity authentication service TA103. At this point, the trusted identity authentication service TA103 can decrypt the original character string of the authorization certificate and the target information according to the target information data of the pre-saved authoritative identity authentication agency, and the identity information to be authenticated, such as the identity document number, the identity document image and the identity document image Decrypt the user's face image, etc., to obtain target information such as the user's face image in the ID document image. In the above process, the trusted identity authentication service TA103 reads the identity information to be authenticated of the second-generation identity document through the NFC near field, and then hands it over to the authoritative identity authentication module 201 to process and parse the identity information of the identity information to be authenticated. data.
另外,需要说明的是,本公开实施例中的信息处理方法可以在电子设备侧执行,也可以在电子设备和服务器上执行。由此,在一些可能的实施例中,如在一些资源严重受限的物联网电子设备如可穿戴式设备、智能门锁等无法承载计算量较大的设备,还需在NFC通讯过程中对其流程做进一步定制。具体可以结合图4对这些物联网电子设备进行说明。如图4所示,针对本公开实施例提供的一些资源严重受限的物联网电子设备(如可穿戴式设备、智能门锁等),还需在NFC通讯过程中对其流程做进一步定制,并对NFC的访问和与身份证件之间的APDU指令交互放在设备TEE内执行,将身份证件访问APDU指令的生成、组装和APDU响应的处理放在可信身份服务平台上进行。即本公开实施例通过TEE实现对NFC信息的安全读取,然后使可信身份认证服务TA103全面监听设备外对NFC的读取操作。待可信身份认证服务TA103收到刷身份证操作请求时,即安全调用电子设备的NFC模块,并按照二代身份证件卡规范执行APDU指令集中近场通讯的指令,以及将执行指令响应的待认证的身份信息进行回传,这里,APDU指令集中的指令由服务器确定。接着,可信身份认证服务TA103通过电子设备和服务器之间的安全链接把接收到的待认证的身份 信息的密文信息发送到权威身份认证模块201中。权威身份认证模块201在收到待认证的身份信息的密文信息后即建立与身份鉴别服务器的安全通信,并通过身份鉴别服务器解析和按身份证件属性格式拼接组装成用于表征用户身份的目标信息的原文字符串返回至权威身份认证模块201。此时,权威身份认证模块201就可以根据事先保存的权威身份鉴别机构的目标信息数据解密授权凭证和目标信息的原文字符串对待认证的身份信息如身份证件号码、身份证件图像和身份证件图像中用户面部图像等的解密,以得到目标信息如份证件图像中用户面部图像。在上述过程中,可信身份认证服务TA103通过NFC近场读取到二代身份证件的待认证的身份信息再交由权威身份认证模块201服务处理和解析出待认证的身份信息的身份信息明文数据。In addition, it should be noted that the information processing method in the embodiment of the present disclosure may be executed on the side of the electronic device, and may also be executed on the electronic device and the server. Therefore, in some possible embodiments, for example, in some IoT electronic devices with severely limited resources, such as wearable devices, smart door locks, etc. that cannot carry a large amount of computing, it is also necessary to check the NFC communication process. Its process is further customized. These Internet of Things electronic devices can be specifically described with reference to FIG. 4 . As shown in FIG. 4 , for some IoT electronic devices (such as wearable devices, smart door locks, etc.) with severely limited resources provided by the embodiments of the present disclosure, the process needs to be further customized in the NFC communication process. The access to NFC and the APDU command interaction with the ID document are executed in the device TEE, and the generation, assembly and APDU response processing of the ID document access APDU command are carried out on the trusted identity service platform. That is, the embodiment of the present disclosure realizes the secure reading of NFC information through TEE, and then enables the trusted identity authentication service TA103 to comprehensively monitor the reading operation of NFC outside the device. When the trusted identity authentication service TA103 receives the ID card swiping operation request, it will safely call the NFC module of the electronic device, and execute the near field communication command in the APDU command set according to the second-generation ID card specification, and will execute the command response to the waiting list. The authenticated identity information is returned. Here, the instructions in the APDU instruction set are determined by the server. Next, the trusted identity authentication service TA103 sends the received ciphertext information of the identity information to be authenticated to the authoritative identity authentication module 201 through the secure link between the electronic device and the server. The authoritative identity authentication module 201 establishes a secure communication with the identity authentication server after receiving the ciphertext information of the identity information to be authenticated, and is parsed by the identity authentication server and assembled into a target for characterizing the user identity by splicing and splicing according to the identity document attribute format. The original text string of the information is returned to the authoritative identity authentication module 201 . At this time, the authoritative identity authentication module 201 can decrypt the original character string of the authorization certificate and the target information according to the target information data of the authoritative identity authentication agency saved in advance, such as the identity information to be authenticated, such as the identity document number, the identity document image and the identity document image. Decryption of the user's face image, etc., to obtain target information such as the user's face image in the identity document image. In the above process, the trusted identity authentication service TA103 reads the identity information to be authenticated of the second-generation identity document through the NFC near field, and then hands it over to the authoritative identity authentication module 201 to process and parse the identity information of the identity information to be authenticated. data.
根据物联网电子设备定制NFC的访问与身份证件之间通讯流程时,根据物联网电子设备性能、用途和类型选择合适的处理流程,如智能手机、手提/平板电脑、智能POS机具、智能汽车、自助售货机、以及自助闸机使用在TEE内调用NFC与二代身份证件之间进行APDU指令交互的方案;智能手表/手环、智能门锁/门禁使用在设备执行APDU指令,在可信身份服务平台进行APDU指令的生成、组装和处理。When customizing the communication process between NFC access and ID documents according to the Internet of Things electronic device, select the appropriate processing process according to the performance, use and type of the Internet of Things electronic device, such as smart phones, portable/tablet computers, smart POS equipment, smart cars, Self-service vending machines and self-service gates use the scheme of calling NFC in the TEE to perform APDU command interaction between NFC and second-generation ID documents; smart watches/bands, smart door locks/access control use the device to execute APDU commands, and the trusted identity The service platform generates, assembles and processes APDU instructions.
基于此,当电子设备接收到用户对用户身份认证的第一输入时,响应于第一输入,在可信执行环境下,通过近场通信获取用户的待认证身份信息,向服务器发送用户的待认证身份信息,用户的待认证身份信息用于确定待认证身份信息的用户身份认证结果。这样,服务器接收电子设备发送的用户的待认证身份信息,在检测到电子设备的设备类型为预设目标设备类型即电子设备的设备类型符合可穿戴式设备、智能门锁等无法承载计算量较大的设备的情况下,获取与用户的待认证身份信息对应的且用于表征用户身份的目标信息,目标信息包括用户的第一生物特征信息。再者,电子设备在预设时间段内获取用户图像,并向服务器发送用户图像,用户图像用于与用户的待认证身份进行对比,以确定用户身份认证结果。然后,服务器接收电子设备发送的用户图像,并确定用户图像中的用户的第二生物特征信息,基于第一生物特征信息与第二生物特征信息的对比结果,确 定待认证身份信息的用户身份认证结果,向电子设备发送待认证身份信息的用户身份认证结果。电子设备,接收服务器发送的待认证身份信息的用户身份认证结果,以便向用户提示待认证身份信息的用户身份认证结果。这里,在确定用户的第一生物特征信息时,服务器可以向电子设备发送获取用户图像指令,用户图像指令用于指示电子设备在预设时间段内获取用户图像。电子设备在接收到服务器发送的获取用户图像指令时,获取用户图像。或者,电子设备接收到用户针对获取用户图像指令,也可以使电子设备获取用户图像。Based on this, when the electronic device receives the user's first input for user identity authentication, in response to the first input, in a trusted execution environment, the user's identity information to be authenticated is obtained through near field communication, and the user's identity information to be authenticated is sent to the server. Authentication identity information, the user's identity information to be authenticated is used to determine the user identity authentication result of the identity information to be authenticated. In this way, the server receives the identity information to be authenticated of the user sent by the electronic device, and when it detects that the device type of the electronic device is the preset target device type, that is, the device type of the electronic device conforms to the wearable device, smart door lock, etc., it cannot bear the computational burden. In the case of a large device, target information corresponding to the user's identity information to be authenticated and used to characterize the user's identity is acquired, and the target information includes the user's first biometric feature information. Furthermore, the electronic device acquires the user image within a preset time period, and sends the user image to the server, where the user image is used to compare with the user's identity to be authenticated to determine the user identity authentication result. Then, the server receives the user image sent by the electronic device, determines the second biometric information of the user in the user image, and determines the user identity authentication of the identity information to be authenticated based on the comparison result between the first biometric information and the second biometric information As a result, the user identity authentication result of the identity information to be authenticated is sent to the electronic device. The electronic device receives the user identity authentication result of the identity information to be authenticated sent by the server, so as to prompt the user with the user identity authentication result of the identity information to be authenticated. Here, when determining the first biometric information of the user, the server may send an instruction to acquire the user image to the electronic device, where the user image instruction is used to instruct the electronic device to acquire the user image within a preset time period. The electronic device acquires the user image when receiving the instruction for acquiring the user image sent by the server. Alternatively, when the electronic device receives an instruction from the user for acquiring the user image, the electronic device may also acquire the user image.
进一步地,电子设备可以在可信执行环境下,通过执行服务器提供的协议数据指令集中近场通讯的指令,获取用户的待认证身份信息。Further, the electronic device may obtain the user's identity information to be authenticated by executing the near field communication instruction in the protocol data instruction set provided by the server in a trusted execution environment.
服务器在目标信息时,可以具体通过如下步骤,即根据待认证身份信息的密文信息,确定按照身份证件属性格式拼接组装成的用于表征用户身份的目标信息的原文字符串,根据预存的目标信息数据解密授权凭证和目标信息的原文字符串,对待认证的身份信息进行解密,得到目标信息。When the server is in the target information, it can specifically go through the following steps, that is, according to the ciphertext information of the identity information to be authenticated, determine the original character string assembled and assembled according to the attribute format of the identity document and used to represent the target information of the user's identity, according to the pre-stored target information The information data decrypts the original character string of the authorization certificate and the target information, decrypts the identity information to be authenticated, and obtains the target information.
进一步地,在确定原文字符串的过程中,服务器向身份鉴别服务器发送协议数据指令,协议数据指令用于指示身份鉴别服务器按照身份证件属性格式拼接组装成的用于表征用户身份的目标信息的原文字符串,接收身份鉴别服务器发送的目标信息的原文字符串。Further, in the process of determining the original character string, the server sends a protocol data instruction to the identity authentication server, and the protocol data instruction is used to instruct the identity authentication server to splicing and assemble the original text of the target information used to represent the user identity according to the identity document attribute format. String, receiving the original text string of the target information sent by the authentication server.
由此,本公开实施例提出一种基于TEE和NFC的可信身份认证的信息处理方法,可以通过TEE安全访问NFC进行身份证件的待认证的身份信息识读的方式以获取可靠可信的用于表征用户身份的目标信息,以及在一些实施例中可以在可信执行环境TEE中与服务器中运行可信身份服务平台进行交互,以避免伪造身份证的问题,同时也避免了因拍照效果不佳造成获取到的目标信息不准确,提高身份认证的准确性。通过将待认证的身份信息对应的目标信息数据解密授权凭证迁移至TEE中,杜绝了待认证的身份信息在电子设备和服务器交互过程中可能被木马病毒窃取的问题。另外,通过从TEE内安全访问摄像头,确保用于对比认证的用户图像即实时的用户图像的源头可信,防止注入伪造人脸照片或视频的行为。Therefore, an embodiment of the present disclosure proposes an information processing method for trusted identity authentication based on TEE and NFC, which can securely access NFC through the TEE to read the identity information to be authenticated of the identity document to obtain reliable and trusted identity information. Target information representing the user's identity, and in some embodiments, can interact with the trusted identity service platform running in the server in the trusted execution environment TEE, so as to avoid the problem of forgery of ID cards, and also avoid the problem of ineffective photographing. This will result in inaccurate target information obtained and improve the accuracy of identity authentication. By migrating the target information data decryption authorization certificate corresponding to the identity information to be authenticated into the TEE, the problem that the identity information to be authenticated may be stolen by the Trojan virus during the interaction between the electronic device and the server is eliminated. In addition, by securely accessing the camera from within the TEE, the source of the user image used for comparison and authentication, that is, the real-time user image, can be trusted, preventing the injection of fake face photos or videos.
另外,针对一些支持TEE和NFC的物联网电子设备硬件资源严重受 限的问题,本公开实施例利用第四代移动通信技术(the 4th generation mobile communication technology,4G)、第五代移动通信技术(5th generation mobile networks,5G)传输速率更高时延更低的特性,将NFC与二代身份证交互的命令进行了拆分,其中,通过近场通信获取用户的待认证身份信息的部分在电子设备实现,主要处理身份证件APDU请求响应和交互协议,后端部分移至服务器运行,主要负责身份证件访问APDU指令的生成、组装和APDU响应的处理。通过上述前后端分离处理的方式,减少了电子设备的NFC交互协议的空间占比,对于可穿戴设备等资源比较有限的物联网终端设备,具有更强的适用性。通过电子设备的类别,确定在电子设备和服务器确定对比结果方式,保证了身份证识读和人脸比对功能在电子设备TEE空间资源有限的情况下的可用性和适配性。In addition, in view of the problem that the hardware resources of some IoT electronic devices supporting TEE and NFC are severely limited, the embodiments of the present disclosure utilize the 4th generation mobile communication technology (4G), the fifth generation mobile communication technology ( 5th generation mobile networks, 5G) has the characteristics of higher transmission rate and lower delay, and splits the commands for interaction between NFC and second-generation ID cards. Among them, the part that obtains the user's identity information to be authenticated through near field communication is electronic The device is implemented, mainly dealing with the identity document APDU request response and interaction protocol, and the back-end part is moved to the server to run, and is mainly responsible for the generation and assembly of the identity document access APDU command and the processing of the APDU response. Through the above-mentioned front-end and back-end separation processing method, the space ratio of the NFC interaction protocol of electronic devices is reduced, and it has stronger applicability to IoT terminal devices with limited resources such as wearable devices. Through the category of electronic equipment, the method of determining the comparison result between the electronic equipment and the server is determined, which ensures the availability and adaptability of ID card reading and face comparison functions in the case of limited TEE space resources of electronic equipment.
以上,采用TEE安全访问NFC识读用户的待认证身份信息的方式确保获取的身份证信息的数据源真实准确,起到防伪身份证效果,同时可信执行环境TEE防止恶意软件截获身份证信息数据被替换和篡改。另外,本公开实施例是基于电子设备TEE和服务器之间的安全闭环实现的,能够确保信息是密文上送可信身份认证后台解密再以安全TEE安全通道传送回来使用的,适用于更多的身份认证场景。In the above, using TEE to securely access NFC to read the user's identity information to be authenticated ensures that the data source of the acquired identity card information is true and accurate, and has the effect of anti-counterfeiting identity cards. At the same time, the trusted execution environment TEE prevents malware from intercepting identity card information data. replaced and tampered with. In addition, the embodiments of the present disclosure are implemented based on the security closed loop between the electronic device TEE and the server, which can ensure that the information is sent to the trusted identity authentication background decrypted in ciphertext and then transmitted back through the secure TEE secure channel for use, which is applicable to more authentication scenarios.
基于上述信息处理架构和应用场景,下面结合图5对本公开实施例提供的信息处理方法进行详细说明。Based on the above-mentioned information processing architecture and application scenario, the information processing method provided by the embodiment of the present disclosure will be described in detail below with reference to FIG. 5 .
图5是根据本公开第一方面的信息处理方法的实施例的信息处理方法的流程示意图。5 is a schematic flowchart of an information processing method according to an embodiment of the information processing method of the first aspect of the present disclosure.
如图5所示,该信息处理方法可以应用于如图1所示的电子设备,该信息处理方法具体可以包括如下步骤。As shown in FIG. 5 , the information processing method may be applied to the electronic device shown in FIG. 1 , and the information processing method may specifically include the following steps.
首先,步骤510,接收对用户身份认证的第一输入。接着,步骤520,响应于第一输入,在可信执行环境下,通过近场通信获取用户的待认证身份信息。再者,步骤530,根据用户的待认证身份信息,确定用于表征用户身份的目标信息,目标信息包括用户的第一生物特征信息,以及在预设时间段内获取拍摄的用户图像,用户图像包括用户的第二生物特征信息。然后,步骤540,基于第一生物特征信息与第二生物特征信息的对 比结果,确定待认证身份信息的用户身份认证结果。First, in step 510, a first input for user identity authentication is received. Next, in step 520, in response to the first input, in a trusted execution environment, acquire the user's identity information to be authenticated through near field communication. Furthermore, in step 530, according to the user's identity information to be authenticated, determine the target information used to represent the user's identity, the target information includes the user's first biometric information, and the user image obtained within a preset time period, the user image Include second biometric information of the user. Then, in step 540, based on the comparison result of the first biometric information and the second biometric information, determine the user identity authentication result of the identity information to be authenticated.
由此,通过在可信执行环境TEE和近场通信NFC获取用户的待认证身份信息的方式,来获取可信任的用于表征用户身份的目标信息如身份证件信息,以避免伪造身份证件的问题,同时也避免了因拍照效果不佳或者拍摄硬件不足造成获取到的目标信息不准确,从而导致用户身份认证结果不正确的问题。Therefore, by obtaining the user's identity information to be authenticated in the trusted execution environment TEE and near field communication NFC, the trusted target information for characterizing the user's identity, such as identity document information, can be obtained to avoid the problem of forging identity documents. At the same time, it also avoids the problem that the obtained target information is inaccurate due to poor photographing effect or insufficient photographing hardware, resulting in incorrect user identity authentication results.
另外,通过在可信执行环境TEE中获取目标信息和对比目标信息中的第一生物特征信息和拍摄的用户图像中的第二生物特征信息,有效防止恶意软件截获身份证件信息被替换和篡改的问题,同时,通过可信执行环境TEE安全访问电子设备的摄像头,确保用于对比认证的用户图像的准确性,防止注入伪造人脸面部图像或视频的行为。In addition, by acquiring target information and comparing the first biometric information in the target information with the second biometric information in the captured user image in the trusted execution environment TEE, malware can effectively prevent malicious software from intercepting and tampering with identity document information. At the same time, secure access to the cameras of electronic devices through the Trusted Execution Environment (TEE) ensures the accuracy of user images used for comparison authentication and prevents the injection of fake facial images or videos.
基于此,下面对上述步骤进行详细说明,具体如下所示:Based on this, the above steps are described in detail below, as follows:
首先,涉及步骤320,本公开实施例提供了以下至少两种方式,获取身份证件的用户的待认证身份信息,具体如下所示。First, involving step 320, the embodiment of the present disclosure provides the following at least two ways to obtain the to-be-authenticated identity information of the user of the identity certificate, as shown in detail below.
在一些可能的实施例中,步骤320具体可以包括:In some possible embodiments, step 320 may specifically include:
响应于第一输入,In response to the first input,
在数据交互环境满足预设交互环境、且在可信执行环境下,通过近场通信读取近场通信芯片,获取近场通信芯片的标签内容和用户身份标识;When the data interaction environment satisfies the preset interaction environment and in the trusted execution environment, read the near field communication chip through near field communication, and obtain the label content and user identity of the near field communication chip;
基于标签内容和用户身份标识,生成用户的待认证身份信息。Based on the content of the label and the user identity, the identity information to be authenticated of the user is generated.
进一步地,在通过近场通信读取近场通信芯片,获取近场通信芯片的标签内容和用户身份标识的步骤之前,该信息处理方法还包括:Further, before the step of reading the near field communication chip through near field communication to obtain the label content and user identity of the near field communication chip, the information processing method further includes:
检测与近场通信芯片的数据交互环境,数据交互环境包括电子设备与近场通信芯片的距离值和在预设距离内电子设备与近场通信芯片的接触时长;Detecting the data interaction environment with the near field communication chip, the data interaction environment includes the distance value between the electronic device and the near field communication chip and the contact time between the electronic device and the near field communication chip within the preset distance;
在距离值满足预设距离值和/或接触市场满足预设接触时长时,确定数据交互环境满足预设交互环境。When the distance value satisfies the preset distance value and/or the contact with the market satisfies the preset contact duration, it is determined that the data interaction environment satisfies the preset interaction environment.
在另一些可能的实施例中,响应于第一输入,在可信执行环境下,确定目标近场通信芯片,近场通信芯片与电子设备的数据交互环境满足预设近场通讯环境;In some other possible embodiments, in response to the first input, in a trusted execution environment, a target near field communication chip is determined, and the data interaction environment between the near field communication chip and the electronic device satisfies a preset near field communication environment;
通过近场通信芯片与应用协议数据的预设对应关系,获取与目标近场通信芯片对应的目标应用协议数据;Obtain the target application protocol data corresponding to the target near field communication chip through the preset correspondence between the near field communication chip and the application protocol data;
根据目标应用协议数据,获取用户的待认证身份信息。Obtain the user's identity information to be authenticated according to the target application protocol data.
这里,为了保证用户的信息安全,本公开实施例提供了根据近场通信芯片与应用协议数据的预设对应关系,获取与目标近场通信芯片对应的目标应用协议数据。例如,若近场通信芯片为身份证件,且预设对应关系中表示该电子设备可以访问该身份证件图像中用户面部图像,则电子设备可以获取该身份证件图像中用户面部图像。同理,若预设对应关系中表示该电子设备可以访问身份证件号码、身份证件图像和身份证件用户身份信息,则电子设备可以获取身份证件号码、身份证件图像和身份证件用户身份信息,由此,可以根据用户的前期设定,获取其信息。Here, in order to ensure the user's information security, the embodiment of the present disclosure provides that the target application protocol data corresponding to the target near field communication chip is acquired according to the preset correspondence between the near field communication chip and the application protocol data. For example, if the near field communication chip is an identity document, and the preset correspondence indicates that the electronic device can access the user's face image in the identity document image, the electronic device can obtain the user's face image in the identity document image. Similarly, if the preset correspondence indicates that the electronic device can access the ID number, ID image, and ID user identity information, the electronic device can obtain the ID number, ID image, and ID user ID information. , you can obtain its information according to the user's previous settings.
另外,本公开实施例中的近场通信芯片与应用协议数据的预设对应关系,可以通过如下步骤确定,即在通过近场通信芯片与应用协议数据的预设对应关系,获取与目标近场通信芯片对应的目标应用协议数据的步骤之前,本公开实施例提供的信息处理方法还包括:In addition, the preset corresponding relationship between the near field communication chip and the application protocol data in the embodiment of the present disclosure can be determined by the following steps, that is, obtaining the near field corresponding to the target through the preset corresponding relationship between the near field communication chip and the application protocol data Before the step of the target application protocol data corresponding to the communication chip, the information processing method provided by the embodiment of the present disclosure further includes:
向服务器发送权限请求,权限请求包括电子设备的身份信息,权限请求用于获取近场通信芯片的权限;Send a permission request to the server, the permission request includes the identity information of the electronic device, and the permission request is used to obtain the permission of the near field communication chip;
接收服务器发送的权限反馈信息,该权限反馈信息包括该电子设备与近场通信芯片进行通讯的权限;Receive permission feedback information sent by the server, where the permission feedback information includes the permission for the electronic device to communicate with the near field communication chip;
根据权限反馈信息和用户的预先设定,得到近场通信芯片与应用协议数据的预设对应关系。According to the permission feedback information and the user's preset, the preset correspondence between the near field communication chip and the application protocol data is obtained.
接着,涉及步骤330,该步骤可以分为两个部分,即一部分为确定用于表征用户身份的目标信息,另一部分为获取拍摄的用户图像。基于此,分别对两个部分进行说明。Next, step 330 is involved, and this step can be divided into two parts, that is, one part is determining target information used to characterize the user's identity, and the other part is acquiring a photographed image of the user. Based on this, two parts will be explained separately.
首先,本公开实施例中确定目标信息的过程如下所示,即根据用户的待认证身份信息,确定用于表征用户身份的目标信息,包括:First, the process of determining the target information in the embodiment of the present disclosure is as follows, that is, according to the user's identity information to be authenticated, the target information used to characterize the user's identity is determined, including:
步骤3301,根据待认证的身份信息,确定待认证的身份信息的身份信息明文数据。Step 3301: Determine the identity information plaintext data of the identity information to be authenticated according to the identity information to be authenticated.
进一步地,该步骤3301具体可以包括:Further, this step 3301 may specifically include:
步骤33011,向服务器发送身份认证请求,身份认证请求包括待认证的身份信息,身份认证请求用于请求服务器对待认证的身份信息进行解析,以得到待认证的身份信息的身份信息明文数据;Step 33011: Send an identity authentication request to the server, the identity authentication request includes the identity information to be authenticated, and the identity authentication request is used to request the server to parse the identity information to be authenticated to obtain the identity information plaintext data of the identity information to be authenticated;
步骤33012,接收服务器发送的身份认证反馈信息,身份认证反馈信息包括待认证的身份信息的身份信息明文数据。Step 33012: Receive the identity authentication feedback information sent by the server, where the identity authentication feedback information includes the identity information plaintext data of the identity information to be authenticated.
步骤3302,根据身份信息明文数据和目标信息数据解密授权凭证,确定第一生物特征信息。Step 3302: Decrypt the authorization certificate according to the plaintext data of the identity information and the target information data to determine the first biometric information.
这里,可以根据下述步骤,确定目标信息数据解密授权凭证,具体可以包括步骤33021-步骤33023。Here, the target information data decryption authorization credential can be determined according to the following steps, which may specifically include steps 33021-33023.
步骤33021,根据电子设备中的数字证书,生成设备公私密钥对。Step 33021: Generate a device public-private key pair according to the digital certificate in the electronic device.
步骤33022,通过可信身份认证初始化接口向服务器发送用户身份认证初始化请求,用户身份认证初始化请求包括设备公私密钥对,用户身份认证初始化请求用于与服务器建立安全通信链接,并通过安全通信链接进行密钥交换。Step 33022, send a user identity authentication initialization request to the server through the trusted identity authentication initialization interface, the user identity authentication initialization request includes the device public and private key pair, and the user identity authentication initialization request is used to establish a secure communication link with the server, and through the secure communication link Perform key exchange.
其中,可以基于预存的服务器公钥,获取与服务器对应的可信身份认证初始化接口。The trusted identity authentication initialization interface corresponding to the server may be obtained based on the pre-stored server public key.
步骤33023,接收服务器的用户身份认证初始化反馈信息,用户身份认证初始化反馈信息包括目标信息数据解密授权凭证。Step 33023: Receive the user identity authentication initialization feedback information from the server, where the user identity authentication initialization feedback information includes the target information data decryption authorization certificate.
需要说明的是,用户身份认证初始化请求还包括应用程序信息,应用程序信息包括下述中的至少一种:应用程序标识、签名证书信息和证书指纹信息,应用程序信息用于确定待认证身份信息的用户身份认证结果的执行环境。It should be noted that the user identity authentication initialization request also includes application program information, and the application program information includes at least one of the following: application program identification, signature certificate information, and certificate fingerprint information, and the application program information is used to determine the identity information to be authenticated. The execution environment of the user authentication result.
由此,基于上述涉及的可能,本公开实施例中的步骤3302具体可以包括:向服务器发送生物特征信息请求,生物特征信息请求包括身份信息明文数据和目标信息数据解密授权凭证,生物特征信息请求用于请求服务器基于身份信息明文数据和目标信息数据解密授权凭证,确定第一生物特征信息;Therefore, based on the possibility involved in the above, step 3302 in this embodiment of the present disclosure may specifically include: sending a biometric information request to the server, where the biometric information request includes the identity information plaintext data and the target information data decryption authorization credential, and the biometric information request It is used to request the server to decrypt the authorization certificate based on the plaintext data of the identity information and the target information data, and determine the first biometric information;
接收服务器发送的生物特征反馈信息,生物特征反馈信息包括被设备公钥加密的第一生物特征信息。The biometric feedback information sent by the server is received, where the biometric feedback information includes the first biometric information encrypted by the public key of the device.
需要说明的是,本公开实施例中考虑到有一些资源严重受限的物联网电子设备无法进行确定目标信息和对比结果。这样,可以在执行向服务器发送身份认证请求步骤之前,方法还包括:It should be noted that, in the embodiments of the present disclosure, it is considered that some IoT electronic devices with severely limited resources cannot determine target information and compare results. In this way, before executing the step of sending the identity authentication request to the server, the method further includes:
向服务器发送电子设备的身份标识,电子设备的电子标识用于确定电子设备是否满足身份认证的条件;Send the identity of the electronic device to the server, and the electronic identity of the electronic device is used to determine whether the electronic device meets the conditions for identity authentication;
接收服务器发送的身份标识反馈信息;Receive the identity feedback information sent by the server;
在身份标识反馈信息表征电子设备未满足身份认证的条件下,向服务器发送身份认证请求。The identity authentication request is sent to the server under the condition that the identity identification feedback information indicates that the electronic device does not meet the identity authentication condition.
另外,本公开实施例除了上述基于用户的待认证身份信息读取和解析外,还有一个关键就是要将所解析出来的第一生物特征信息如身份证件图像中用户面部图像与身份证持有人的用户图像中的第二生物特征信息进行用户图像比对。在这一过程中,有一个关键问题亟待解决,那就是用户当前的面部信息与原先身份证件采集时的照片存在差异,这其中可能有时间因素也有当初人脸采集设备精度不高甚至是用户面部受过伤害等各种问题。故此,需要对所解析身份证件图像中用户面部图像及持有人的用户图像中的面部信息进下优化。In addition, in addition to the above-mentioned reading and parsing of the user-based identity information to be authenticated, the embodiment of the present disclosure also has a key point in that the parsed first biometric information, such as the user's face image in the identity document image and the identity card holder The second biometric information in the user image of the person is compared to the user image. In this process, there is a key problem that needs to be solved urgently, that is, there is a difference between the user's current facial information and the original photo when the ID document was collected. There may be time factors and the original face collection equipment is not high accuracy or even the user's face. Injuries, etc. Therefore, it is necessary to optimize the facial information of the user's face image in the parsed ID document image and the user's user image of the holder.
针对于此,本公开实施例中除了按照图像去模糊对比方法外,还提出了一种对图片清晰度不敏感的特征模型即目标身份证件人像特征模型用于优化人脸对比的错误拒绝率(false reject rate,FRR)。In response to this, in addition to the image deblurring and contrast method, the embodiment of the present disclosure also proposes a feature model that is insensitive to the clarity of the image, that is, the target ID document portrait feature model, which is used to optimize the false rejection rate of face comparison ( false reject rate, FRR).
基于此,涉及该步骤330中的另一部分即获取用户图像的过程具体包括步骤3311-步骤3303。Based on this, another part of the step 330, that is, the process of acquiring the user image specifically includes steps 3311-3303.
步骤3311,显示固定人像位置区域,固定人像位置区域用于获取用户与固定人像位置区域对应的人体部位图像。Step 3311: Display the fixed portrait position area, and the fixed portrait position area is used to obtain the human body part image corresponding to the user and the fixed portrait position area.
举例说明,如图6所示,通过固定人像位置区域获取人体部位图像。这里,传统的人脸识别处理中,会选择较多的人脸特征点进行检测,同时也消耗了较多的性能资源。由于TEE资源有限,本公开实施例提出在电子设备人像采集界面使用固定人像位置,在人像采集界面勾画固定人像位置区域以匹配人脸最佳位置,同时舍弃一些人脸旋转对齐的特殊处理,以便快速定位人脸在图像中的位置,提高人脸特征点的定位精度。截取到人脸 区域后,选择人脸特征明显的特征点进行检测,如双眼、鼻子、颧骨、嘴巴、下巴、额头特征点进行检测,以便降低人脸对比的FRR,使得TEE环境能够满足人脸旋转对齐等方面处理的性能消耗。For example, as shown in FIG. 6 , the image of the human body part is acquired by fixing the position area of the portrait. Here, in the traditional face recognition processing, more face feature points are selected for detection, which also consumes more performance resources. Due to limited TEE resources, the embodiments of the present disclosure propose to use a fixed portrait position on the portrait capture interface of the electronic device, delineate the fixed portrait position area on the portrait capture interface to match the best position of the face, and at the same time discard some special processing of face rotation and alignment, so as to Quickly locate the position of the face in the image and improve the positioning accuracy of the facial feature points. After intercepting the face area, select the feature points with obvious face features for detection, such as the eyes, nose, cheekbones, mouth, chin, and forehead feature points for detection, in order to reduce the FRR of face contrast, so that the TEE environment can meet the needs of people. The performance consumption of face rotation and alignment processing.
步骤3312,在接收到用户拍摄图像的第二输入时,获取待处理的人体部位图像。Step 3312: When receiving the second input of the image captured by the user, acquire the image of the human body part to be processed.
进一步地,通过固定位置区域,从人体部位中的多个特征点筛选目标特征点,根据目标特征点,获取与目标特征点对应的人体部位图像。Further, the target feature points are screened from a plurality of feature points in the human body part through the fixed position area, and the human body part image corresponding to the target feature point is acquired according to the target feature points.
这样,在人像采集界面勾画固定人像位置区域以匹配人脸最佳位置时,可以舍弃一些人脸旋转的特征点,以便快速定位人脸在图像中的位置,提高人脸特征点的定位精度。In this way, when a fixed portrait position area is drawn on the portrait acquisition interface to match the best position of the face, some feature points of face rotation can be discarded, so as to quickly locate the position of the face in the image and improve the positioning accuracy of the face feature points.
步骤3313,对待处理的人体部位图像进行灰度归一化处理,得到用户图像。Step 3313: Perform grayscale normalization on the image of the human body part to be processed to obtain a user image.
进一步地,获取待处理的人体部位图像的第一灰度值,第一灰度值与第一灰度级对应,根据第一灰度级通过灰度拉伸,调整待处理的人体部位图像,得到具有第一灰度级的用户图像。Further, acquiring a first grayscale value of the human body part image to be processed, the first grayscale value corresponds to the first grayscale level, and adjusting the human body part image to be processed by grayscale stretching according to the first grayscale level, A user image with the first gray level is obtained.
这里,可以对拍摄的用户图像中的人脸照片做灰度归一化处理。灰度归一化处理就是对用户图像进行光照补偿处理,以克服光照变化的影响,本公开实施例中可以利用灰度拉伸的方法将原图像中的灰度分布扩展到具有整个灰度级的图像。例如,采集到的图像是8位的灰度图像,应有256个灰度级,但往往由于采集时光照等因素的影响,图像的灰度级集中在一个或者几个灰度级区段,这时可以采用灰度拉伸的方法将图像扩展到256个灰度级。由此,拍摄到的人脸照片完成光照补偿处理、按色阶映射后,照片变得更加明朗鲜明,更有利于图像对比。Here, grayscale normalization processing may be performed on the photograph of the face in the captured user image. The grayscale normalization process is to perform illumination compensation processing on the user image to overcome the influence of illumination changes. In the embodiment of the present disclosure, the grayscale stretching method can be used to expand the grayscale distribution in the original image to have the entire grayscale level. Image. For example, the collected image is an 8-bit grayscale image, and there should be 256 grayscale levels. However, due to the influence of factors such as illumination during acquisition, the grayscale levels of the image are concentrated in one or several grayscale segments. At this time, the grayscale stretching method can be used to expand the image to 256 grayscales. As a result, after the photographed face photo is processed for illumination compensation and mapped according to the color scale, the photo becomes clearer and more vivid, which is more conducive to image contrast.
进一步地,在灰度归一化操作时,根据用户图像的RGB色彩模式进行灰度归一化处理,按照如下两个公式:Further, during the grayscale normalization operation, grayscale normalization processing is performed according to the RGB color mode of the user image, according to the following two formulas:
(1)亮度由公式(1)确定:(1) Brightness is determined by formula (1):
D=R*0.3086+G*0.6094+B*0.0820    (1)D=R*0.3086+G*0.6094+B*0.0820 (1)
其中,D为亮度,R为红色red的色彩通道,G为绿色green的色彩通道,B为蓝色blue的色彩通道。Among them, D is the brightness, R is the red color channel, G is the green color channel, and B is the blue color channel.
(2)色阶映射由公式(2)确定:(2) The color scale mapping is determined by formula (2):
D'=0+(D-255*LOW)/(255*HIGH-255*LOW)*255    (2)D'=0+(D-255*LOW)/(255*HIGH-255*LOW)*255 (2)
其中,D'为色阶,255*LOW和255*HIGH分别是用户图像的原图像直方图中D的最低点和D的最高点。Among them, D' is the color level, and 255*LOW and 255*HIGH are the lowest point of D and the highest point of D in the original image histogram of the user image, respectively.
如图7所示,根据原图像直方图做初步筛选,对像素点的分布明显不正常如主要分布在x轴左边、主要分布在x轴右边、主要分布在一个很窄的区间的图像,直接视为低质量照片,不做后续处理。图像直方图都是灰度图像,x轴是灰度值(一般是0~255),y轴式图像中每一个灰度级对应的像素点的个数。As shown in Figure 7, based on the initial screening of the original image histogram, the distribution of pixels is obviously abnormal, such as images mainly distributed on the left side of the x-axis, mainly distributed on the right side of the x-axis, and mainly distributed in a very narrow interval, directly Treated as a low-quality photo without post-processing. Image histograms are all grayscale images, the x-axis is the grayscale value (usually 0 to 255), and the y-axis is the number of pixels corresponding to each grayscale in the y-axis image.
然后,涉及步骤340,基于步骤330中获取的用户图像,在一些实施例中,在步骤340之前,在第一生物特征信息包括身份证件图像的情况下,通过几何归一化对比身份证件图像和用户图像,得到第一生物特征信息与第二生物特征信息的对比结果。Then, involving step 340, based on the user image obtained in step 330, in some embodiments, before step 340, in the case where the first biometric information includes an image of an identification document, the image of the identification document and the image of the identification document are compared by geometric normalization A user image to obtain a comparison result between the first biometric information and the second biometric information.
这样,针对身份证件上的第一生物特征信息如人像图片像素较小识别度不高的问题,本提案通过采用几何归一化处理和灰度归一化变换的方式对采集到的活体照片进行处理,提升了人脸照片与身份证上图像照片比对的识别率,改善了人脸对比的错误拒绝率(False Reject Rate,FRR)。In this way, in view of the problem that the first biometric information on the ID document, such as the small pixels of the portrait picture, is not highly recognizable, this proposal uses geometric normalization and grayscale normalization to transform the collected living photos. The processing improves the recognition rate of the comparison between the face photo and the image photo on the ID card, and improves the false rejection rate (False Reject Rate, FRR) of the face comparison.
进一步地,该步骤具体可以包括步骤3401-步骤3403。Further, this step may specifically include steps 3401-3403.
步骤3401,识别身份证件图像中的用户面部区域,得到与用户面部区域对应的用户面部图像。Step 3401: Identify the user's face area in the identity document image, and obtain a user's face image corresponding to the user's face area.
步骤3402,对用户面部图像或者用户图像中的面部区域进行等比放大或者缩小,并计算用户图像和用户面部图像的特征值。Step 3402: Perform proportional enlargement or reduction of the user face image or the face area in the user image, and calculate the feature values of the user image and the user face image.
步骤3403,根据至少一个特征值,得到第一生物特征信息与第二生物特征信息的对比结果。Step 3403: Obtain a comparison result between the first biometric information and the second biometric information according to the at least one feature value.
举例说明,使用几何归一化算法对比第一生物特征信息与第二生物特征信息。可信身份服务平台中的人脸认证对比模块对身份证件图像通过定位人脸特征模型找到身份证件图像中用户面部区域,按照几何归一化算法确定用户图像中面部位置,比较两者的特征值,在确定用户图像中面部位置的过程中,使用等比放大和缩小活体人脸照片中人脸的几何图形做对 比。进一步地,几何归一化算法就是指根据对比目标定位结果将身份证件图像中用户面部区域中的用户图像中面部位置变化到同一位置和大小。本公开实施例提供的对比步骤包括:For example, a geometric normalization algorithm is used to compare the first biometric information with the second biometric information. The face authentication and comparison module in the trusted identity service platform finds the user's face area in the ID document image by locating the face feature model for the ID document image, determines the face position in the user image according to the geometric normalization algorithm, and compares the feature values of the two , in the process of determining the face position in the user image, the geometric figures of the face in the live face photo are compared using proportional enlargement and reduction. Further, the geometric normalization algorithm refers to changing the face position in the user image in the user face region in the ID document image to the same position and size according to the comparison target positioning result. The comparison steps provided by the embodiments of the present disclosure include:
步骤1,通过人脸模型匹配找出身份证件图像中人物的两眼和鼻子所在的区域;Step 1, find out the area where the eyes and nose of the person in the ID document image are located through face model matching;
步骤2,设定两眼之间的距离为D,其中心点为O;Step 2, set the distance between the two eyes as D, and its center point as O;
步骤3,根据人脸面部特点和几何模型确定矩形特征区域,以O为中心原点,两眼直线所在为x轴,两边各裁剪距离d,其中d=D/2,y轴鼻子方向裁剪1.5d,另一方向裁剪0.5d,最后裁剪出一个正方形区域;Step 3: Determine the rectangular feature area according to the facial features and geometric model of the face, take O as the center origin, the two eye lines are the x-axis, and the cutting distance d on both sides, where d=D/2, and the y-axis is cut in the nose direction by 1.5d , crop 0.5d in the other direction, and finally crop out a square area;
步骤4,通过同样的人脸模型匹配找出用户图像中的两眼和鼻子所在的区域;Step 4: Find out the areas where the eyes and nose are located in the user image through the same face model matching;
步骤5,设定用户图像中两眼的距离为D’,其中心点为O’;Step 5, the distance between the two eyes in the user image is set to be D', and its center point is O';
步骤6,根据人脸面部特点和几何模型确定矩形特征区域,以O’为中心原点,两眼直线所在为x轴,两边各裁剪距离d’,其中d’=D’/2,y轴鼻子方向裁剪1.5d’,另一方向裁剪0.5d’,最后裁剪出一个正方形区域;Step 6: Determine the rectangular feature area according to the facial features of the face and the geometric model, take O' as the center origin, the two eye lines are the x-axis, and the clipping distance d' on both sides, where d'=D'/2, y-axis nose Cut 1.5d' in one direction, 0.5d' in the other direction, and finally cut out a square area;
步骤7,通过等比拉伸或缩放的方式如拉伸比例V=D’/D,缩放比例V’=D/D’,使裁剪的身份证件图像和裁剪的用户图像大小一致;Step 7, by means of proportional stretching or scaling such as stretching ratio V=D'/D, scaling ratio V'=D/D', make the size of the cropped ID document image and the cropped user image consistent;
步骤8,提取两张裁剪区域图片的特征值进行对比,根据两者特征值相等指数,转换成相似度作为第一生物特征信息与第二生物特征信息的对比结果。Step 8: Extract the feature values of the two cropped area pictures for comparison, and convert them into similarity as a comparison result between the first biometric information and the second biometric information according to the equal index of the two feature values.
需要说明的是,本公开实施例中涉及的对比图像的过程可以如上述步骤1-步骤8所示,这里,可以通过目标身份证件人像特征模型确定两者的对比结果,即进一步地,将至少一个特征值输入到目标身份证件人像特征模型中,得到第一生物特征信息与第二生物特征信息的对比结果。另外,在一些可能的实施例中,可以确定上述涉及的目标身份证件人像特征模型进行确定,具体过程如下所示,由于身份证件图像照片较小、图像分辨率低,为了提高目标身份证件人像特征模型的比对精度,重点选择人脸特征明显的点,舍弃低分辨率下容易误检的特征点,同时辅以大量的身份证图像样本训练,并在每一次人脸比对得到比对结果后,选择相似度超过N% (N为正数,可以根据应用场景进行自定义配置)的身份证人像特征值参与模型迭代训练,进而确定新的目标身份证件人像特征模型。It should be noted that the process of comparing images involved in the embodiments of the present disclosure may be as shown in the above steps 1 to 8. Here, the comparison result between the two may be determined through the target identity document portrait feature model, that is, further, at least A feature value is input into the portrait feature model of the target ID document, and a comparison result between the first biometric information and the second biometric information is obtained. In addition, in some possible embodiments, the above-mentioned target ID document portrait feature model can be determined, and the specific process is as follows. Since the ID document image photo is small and the image resolution is low, in order to improve the target ID document portrait feature The comparison accuracy of the model focuses on selecting points with obvious facial features, and discarding the feature points that are easy to be misdetected at low resolution. At the same time, it is supplemented by a large number of ID card image samples for training, and the comparison results are obtained in each face comparison. After that, select the ID card portrait feature value with a similarity exceeding N% (N is a positive number, which can be customized according to the application scenario) to participate in the iterative training of the model, and then determine the new target ID card portrait feature model.
基于此,本公开实施例中还提供了一种确定目标身份证件人像特征模型的方式,具体如下所示:Based on this, an embodiment of the present disclosure also provides a method for determining a portrait feature model of a target identity document, which is specifically as follows:
根据目标身份证件中用户面部图像的训练特征值,对预设身份证件人像特征模型进行简化,得到目标身份证件人像特征模型。According to the training feature value of the user's face image in the target ID document, the preset ID document portrait feature model is simplified to obtain the target ID document portrait feature model.
基于步骤340中获取的用户图像,本公开实施例提供了一种确定第一生物特征信息与第二生物特征信息的对比结果的过程,具体如下所示,即在步骤340之前,该信息处理方法还包括:Based on the user image obtained in step 340 , an embodiment of the present disclosure provides a process for determining a comparison result between the first biometric information and the second biometric information, which is specifically as follows, that is, before step 340 , the information processing method Also includes:
通过对称密钥对第一生物特征信息和第二生物特征信息进行加密,得到加密生物特征信息;Encrypting the first biometric information and the second biometric information by using a symmetric key to obtain encrypted biometric information;
向服务器发送身份认证结果请求,身份认证结果请求包括加密生物特征信息,身份认证结果请求用于请求服务器根据第一生物特征信息和第二生物特征信息,计算第一生物特征信息和第二生物特征信息的生物特征对比结果相似度;Send an identity authentication result request to the server, where the identity authentication result request includes encrypted biometric information, and the identity authentication result request is used to request the server to calculate the first biometric information and the second biometric information according to the first biometric information and the second biometric information The similarity of the biometric comparison results of the information;
接收服务器发送的身份认证结果反馈信息,身份认证结果反馈信息包括被设备公钥加密的生物特征对比结果相似度;Receive the identity authentication result feedback information sent by the server, and the identity authentication result feedback information includes the similarity of the biometric comparison result encrypted by the public key of the device;
通过设备私钥加密对生物特征对比结果相似度进行解密,得到生物特征对比结果相似度,生物特征对比结果相似度用于表征第一生物特征信息与第二生物特征信息的对比结果。The similarity of the biometric comparison result is decrypted by encrypting the private key of the device to obtain the similarity of the biometric comparison result, and the similarity of the biometric comparison result is used to represent the comparison result between the first biometric information and the second biometric information.
基于此,该步骤340具体可以包括:在生物特征对比结果相似度满足预设相似度的情况下,确定待认证身份信息的用户身份认证成功。Based on this, step 340 may specifically include: in the case that the similarity of the biometric comparison result meets the preset similarity, determining that the user identity authentication of the identity information to be authenticated is successful.
需要说明的是,本公开实施例中的目标信息还包括下述中的至少一项:身份证件号码、身份证件图像、身份证件用户身份信息如身份证件中的用户姓名、性别、民族、出生日期、住址。第一生物特征信息包括下述中的至少一项:身份证件图像中用户面部图像、与身份证件对应的用户的虹膜图像。It should be noted that the target information in the embodiments of the present disclosure also includes at least one of the following: ID number, ID image, ID user identity information, such as the user's name, gender, ethnicity, and date of birth in the ID. ,address. The first biometric information includes at least one of the following: an image of the user's face in the identity document image, and an iris image of the user corresponding to the identity document.
由此,本公开实施例提出一种基于TEE和NFC的可信身份认证的信息处理方法,可以通过TEE安全访问NFC进行身份证件的待认证的身份 信息识读的方式以获取可靠可信的用于表征用户身份的目标信息,以及在一些实施例中可以在可信执行环境TEE中与服务器中运行可信身份服务平台进行交互,以避免伪造身份证的问题,同时也避免了因拍照效果不佳造成获取到的目标信息不准确,提高身份认证的准确性。通过将待认证的身份信息对应的目标信息数据解密授权凭证迁移至TEE中,杜绝了待认证的身份信息在电子设备和服务器交互过程中可能被木马病毒窃取的问题。另外,通过从TEE内安全访问摄像头,确保用于对比认证的用户图像即实时的用户图像的源头可信,防止注入伪造人脸照片或视频的行为。Therefore, an embodiment of the present disclosure proposes an information processing method for trusted identity authentication based on TEE and NFC, which can securely access NFC through the TEE to read the identity information to be authenticated of the identity document to obtain reliable and trusted identity information. Target information representing the user's identity, and in some embodiments, can interact with the trusted identity service platform running in the server in the trusted execution environment TEE, so as to avoid the problem of forgery of ID cards, and also avoid the problem of ineffective photographing. This will result in inaccurate target information obtained and improve the accuracy of identity authentication. By migrating the target information data decryption authorization certificate corresponding to the identity information to be authenticated into the TEE, the problem that the identity information to be authenticated may be stolen by the Trojan virus during the interaction between the electronic device and the server is eliminated. In addition, by securely accessing the camera from within the TEE, the source of the user image used for comparison and authentication, that is, the real-time user image, can be trusted, preventing the injection of fake face photos or videos.
另外,针对一些支持TEE和NFC的物联网电子设备硬件资源严重受限的问题,本公开实施例利用第四代移动通信技术(the 4th generation mobile communication technology,4G)、第五代移动通信技术(5th generation mobile networks,5G)传输速率更高时延更低的特性,将NFC与二代身份证交互的命令进行了拆分,通过近场通信获取用户的待认证身份信息的部分在电子设备实现,主要处理身份证件APDU请求响应和交互协议,后端部分移至服务器运行,主要负责身份证件访问APDU指令的生成、组装和APDU响应的处理。通过上述前后端分离处理的方式,减少了电子设备的NFC交互协议的空间占比,对于可穿戴设备等资源比较有限的物联网终端设备,具有更强的适用性。通过电子设备的类别,确定在电子设备和服务器确定对比结果方式,保证了身份证识读和人脸比对功能在电子设备TEE空间资源有限的情况下的可用性和适配性。In addition, in view of the problem that the hardware resources of some IoT electronic devices supporting TEE and NFC are severely limited, the embodiments of the present disclosure utilize the 4th generation mobile communication technology (4G), the fifth generation mobile communication technology ( 5th generation mobile networks, 5G) has the characteristics of higher transmission rate and lower delay, splitting the commands for interaction between NFC and the second-generation ID card, and obtaining the user's identity information to be authenticated through near field communication. , mainly deals with ID document APDU request response and interactive protocol, the back-end part is moved to the server to run, mainly responsible for the generation and assembly of ID document access APDU instructions and the processing of APDU response. Through the above-mentioned front-end and back-end separation processing method, the space ratio of the NFC interaction protocol of electronic devices is reduced, and it has stronger applicability to IoT terminal devices with limited resources such as wearable devices. Through the category of electronic equipment, the method of determining the comparison result between the electronic equipment and the server is determined, which ensures the availability and adaptability of ID card reading and face comparison functions in the case of limited TEE space resources of electronic equipment.
以上,采用TEE安全访问NFC识读用户的待认证身份信息的方式确保获取的身份证信息的数据源真实准确,起到防伪身份证效果,同时可信执行环境TEE防止恶意软件截获身份证信息数据被替换和篡改。另外,本公开实施例是基于电子设备TEE和服务器之间的安全闭环实现的,能够确保信息是密文上送可信身份认证后台解密再以安全TEE安全通道传送回来使用的,适用于更多的身份认证场景。In the above, using TEE to securely access NFC to read the user's identity information to be authenticated ensures that the data source of the acquired identity card information is true and accurate, and has the effect of anti-counterfeiting identity cards. At the same time, the trusted execution environment TEE prevents malware from intercepting identity card information data. replaced and tampered with. In addition, the embodiments of the present disclosure are implemented based on the security closed loop between the electronic device TEE and the server, which can ensure that the information is sent to the trusted identity authentication background decrypted in ciphertext and then transmitted back through the secure TEE secure channel for use, which is applicable to more authentication scenarios.
为了更好的说明上述信息处理方法,本公开实施例结合图1和2所示的架构对信息处理方法进行详细说明。下述示例可以通过图8和图9两个过程对信息处理方法进行说明,其中,图8为本公开实施例提供的可信身 份认证初始化的过程,图9为本公开实施例提供的可信身份认证对比的过程,具体如下所示。In order to better describe the above information processing method, the embodiments of the present disclosure describe the information processing method in detail with reference to the architectures shown in FIGS. 1 and 2 . The following examples can illustrate the information processing method through the two processes of FIG. 8 and FIG. 9 , wherein FIG. 8 is a process of initializing trusted identity authentication provided by an embodiment of the present disclosure, and FIG. 9 is a trusted identity authentication initialization process provided by an embodiment of the present disclosure. The process of identity authentication comparison is as follows.
在第三方应用程序如消费类应用程序时,第三方应用程序需事先集成可信身份认证服务SDK,并在第三方应用程序运行的电子设备上安装可信身份认证服务控件,以及通过该电子设备对应的可信应用管理(TAM)安装可信身份认证服务TA到设备TEE可信执行环境中。随后,还需在可信身份服务平台录入第三方应用程序的的应用程序标识(AppId)、签名证书信息和证书指纹信息。When a third-party application is a consumer application, the third-party application needs to integrate the trusted authentication service SDK in advance, and install the trusted authentication service control on the electronic device running the third-party application, and use the electronic device to install the trusted authentication service control. The corresponding trusted application management (TAM) installs the trusted identity authentication service TA into the device TEE trusted execution environment. Subsequently, the application identification (AppId), signature certificate information and certificate fingerprint information of the third-party application need to be entered in the trusted identity service platform.
如图8所示,该资源处理方法中可信身份认证初始化的过程可以包括步骤801-步骤813,具体如下所示。As shown in FIG. 8 , the process of initializing trusted identity authentication in the resource processing method may include steps 801 to 813, as shown in detail below.
步骤801,电子设备接收用户针对应用程序A发起的可信身份认证初始化的操作。Step 801 , the electronic device receives an operation of initializing trusted identity authentication initiated by a user for application A.
步骤802,应用程序A向集成的可信身份认证服务SDK发起可信身份认证初始化请求,传入交易要素Context上下文。这里,交易要素详见表4。Step 802: Application A initiates a trusted identity authentication initialization request to the integrated trusted identity authentication service SDK, and transmits the transaction element Context. Here, the transaction elements are detailed in Table 4.
步骤803,可信身份认证服务SDK通过Context上下文,获取到应用程序A的AppId、签名证书信息和证书指纹信息,调用可信身份认证服务控件的可信身份认证初始化接口,传入交易要素应用程序A的AppId、签名证书信息和证书指纹信息。Step 803, the trusted identity authentication service SDK obtains the AppId, signature certificate information and certificate fingerprint information of application A through the Context context, calls the trusted identity authentication initialization interface of the trusted identity authentication service control, and passes in the transaction element application program A's AppId, signature certificate information, and certificate fingerprint information.
步骤804,可信身份认证服务控件调用可信身份认证服务TA初始化接口,传入交易要素AppId、签名证书信息和证书指纹信息。Step 804, the trusted identity authentication service control invokes the trusted identity authentication service TA initialization interface, and inputs the transaction element AppId, signature certificate information and certificate fingerprint information.
步骤805,可信身份认证服务TA根据设备根信任证书生成一对设备公私密钥对。Step 805, the trusted identity authentication service TA generates a pair of device public and private key pairs according to the device root trust certificate.
步骤806,可信身份认证服务TA请求可信身份服务平台,传入应用程序A的AppId、签名证书信息和证书指纹信息。Step 806 , the trusted identity authentication service TA requests the trusted identity service platform, and inputs the AppId of the application A, the signature certificate information and the certificate fingerprint information.
步骤807,可信身份认证服务TA中预置了可信身份服务平台的服务器公钥。可信身份认证服务TA通过服务器公钥与可信身份服务平台建立安全链接,使用设备公钥和信身份服务平台的服务器公钥进行会话密钥协商,后续使用协商的会话密钥进行交互。Step 807, the server public key of the trusted identity service platform is preset in the trusted identity authentication service TA. The trusted identity authentication service TA establishes a secure link with the trusted identity service platform through the server public key, uses the device public key and the server public key of the trusted identity service platform for session key negotiation, and subsequently uses the negotiated session key for interaction.
可信身份认证服务TA把应用程序A的AppId、签名证书信息和证书指纹信息使用会话密钥加密,传输到可信身份服务平台。The trusted identity authentication service TA encrypts the AppId, signature certificate information and certificate fingerprint information of application A with the session key, and transmits it to the trusted identity service platform.
步骤808,可信身份服务平台使用会话密钥解密,验证应用程序A的AppId、签名证书信息和证书指纹信息与事先录入在可信身份服务平台中的是否一致,在验证通过时,可以向可信身份认证服务TA返回使用设备公钥加密的身份鉴别平台如共公安部下属机构身份认证服务的目标信息数据解密授权凭证的密文。Step 808, the trusted identity service platform decrypts using the session key, and verifies whether the AppId, signature certificate information and certificate fingerprint information of application A are consistent with those previously entered in the trusted identity service platform. The trusted identity authentication service TA returns the ciphertext of the authorization certificate for decryption of the target information data of the identity authentication platform encrypted by the public key of the device, such as the identity authentication service of the subordinate institutions of the Ministry of Public Security.
步骤809,可信身份认证服务TA收到响应后,验证接收到的目标信息数据解密授权凭证的密文所在报文的有效性。在验证有效的情况下,通过设备私钥解密身份鉴别平台的目标信息数据解密授权凭证的密文,保存身份鉴别平台的目标信息数据解密授权凭证到可信身份认证服务TA中。Step 809 , after receiving the response, the trusted identity authentication service TA verifies the validity of the message containing the ciphertext of the received target information data decryption authorization certificate. In the case of valid verification, decrypt the ciphertext of the authorization certificate for the target information data decryption of the identity authentication platform through the private key of the device, and save the target information data decryption authorization certificate of the identity authentication platform to the trusted identity authentication service TA.
步骤810,可信身份认证服务TA向可信身份认证服务控件返回与可信身份认证初始化的操作对应的操作结果。Step 810, the trusted identity authentication service TA returns an operation result corresponding to the operation of the trusted identity authentication initialization to the trusted identity authentication service control.
步骤811,可信身份认证服务控件向可信身份认证服务SDK返回与可信身份认证初始化的操作对应的操作结果。Step 811, the trusted identity authentication service control returns an operation result corresponding to the trusted identity authentication initialization operation to the trusted identity authentication service SDK.
步骤812,可信身份认证服务SDK向应用程序A返回可信身份认证初始化结果。Step 812, the trusted identity authentication service SDK returns the trusted identity authentication initialization result to application A.
步骤813,应用程序A通过电子设备向用户展示可信身份认证初始化结果。Step 813, the application A displays the trusted identity authentication initialization result to the user through the electronic device.
基于上述完成可信身份认证初始化或者注册后,结合图9,对本公开实施例提供的资源处理方法中可信身份认证对比的过程进行详细说明。Based on the above-mentioned completion of the trusted identity authentication initialization or registration, with reference to FIG. 9 , the process of the trusted identity authentication comparison in the resource processing method provided by the embodiment of the present disclosure will be described in detail.
如图9所示,该资源处理方法中可信身份认证对比的过程以包括步骤901-步骤916,具体如下所示。As shown in FIG. 9 , the trusted identity authentication and comparison process in the resource processing method includes steps 901 to 916 , as shown in detail below.
步骤901,电子设备接收用户针对应用程序A发起的可信身份认证的对比操作。Step 901 , the electronic device receives a comparison operation of the trusted identity authentication initiated by the user with respect to the application A.
步骤902,应用程序A向集成的可信身份认证服务SDK发起可信身份认证对比请求,传入交易要素待认证身份信息UserId如交易要素详见图4。Step 902, the application A initiates a trusted identity authentication comparison request to the integrated trusted identity authentication service SDK, and passes in the transaction element to be authenticated identity information UserId, such as the transaction element, as shown in FIG. 4 .
步骤903,可信身份认证服务SDK调用可信身份认证服务控件认证对 比接口,传入交易要素待认证身份信息UserId。Step 903, the trusted identity authentication service SDK invokes the authentication comparison interface of the trusted identity authentication service control, and inputs the identity information UserId of the transaction element to be authenticated.
步骤904,可信身份认证服务控件调用可信身份认证服务TA认证对比接口。Step 904, the trusted identity authentication service control invokes the trusted identity authentication service TA authentication comparison interface.
步骤905,可信身份认证服务TA访问设备NFC模块,以使电子设备显示刷身份证界面。Step 905 , the trusted identity authentication service TA accesses the NFC module of the device, so that the electronic device displays the ID card swiping interface.
步骤906,电子设备获取近场通信芯片中的待认证身份信息,NFC模块将待认证身份信息响应给可信身份认证服务TA,可信身份认证服务TA把待认证身份信息发送到权威身份认证模块如公安部下属机构身份认证服务平台。Step 906, the electronic device obtains the identity information to be authenticated in the near field communication chip, the NFC module responds the identity information to be authenticated to the trusted identity authentication service TA, and the trusted identity authentication service TA sends the identity information to be authenticated to the authoritative identity authentication module Such as the identity authentication service platform of the subordinate institutions of the Ministry of Public Security.
步骤907,权威身份认证模块处理接收到的待认证身份信息,把处理后的待认证身份信息明文数据返回给可信身份认证服务TA。Step 907: The authoritative identity authentication module processes the received identity information to be authenticated, and returns the processed identity information to be authenticated in plaintext to the trusted identity authentication service TA.
步骤908,可信身份认证服务TA把权威身份认证模块的目标信息数据解密授权凭证和待认证身份信息的信息明文发送到可信身份服务平台。Step 908, the trusted identity authentication service TA sends the target information data decryption authorization certificate of the authoritative identity authentication module and the information plaintext of the identity information to be authenticated to the trusted identity service platform.
步骤909,可信身份服务平台通过权威身份认证模块得到目标信息,目标信息包括身份证件图像中用户面部图像,使用设备公钥加密后,返回给可信身份认证服务TA。Step 909, the trusted identity service platform obtains target information through the authoritative identity authentication module, the target information includes the user's face image in the identity document image, encrypted with the device public key, and returned to the trusted identity authentication service TA.
步骤910,可信身份认证服务TA安全访问电子设备的摄像头获取用户图像。Step 910, the trusted identity authentication service TA securely accesses the camera of the electronic device to obtain the user image.
步骤911,可信身份认证服务TA将身份证件图像中用户面部图像和使用设备私钥解密的用户图像使用对称密钥加密提交给可信身份服务平台。Step 911, the trusted identity authentication service TA submits the user's face image in the identity document image and the user image decrypted using the device private key to the trusted identity service platform using symmetric key encryption.
步骤912,可信身份服务平台使用对称密钥解密得到用户图像中的人脸图像,按照用户图像中的人脸图像和身份证件图像中用户面部图像预处理过程对比两张图像,返回使用设备公钥加密的生物特征对比结果相似度。Step 912, the trusted identity service platform uses the symmetric key to decrypt to obtain the face image in the user image, compares the two images according to the preprocessing process of the face image in the user image and the user face image in the identity document image, and returns to use the device public image. Key-encrypted biometric comparison results similarity.
步骤913,可信身份认证服务TA使用设备私钥解密出生物特征对比结果相似度,返回给可信身份认证服务控件。Step 913, the trusted identity authentication service TA decrypts the biometric comparison result similarity using the device private key, and returns it to the trusted identity authentication service control.
步骤914,可信身份认证服务控件向可信身份认证服务SDK返回生物特征对比结果相似度。Step 914, the trusted identity authentication service control returns the similarity of the biometric comparison result to the trusted identity authentication service SDK.
步骤915,可信身份认证服务SDK向应用程序A返回生物特征对比结果相似度。Step 915, the trusted identity authentication service SDK returns the similarity of the biometric comparison result to the application A.
步骤916,应用程序A向用户显示与生物特征对比结果相似度对应的待认证身份信息的用户身份认证结果。Step 916, the application A displays the user identity authentication result of the identity information to be authenticated corresponding to the similarity of the biometric comparison result to the user.
需要说明的是,基于可信身份认证服务操作的生命周期可以包括可信身份认证服务初始化功能、可信身份认证服务注册功能、可信身份认证功能、可信身份人证对比功能和可信身份认证服务注销功能,其中,可以先进行可信身份认证服务初始化,初始化验证通过,则可以进行可信身份认证注册、可信身份人证对比和可信身份认证注销操作。It should be noted that the life cycle based on the trusted identity authentication service operation may include the trusted identity authentication service initialization function, the trusted identity authentication service registration function, the trusted identity authentication function, the trusted identity witness comparison function, and the trusted identity authentication function. The authentication service logout function, in which the trusted identity authentication service can be initialized first, and if the initialization verification is passed, the trusted identity authentication registration, trusted identity witness comparison and trusted identity authentication logout operations can be performed.
由此,本公开实施例提出一种基于TEE和NFC的可信身份认证的信息处理方法,可以通过TEE安全访问NFC进行身份证件的待认证的身份信息识读的方式以获取可靠可信的用于表征用户身份的目标信息,以及在一些实施例中可以在可信执行环境TEE中与服务器中运行可信身份服务平台进行交互,以避免伪造身份证的问题,同时也避免了因拍照效果不佳造成获取到的目标信息不准确,提高身份认证的准确性。通过将待认证的身份信息对应的目标信息数据解密授权凭证迁移至TEE中,杜绝了待认证的身份信息在电子设备和服务器交互过程中可能被木马病毒窃取的问题。另外,通过从TEE内安全访问摄像头,确保用于对比认证的用户图像即实时的用户图像的源头可信,防止注入伪造人脸照片或视频的行为。Therefore, an embodiment of the present disclosure proposes an information processing method for trusted identity authentication based on TEE and NFC, which can securely access NFC through the TEE to read the identity information to be authenticated of the identity document to obtain reliable and trusted identity information. Target information representing the user's identity, and in some embodiments, can interact with the trusted identity service platform running in the server in the trusted execution environment TEE, so as to avoid the problem of forgery of ID cards, and also avoid the problem of ineffective photographing. This will result in inaccurate target information obtained and improve the accuracy of identity authentication. By migrating the target information data decryption authorization certificate corresponding to the identity information to be authenticated into the TEE, the problem that the identity information to be authenticated may be stolen by the Trojan virus during the interaction between the electronic device and the server is eliminated. In addition, by securely accessing the camera from within the TEE, the source of the user image used for comparison and authentication, that is, the real-time user image, can be trusted, preventing the injection of fake face photos or videos.
另外,针对一些支持TEE和NFC的物联网电子设备硬件资源严重受限的问题,本公开实施例利用第四代移动通信技术(the 4th generation mobile communication technology,4G)、第五代移动通信技术(5th generation mobile networks,5G)传输速率更高时延更低的特性,将NFC与二代身份证交互的命令进行了拆分,其中,通过近场通信获取用户的待认证身份信息的部分在电子设备实现,主要处理身份证件APDU请求响应和交互协议,后端部分移至服务器运行,主要负责身份证件访问APDU指令的生成、组装和APDU响应的处理。通过上述前后端分离处理的方式,减少了电子设备的NFC交互协议的空间占比,对于可穿戴设备等资源比较有限的物联网终端设备,具有更强的适用性。通过电子设备的类别,确定 在电子设备和服务器确定对比结果方式,保证了身份证识读和人脸比对功能在电子设备TEE空间资源有限的情况下的可用性和适配性。In addition, in view of the problem that the hardware resources of some IoT electronic devices supporting TEE and NFC are severely limited, the embodiments of the present disclosure utilize the 4th generation mobile communication technology (4G), the fifth generation mobile communication technology ( 5th generation mobile networks, 5G) has the characteristics of higher transmission rate and lower delay, and splits the commands for interaction between NFC and second-generation ID cards. Among them, the part that obtains the user's identity information to be authenticated through near field communication is electronic The device is implemented, mainly dealing with the identity document APDU request response and interaction protocol, and the back-end part is moved to the server to run, mainly responsible for the generation and assembly of the identity document access APDU command and the processing of the APDU response. Through the above-mentioned front-end and back-end separation processing method, the space ratio of the NFC interaction protocol of electronic devices is reduced, and it has stronger applicability to IoT terminal devices with limited resources such as wearable devices. By determining the type of electronic device, the method of determining the comparison result between the electronic device and the server ensures the availability and adaptability of ID card reading and face comparison functions in the case of limited TEE space resources of electronic devices.
以上,采用TEE安全访问NFC识读用户的待认证身份信息的方式确保获取的身份证信息的数据源真实准确,起到防伪身份证效果,同时可信执行环境TEE防止恶意软件截获身份证信息数据被替换和篡改。另外,本公开实施例是基于电子设备TEE和服务器之间的安全闭环实现的,能够确保信息是密文上送可信身份认证后台解密再以安全TEE安全通道传送回来使用的,适用于更多的身份认证场景。In the above, using TEE to securely access NFC to read the user's identity information to be authenticated ensures that the data source of the acquired identity card information is true and accurate, and has the effect of anti-counterfeiting identity cards. At the same time, the trusted execution environment TEE prevents malware from intercepting identity card information data. replaced and tampered with. In addition, the embodiments of the present disclosure are implemented based on the security closed loop between the electronic device TEE and the server, which can ensure that the information is sent to the trusted identity authentication background decrypted in ciphertext and then transmitted back through the secure TEE secure channel for use, which is applicable to more authentication scenarios.
基于相同的发明构思,本公开还提供了一种信息处理装置。具体结合图10进行详细说明。Based on the same inventive concept, the present disclosure also provides an information processing apparatus. Specifically, detailed description is given with reference to FIG. 10 .
图10是根据本公开提供的基于电子设备的信息处理装置的一个实施例结构示意图。FIG. 10 is a schematic structural diagram of an embodiment of an electronic device-based information processing apparatus provided according to the present disclosure.
在本公开一些实施例中,图10所示装置可以设置于如图1所示的电子设备中。In some embodiments of the present disclosure, the apparatus shown in FIG. 10 may be provided in the electronic device shown in FIG. 1 .
其中,如图10所示,该信息处理装置100具体可以包括:Wherein, as shown in FIG. 10 , the information processing apparatus 100 may specifically include:
接收模块1001,用于接收对用户身份认证的第一输入;a receiving module 1001, configured to receive a first input for user identity authentication;
获取模块1002,用于响应于第一输入,在可信执行环境下,通过近场通信获取用户的待认证身份信息;an obtaining module 1002, configured to obtain the user's identity information to be authenticated through near field communication in a trusted execution environment in response to the first input;
处理模块1003,用于根据用户的待认证身份信息,确定用于表征用户身份的目标信息,目标信息包括用户的第一生物特征信息,以及在预设时间段内获取拍摄的用户图像,用户图像包括用户的第二生物特征信息;The processing module 1003 is configured to determine target information used to characterize the user's identity according to the user's identity information to be authenticated, the target information includes the user's first biometric information, and the user image obtained within a preset time period, the user image include the user's second biometric information;
确定模块1004,用于基于第一生物特征信息与第二生物特征信息的对比结果,确定待认证身份信息的用户身份认证结果。The determining module 1004 is configured to determine the user identity authentication result of the identity information to be authenticated based on the comparison result between the first biometric information and the second biometric information.
由此,通过在可信执行环境TEE和近场通信NFC获取用户的待认证身份信息的方式,来获取可信任的用于表征用户身份的目标信息如身份证件信息,以避免伪造身份证件的问题,同时也避免了因拍照效果不佳或者拍摄硬件不足造成获取到的目标信息不准确,从而导致用户身份认证结果不正确的问题。Therefore, by obtaining the user's identity information to be authenticated in the trusted execution environment TEE and near field communication NFC, the trusted target information for characterizing the user's identity, such as identity document information, can be obtained to avoid the problem of forging identity documents. At the same time, it also avoids the problem that the obtained target information is inaccurate due to poor photographing effect or insufficient photographing hardware, resulting in incorrect user identity authentication results.
另外,通过在可信执行环境TEE中获取目标信息和对比目标信息中的 第一生物特征信息和拍摄的用户图像中的第二生物特征信息,有效防止恶意软件截获身份证件信息被替换和篡改的问题,同时,通过可信执行环境TEE安全访问电子设备的摄像头,确保用于对比认证的用户图像的准确性,防止注入伪造人脸面部照片或视频的行为。In addition, by acquiring target information and comparing the first biometric information in the target information with the second biometric information in the captured user image in the trusted execution environment TEE, malware can effectively prevent malicious software from intercepting and tampering with identity document information. At the same time, secure access to the camera of the electronic device through the Trusted Execution Environment (TEE) ensures the accuracy of the user image used for comparison authentication and prevents the injection of fake facial photos or videos.
下面分别对本公开实施例中信息处理装置100进行详细说明。The information processing apparatus 100 in the embodiments of the present disclosure will be described in detail below.
在本公开一些实施例中,获取模块1002具体可以用于,响应于第一输入,在数据交互环境满足预设交互环境、且在可信执行环境下,通过近场通信读取近场通信芯片,获取近场通信芯片的标签内容和用户身份标识,In some embodiments of the present disclosure, the acquiring module 1002 may be specifically configured to, in response to the first input, read the near field communication chip through near field communication when the data interaction environment satisfies the preset interaction environment and under the trusted execution environment , to obtain the label content and user ID of the near field communication chip,
基于标签内容和用户身份标识,生成用户的待认证身份信息。Based on the content of the label and the user identity, the identity information to be authenticated of the user is generated.
进一步地,信息处理装置100还可以包括检测模块,用于检测与近场通信芯片的数据交互环境,数据交互环境包括电子设备与近场通信芯片的距离值和/或在预设距离内电子设备与近场通信芯片的接触时长,在距离值满足预设距离值和/或接触市场满足预设接触时长时,确定数据交互环境满足预设交互环境。Further, the information processing apparatus 100 may further include a detection module for detecting a data interaction environment with the near field communication chip, where the data interaction environment includes a distance value between the electronic device and the near field communication chip and/or the electronic device within a preset distance For the contact duration with the near field communication chip, when the distance value meets the preset distance value and/or the contact market meets the preset contact duration, it is determined that the data interaction environment meets the preset interaction environment.
另外,获取模块1002具体可以用于,响应于第一输入,在可信执行环境下,确定目标近场通信芯片,近场通信芯片与电子设备的数据交互环境满足预设近场通讯环境,通过近场通信芯片与应用协议数据的预设对应关系,获取与目标近场通信芯片对应的目标应用协议数据,根据目标应用协议数据,获取用户的待认证身份信息。In addition, the acquiring module 1002 can be specifically configured to, in response to the first input, determine the target near field communication chip under the trusted execution environment, and the data interaction environment between the near field communication chip and the electronic device satisfies the preset near field communication environment, and through According to the preset correspondence between the near field communication chip and the application protocol data, the target application protocol data corresponding to the target near field communication chip is obtained, and the user's identity information to be authenticated is obtained according to the target application protocol data.
在本公开一些实施例中,本公开实施例中的处理模块1003具体可以用于,根据待认证的身份信息,确定待认证的身份信息的身份信息明文数据,根据身份信息明文数据和目标信息数据解密授权凭证,确定第一生物特征信息。In some embodiments of the present disclosure, the processing module 1003 in the embodiment of the present disclosure may be specifically configured to, according to the identity information to be authenticated, determine the identity information plaintext data of the identity information to be authenticated, and determine the identity information plaintext data of the identity information to be authenticated according to the identity information plaintext data and the target information data. Decrypt the authorization credential to determine the first biometric information.
进一步地,本公开实施例中信息处理装置100还可以包括发送模块。基于此,发送模块,用于向服务器发送身份认证请求,身份认证请求包括待认证的身份信息,身份认证请求用于请求服务器对待认证的身份信息进行解析,以得到待认证的身份信息的身份信息明文数据。Further, the information processing apparatus 100 in the embodiment of the present disclosure may further include a sending module. Based on this, a sending module is used to send an identity authentication request to the server, where the identity authentication request includes the identity information to be authenticated, and the identity authentication request is used to request the server to parse the identity information to be authenticated to obtain the identity information of the identity information to be authenticated plaintext data.
本公开实施例中的接收模块1001,接收服务器发送的身份认证反馈信 息,身份认证反馈信息包括待认证的身份信息的身份信息明文数据。The receiving module 1001 in the embodiment of the present disclosure receives the identity authentication feedback information sent by the server, and the identity authentication feedback information includes the identity information plaintext data of the identity information to be authenticated.
在一些可能的实施例中,本公开实施例中的发送模块还可以用于,向服务器发送电子设备的身份标识,电子设备的电子标识用于确定电子设备是否满足身份认证的条件。In some possible embodiments, the sending module in the embodiments of the present disclosure may also be configured to send the identity identification of the electronic device to the server, where the electronic identification of the electronic device is used to determine whether the electronic device satisfies the conditions for identity authentication.
本公开实施例中的接收模块1001还用于,接收服务器发送的身份标识反馈信息。The receiving module 1001 in the embodiment of the present disclosure is further configured to receive the identity feedback information sent by the server.
本公开实施例中的发送模块还可以用于,在身份标识反馈信息表征电子设备未满足身份认证的条件下,向服务器发送身份认证请求。The sending module in the embodiment of the present disclosure may also be configured to send an identity authentication request to the server under the condition that the identity identification feedback information indicates that the electronic device does not meet the identity authentication condition.
在一些可能的实施例中,本公开实施例中信息处理装置100还可以包括生成模块,用于根据电子设备中的数字证书,生成设备公私密钥对。基于此,本公开实施例中的发送模块还可以用于,通过可信身份认证初始化接口向服务器发送用户身份认证初始化请求,用户身份认证初始化请求包括设备公私密钥对,用户身份认证初始化请求用于与服务器建立安全通信链接,并通过安全通信链接进行密钥交换。本公开实施例中的接收模块1001还用于,接收服务器的用户身份认证初始化反馈信息,用户身份认证初始化反馈信息包括目标信息数据解密授权凭证。In some possible embodiments, the information processing apparatus 100 in this embodiment of the present disclosure may further include a generating module, configured to generate a device public-private key pair according to the digital certificate in the electronic device. Based on this, the sending module in the embodiment of the present disclosure can also be used to send a user identity authentication initialization request to the server through a trusted identity authentication initialization interface, where the user identity authentication initialization request includes the device public and private key pair, and the user identity authentication initialization request uses It establishes a secure communication link with the server and performs key exchange through the secure communication link. The receiving module 1001 in the embodiment of the present disclosure is further configured to receive the user identity authentication initialization feedback information of the server, where the user identity authentication initialization feedback information includes the target information data decryption authorization certificate.
在一些可能的实施例中,本公开实施例中的获取模块还可以用于,基于服务器公钥,获取与服务器对应的可信身份认证初始化接口。In some possible embodiments, the obtaining module in the embodiments of the present disclosure may also be used to obtain a trusted identity authentication initialization interface corresponding to the server based on the server public key.
本公开实施例中的用户身份认证初始化请求还包括应用程序信息,应用程序信息包括下述中的至少一种:应用程序标识、签名证书信息和证书指纹信息,其中,应用程序信息用于确定待认证身份信息的用户身份认证结果的执行环境。The user identity authentication initialization request in the embodiment of the present disclosure further includes application program information, and the application program information includes at least one of the following: an application program identifier, signature certificate information, and certificate fingerprint information, wherein the application program information is used to determine the pending The execution environment of the user authentication result that authenticates the identity information.
在一些可能的实施例中,本公开实施例中的处理模块1003具体可以用于向服务器发送生物特征信息请求,生物特征信息请求包括身份信息明文数据和目标信息数据解密授权凭证,生物特征信息请求用于请求服务器基于身份信息明文数据和目标信息数据解密授权凭证,确定第一生物特征信息,接收服务器发送的生物特征反馈信息,生物特征反馈信息包括被设备公钥加密的第一生物特征信息。In some possible embodiments, the processing module 1003 in this embodiment of the present disclosure may be specifically configured to send a biometric information request to the server, where the biometric information request includes the identity information plaintext data and the target information data decryption authorization credential, and the biometric information request It is used to request the server to decrypt the authorization certificate based on the plaintext data of the identity information and the target information data, determine the first biometric information, and receive the biometric feedback information sent by the server, where the biometric feedback information includes the first biometric information encrypted by the device public key.
在一些可能的实施例中,本公开实施例中信息处理装置100还可以包 括显示模块,用于显示固定人像位置区域,固定人像位置区域用于获取用户与固定人像位置区域对应的人体部位图像。本公开实施例中的获取模块1002具体可以用于,在接收到用户拍摄图像的第二输入时,通过固定位置区域获取待处理的人体部位图像。本公开实施例中的处理模块1003具体可以用于,对待处理的人体部位图像进行灰度归一化处理,得到用户图像。In some possible embodiments, the information processing apparatus 100 in this embodiment of the present disclosure may further include a display module, configured to display a fixed portrait position area, and the fixed portrait position area is used to obtain a human body part image corresponding to the user and the fixed portrait position area. The acquiring module 1002 in the embodiment of the present disclosure may be specifically configured to acquire the image of the human body part to be processed through the fixed location area when receiving the second input of the captured image by the user. The processing module 1003 in the embodiment of the present disclosure may be specifically configured to perform grayscale normalization processing on the image of the human body part to be processed to obtain a user image.
其中,本公开实施例中的获取模块1002具体可以用于,通过固定位置区域,从人体部位中的多个特征点筛选目标特征点,根据目标特征点,获取与目标特征点对应的人体部位图像。Wherein, the acquisition module 1002 in the embodiment of the present disclosure can be specifically used to select target feature points from a plurality of feature points in a human body part through a fixed location area, and obtain a human body part image corresponding to the target feature point according to the target feature points .
本公开实施例中的处理模块1003具体可以用于,获取待处理的人体部位图像的第一灰度值,第一灰度值与第一灰度级对应,根据第一灰度级通过灰度拉伸,调整待处理的人体部位图像,得到具有第一灰度级的用户图像。The processing module 1003 in this embodiment of the present disclosure can be specifically configured to obtain a first grayscale value of a human body part image to be processed, where the first grayscale value corresponds to the first grayscale level, and according to the first grayscale level Stretch and adjust the image of the human body part to be processed to obtain a user image with a first gray level.
在一些可能的实施例中,本公开实施例中的确定模块1004具体可以用于,在第一生物特征信息包括身份证件图像的情况下,通过几何归一化对比身份证件图像和用户图像,得到第一生物特征信息与第二生物特征信息的对比结果。In some possible embodiments, the determining module 1004 in this embodiment of the present disclosure may be specifically configured to, in the case that the first biometric information includes an image of an ID document, compare the image of the ID document and the user image through geometric normalization, and obtain The comparison result of the first biometric information and the second biometric information.
其中,本公开实施例中的确定模块1004具体可以用于,识别身份证件图像中的用户面部区域,得到与用户面部区域对应的用户面部图像,对用户面部图像或者用户图像中的面部区域进行等比放大或者缩小,并计算用户图像和用户面部图像的特征值,根据至少一个特征值,得到第一生物特征信息与第二生物特征信息的对比结果。The determining module 1004 in the embodiment of the present disclosure can be specifically used to identify the user's face area in the ID document image, obtain the user's face image corresponding to the user's face area, perform the user's face image or the face area in the user image, etc. The ratio is enlarged or reduced, and the feature values of the user image and the user face image are calculated, and a comparison result between the first biometric information and the second biometric information is obtained according to at least one feature value.
进一步地,本公开实施例中的确定模块1004具体可以用于,将至少一个特征值输入到目标身份证件人像特征模型中,得到第一生物特征信息与第二生物特征信息的对比结果。Further, the determining module 1004 in this embodiment of the present disclosure may be specifically configured to input at least one feature value into the target ID document portrait feature model to obtain a comparison result between the first biometric information and the second biometric information.
在一些可能的实施例中,本公开实施例中信息处理装置100还可以包括简化模块,用于根据目标身份证件中用户面部图像的训练特征值,对预设身份证件人像特征模型进行简化,得到目标身份证件人像特征模型。本公开实施例中信息处理装置100还可以包括加密模块,用于通过对称密钥 对第一生物特征信息和第二生物特征信息进行加密,得到加密生物特征信息。In some possible embodiments, the information processing apparatus 100 in this embodiment of the present disclosure may further include a simplification module, configured to simplify the preset identity document portrait feature model according to the training feature values of the user's face image in the target identity document, to obtain The target identity document portrait feature model. In the embodiment of the present disclosure, the information processing apparatus 100 may further include an encryption module configured to encrypt the first biometric information and the second biometric information by using a symmetric key to obtain encrypted biometric information.
本公开实施例中的发送模块还用于,向服务器发送身份认证结果请求,身份认证结果请求包括加密生物特征信息,身份认证结果请求用于请求服务器根据第一生物特征信息和第二生物特征信息,计算第一生物特征信息和第二生物特征信息的生物特征对比结果相似度。The sending module in the embodiment of the present disclosure is further configured to send an identity authentication result request to the server, where the identity authentication result request includes encrypted biometric information, and the identity authentication result request is used to request the server according to the first biometric information and the second biometric information , and calculate the similarity of the biometric comparison results between the first biometric information and the second biometric information.
本公开实施例中的接收模块1001还用于,接收服务器发送的身份认证结果反馈信息,身份认证结果反馈信息包括被设备公钥加密的生物特征对比结果相似度。The receiving module 1001 in the embodiment of the present disclosure is further configured to receive the identity authentication result feedback information sent by the server, where the identity authentication result feedback information includes the similarity of the biometric comparison result encrypted by the public key of the device.
本公开实施例中的处理模块1003还用于,通过设备私钥加密对生物特征对比结果相似度进行解密,得到生物特征对比结果相似度,生物特征对比结果相似度用于表征第一生物特征信息与第二生物特征信息的对比结果。The processing module 1003 in this embodiment of the present disclosure is further configured to decrypt the similarity of the biometric comparison result by encrypting the device private key to obtain the similarity of the biometric comparison result, and the similarity of the biometric comparison result is used to represent the first biometric information Comparison result with the second biometric information.
在一些可能的实施例中,本公开实施例中的确定模块1004具体可以用于,在生物特征对比结果相似度满足预设相似度的情况下,确定待认证身份信息的用户身份认证成功。In some possible embodiments, the determining module 1004 in this embodiment of the present disclosure may be specifically configured to determine that the user identity authentication of the identity information to be authenticated is successful if the similarity of the biometric comparison result meets the preset similarity.
需要说明的是,上述涉及的目标信息还包括下述中的至少一项:身份证件号码、身份证件图像。第一生物特征信息包括下述中的至少一项:身份证件图像中用户面部图像、与身份证件对应的用户的虹膜图像。It should be noted that the target information involved in the above also includes at least one of the following: ID number and ID image. The first biometric information includes at least one of the following: an image of the user's face in the identity document image, and an iris image of the user corresponding to the identity document.
由此,通过在可信执行环境TEE和近场通信NFC获取用户的待认证身份信息的方式,来获取可信任的用于表征用户身份的目标信息如身份证件信息,以避免伪造身份证件的问题,同时也避免了因拍照效果不佳或者拍摄硬件不足造成获取到的目标信息不准确,从而导致用户身份认证结果不正确的问题。Therefore, by obtaining the user's identity information to be authenticated in the trusted execution environment TEE and near field communication NFC, the trusted target information for characterizing the user's identity, such as identity document information, can be obtained to avoid the problem of forging identity documents. At the same time, it also avoids the problem that the obtained target information is inaccurate due to poor photographing effect or insufficient photographing hardware, resulting in incorrect user identity authentication results.
另外,通过在可信执行环境TEE中获取目标信息、对比目标信息中的第一生物特征信息和拍摄的用户图像中的第二生物特征信息,有效防止恶意软件截获身份证件信息被替换和篡改的问题,同时,通过可信执行环境TEE安全访问电子设备的摄像头,确保用于对比认证的用户图像的准确性,防止注入伪造人脸面部照片或视频的行为。In addition, by acquiring target information in the trusted execution environment TEE, comparing the first biometric information in the target information with the second biometric information in the captured user image, it can effectively prevent malware from intercepting the identity document information that has been replaced and tampered with. At the same time, secure access to the camera of the electronic device through the Trusted Execution Environment (TEE) ensures the accuracy of the user image used for comparison authentication and prevents the injection of fake facial photos or videos.
需要说明的是,图10所示的信息处理装置100可以执行图1-图9所示的信息处理方法实施例中的各个步骤,并且实现图1-图9所示的方法实施例中的各个过程和效果,在此不做赘述。It should be noted that, the information processing apparatus 100 shown in FIG. 10 can execute various steps in the information processing method embodiments shown in FIGS. 1-9 , and implement each step in the method embodiments shown in FIGS. 1-9 . The process and effect will not be repeated here.
基于相同的发明构思,本公开还提供了一种基于电子设备如可穿戴式设备、智能门锁等无法承载计算量较大的信息处理设备。具体结合图11进行详细说明。Based on the same inventive concept, the present disclosure also provides an information processing device based on electronic devices such as wearable devices, smart door locks, etc. that cannot carry a large amount of computation. Specifically, detailed description is given with reference to FIG. 11 .
图11是根据本公开提供的基于电子设备的信息处理装置的另一个实施例结构示意图。FIG. 11 is a schematic structural diagram of another embodiment of an electronic device-based information processing apparatus provided according to the present disclosure.
在本公开一些实施例中,图11所示装置可以设置于可穿戴式设备、智能门锁等无法承载计算量较大的信息处理设备中。In some embodiments of the present disclosure, the apparatus shown in FIG. 11 may be set in a wearable device, a smart door lock, or other information processing equipment that cannot carry a large amount of computation.
其中,如图11所示,该信息处理装置1100具体可以包括:Wherein, as shown in FIG. 11 , the information processing apparatus 1100 may specifically include:
接收模块1110,用于接收对用户身份认证的第一输入;a receiving module 1110, configured to receive a first input for user identity authentication;
获取模块1120,用于响应于第一输入,在可信执行环境下,通过近场通信获取用户的待认证身份信息;an obtaining module 1120, configured to, in response to the first input, obtain the user's identity information to be authenticated through near field communication in a trusted execution environment;
发送模块1130,用于向服务器发送用户的待认证身份信息,用户的待认证身份信息用于确定待认证身份信息的用户身份认证结果;The sending module 1130 is configured to send the user's identity information to be authenticated to the server, and the user's identity information to be authenticated is used to determine the user identity authentication result of the identity information to be authenticated;
发送模块1130还用于,在预设时间段内获取用户图像,并向服务器发送用户图像,用户图像用于与用户的待认证身份进行对比,以确定用户身份认证结果;The sending module 1130 is further configured to obtain a user image within a preset time period, and send the user image to the server, where the user image is used to compare with the user's identity to be authenticated to determine the user identity authentication result;
接收模块1110还用于,接收服务器发送的待认证身份信息的用户身份认证结果。The receiving module 1110 is further configured to receive the user identity authentication result of the identity information to be authenticated sent by the server.
此外,本公开实施例提供的获取模块1120具体用于,在可信执行环境下,通过执行协议数据指令集中近场通讯的指令,获取用户的待认证身份信息;其中,近场通讯的指令由服务器确定。In addition, the obtaining module 1120 provided by the embodiment of the present disclosure is specifically configured to obtain the user's identity information to be authenticated by executing the near field communication instruction in the protocol data instruction set in a trusted execution environment; wherein the near field communication instruction is set by Server OK.
基于相同的发明构思,本公开还提供了一种服务器。具体结合图12进行详细说明。Based on the same inventive concept, the present disclosure also provides a server. Specifically, detailed description is given with reference to FIG. 12 .
图12是根据本公开提供的基于服务器的信息处理装置的一个实施例结构示意图。FIG. 12 is a schematic structural diagram of an embodiment of a server-based information processing apparatus provided according to the present disclosure.
在本公开一些实施例中,如图12所示,该信息处理装置1200具体可 以包括:In some embodiments of the present disclosure, as shown in FIG. 12 , the information processing apparatus 1200 may specifically include:
接收模块1210,用于接收电子设备发送的用户的待认证身份信息;A receiving module 1210, configured to receive the identity information to be authenticated of the user sent by the electronic device;
获取模块1220,用于在检测到用户的待认证身份信息用于确定待认证身份信息的用户身份认证结果时,获取与用户的待认证身份信息对应且用于表征用户身份的目标信息,目标信息包括用户的第一生物特征信息;The obtaining module 1220 is configured to obtain target information corresponding to the user's to-be-authenticated identity information and used to characterize the user's identity when it is detected that the user's to-be-authenticated identity information is used to determine the user's identity authentication result of the to-be-authenticated identity information, the target information including the user's first biometric information;
接收模块1210还用于,接收电子设备发送的用户图像;The receiving module 1210 is further configured to receive the user image sent by the electronic device;
确定模块1230,用于基于第一生物特征信息与用户图像中的第二生物特征信息的对比结果,确定待认证身份信息的用户身份认证结果;A determination module 1230, configured to determine the user identity authentication result of the identity information to be authenticated based on the comparison result between the first biometric information and the second biometric information in the user image;
发送模块1240还用于,向电子设备发送用户身份认证结果。The sending module 1240 is further configured to send the user identity authentication result to the electronic device.
其中,本公开实施例中的获取模块1220具体用于,根据待认证身份信息的密文信息,确定协议数据指令,协议数据指令用于指示按照身份证件属性格式拼接组装成的用于表征用户身份的目标信息的原文字符串,根据预存的目标信息数据解密授权凭证和目标信息的原文字符串,对待认证的身份信息进行解密,得到目标信息。Among them, the obtaining module 1220 in the embodiment of the present disclosure is specifically used to determine a protocol data instruction according to the ciphertext information of the identity information to be authenticated, and the protocol data instruction is used to indicate that the user identity is represented by splicing and assembling according to the attribute format of the identity document. The original character string of the target information is decrypted according to the pre-stored target information data and the original character string of the authorization certificate and the target information, and the identity information to be authenticated is decrypted to obtain the target information.
进一步地,发送模块1230还可以用于,向身份鉴别服务器发送协议数据指令,协议数据指令用于指示身份鉴别服务器按照身份证件属性格式拼接组装成的用于表征用户身份的目标信息的原文字符串。基于此,接收模块1210还可以用于,接收身份鉴别服务器发送的目标信息的原文字符串。Further, the sending module 1230 can also be used to send a protocol data instruction to the identity authentication server, where the protocol data instruction is used to instruct the identity authentication server to spliced and assembled according to the identity document attribute format and is used to characterize the original character string of the target information of the user identity. . Based on this, the receiving module 1210 may also be configured to receive the original character string of the target information sent by the identity authentication server.
基于相同的发明构思,本公开还提供了一种信息处理设备。具体结合图13进行详细说明。Based on the same inventive concept, the present disclosure also provides an information processing device. Specifically, detailed description is given with reference to FIG. 13 .
图13示出了本公开实施例提供的信息处理设备的硬件结构示意图。FIG. 13 shows a schematic diagram of a hardware structure of an information processing device provided by an embodiment of the present disclosure.
如图13所示,该信息处理1300可以包括本公开实施例中涉及的电子设备或者服务器。信息处理1300可以包括处理器1301和存储有计算机程序指令的存储器1302。As shown in FIG. 13 , the information processing 1300 may include an electronic device or a server involved in the embodiments of the present disclosure. Information processing 1300 may include a processor 1301 and a memory 1302 storing computer program instructions.
具体地,上述处理器1301可以包括中央处理器(CPU),或者特定集成电路(Application Specific Integrated Circuit,ASIC),或者可以被配置成实施本公开实施例的一个或多个集成电路。Specifically, the above-mentioned processor 1301 may include a central processing unit (CPU), or a specific integrated circuit (Application Specific Integrated Circuit, ASIC), or may be configured to implement one or more integrated circuits of the embodiments of the present disclosure.
存储器1302可以包括用于数据或指令的大容量存储器。举例来说而 非限制,存储器1302可包括硬盘驱动器(Hard Disk Drive,HDD)、软盘驱动器、闪存、光盘、磁光盘、磁带或通用串行总线(Universal Serial Bus,USB)驱动器或者两个或更多个以上这些的组合。在合适的情况下,存储器1302可包括可移除或不可移除(或固定)的介质。在合适的情况下,存储器1302可在综合网关容灾设备的内部或外部。在特定实施例中,存储器1302是非易失性固态存储器。在特定实施例中,存储器1302包括只读存储器(ROM)。在合适的情况下,该ROM可以是掩模编程的ROM、可编程ROM(PROM)、可擦除PROM(EPROM)、电可擦除PROM(EEPROM)、电可改写ROM(EAROM)或闪存或者两个或更多个以上这些的组合。 Memory 1302 may include mass storage for data or instructions. By way of example and not limitation, memory 1302 may include a Hard Disk Drive (HDD), a floppy disk drive, a flash memory, an optical disk, a magneto-optical disk, a magnetic tape, or a Universal Serial Bus (USB) drive or two or more A combination of more than one of the above. Memory 1302 may include removable or non-removable (or fixed) media, where appropriate. Storage 1302 may be internal or external to the integrated gateway disaster recovery device, where appropriate. In certain embodiments, memory 1302 is non-volatile solid state memory. In certain embodiments, memory 1302 includes read only memory (ROM). Where appropriate, the ROM may be a mask programmed ROM, programmable ROM (PROM), erasable PROM (EPROM), electrically erasable PROM (EEPROM), electrically rewritable ROM (EAROM) or flash memory or A combination of two or more of the above.
处理器1301通过读取并执行存储器1302中存储的计算机程序指令,以实现上述实施例中的任意一种信息处理方法。The processor 1301 reads and executes the computer program instructions stored in the memory 1302 to implement any one of the information processing methods in the foregoing embodiments.
在一个示例中,数据处理设备还可包括通信接口1303和总线1310。其中,如图13所示,处理器1301、存储器1302、通信接口1303通过总线1310连接并完成相互间的通信。In one example, the data processing device may also include a communication interface 1303 and a bus 1310 . Among them, as shown in FIG. 13 , the processor 1301 , the memory 1302 , and the communication interface 1303 are connected through the bus 1310 and complete the mutual communication.
通信接口1303,主要用于实现本公开实施例中各模块、装置、单元和/或设备之间的通信。The communication interface 1303 is mainly used to implement communication between modules, apparatuses, units and/or devices in the embodiments of the present disclosure.
总线1310包括硬件、软件或两者,将流量控制设备的部件彼此耦接在一起。举例来说而非限制,总线可包括加速图形端口(AGP)或其他图形总线、增强工业标准架构(EISA)总线、前端总线(FSB)、超传输(HT)互连、工业标准架构(ISA)总线、无限带宽互连、低引脚数(LPC)总线、存储器总线、微信道架构(MCA)总线、外围组件互连(PCI)总线、PCI-Express(PCI-X)总线、串行高级技术附件(SATA)总线、视频电子标准协会局部(VLB)总线或其他合适的总线或者两个或更多个以上这些的组合。在合适的情况下,总线1310可包括一个或多个总线。尽管本公开实施例描述和示出了特定的总线,但本公开考虑任何合适的总线或互连。The bus 1310 includes hardware, software, or both, coupling the components of the flow control device to each other. By way of example and not limitation, the bus may include Accelerated Graphics Port (AGP) or other graphics bus, Enhanced Industry Standard Architecture (EISA) bus, Front Side Bus (FSB), HyperTransport (HT) Interconnect, Industry Standard Architecture (ISA) Bus, Infiniband Interconnect, Low Pin Count (LPC) Bus, Memory Bus, Microchannel Architecture (MCA) Bus, Peripheral Component Interconnect (PCI) Bus, PCI-Express (PCI-X) Bus, Serial Advanced Technology Attachment (SATA) bus, Video Electronics Standards Association Local (VLB) bus or other suitable bus or a combination of two or more of the above. Bus 1310 may include one or more buses, where appropriate. Although embodiments of the present disclosure describe and illustrate a particular bus, this disclosure contemplates any suitable bus or interconnect.
该数据处理设备可以执行本公开实施例中的信息处理方法,从而实现结合图1至图10描述的信息处理方法和装置。The data processing device can execute the information processing method in the embodiment of the present disclosure, thereby realizing the information processing method and apparatus described in conjunction with FIG. 1 to FIG. 10 .
另外,结合上述实施例中的信息处理方法,本公开实施例可提供一种计算机可读存储介质来实现。该计算机可读存储介质上存储有计算机程序指令,该计算机程序指令被处理器执行时实现上述实施例中的任意一种信息处理方法。计算机可读存储介质的示例包括非暂态计算机可读存储介质,如只读存储器(Read-Only Memory,简称ROM)、随机存取存储器(Random Access Memory,简称RAM)、磁碟或者光盘等。In addition, in combination with the information processing methods in the foregoing embodiments, the embodiments of the present disclosure may be implemented by providing a computer-readable storage medium. Computer program instructions are stored on the computer-readable storage medium, and when the computer program instructions are executed by the processor, any one of the information processing methods in the foregoing embodiments is implemented. Examples of computer-readable storage media include non-transitory computer-readable storage media, such as read-only memory (Read-Only Memory, ROM for short), random access memory (Random Access Memory, RAM for short), magnetic disk, or optical disk, and the like.
需要明确的是,本公开并不局限于上文所描述并在图中示出的特定配置和处理。为了简明起见,这里省略了对已知方法的详细描述。在上述实施例中,描述和示出了若干具体的步骤作为示例。但是,本公开的方法过程并不限于所描述和示出的具体步骤,本领域的技术人员可以在领会本公开的精神后,作出各种改变、修改和添加,或者改变步骤之间的顺序。It is to be understood that the present disclosure is not limited to the specific configurations and processes described above and illustrated in the figures. For the sake of brevity, detailed descriptions of known methods are omitted here. In the above-described embodiments, several specific steps are described and shown as examples. However, the method process of the present disclosure is not limited to the specific steps described and shown, and those skilled in the art can make various changes, modifications and additions, or change the order of steps after comprehending the spirit of the present disclosure.
以上的结构框图中所示的功能块可以实现为硬件、软件、固件或者它们的组合。当以硬件方式实现时,其可以例如是电子电路、专用集成电路(ASIC)、适当的固件、插件、功能卡等等。当以软件方式实现时,本公开的元素是被用于执行所需任务的程序或者代码段。程序或者代码段可以存储在机器可读介质中,或者通过载波中携带的数据信号在传输介质或者通信链路上传送。“机器可读介质”可以包括能够存储或传输信息的任何介质。机器可读介质的例子包括电子电路、半导体存储器设备、ROM、闪存、可擦除ROM(EROM)、软盘、CD-ROM、光盘、硬盘、光纤介质、射频(RF)链路,等等。代码段可以经由诸如因特网、内联网等的计算机网络被下载。The functional blocks shown in the above structural block diagrams may be implemented as hardware, software, firmware, or a combination thereof. When implemented in hardware, it may be, for example, an electronic circuit, an application specific integrated circuit (ASIC), suitable firmware, a plug-in, a function card, or the like. When implemented in software, elements of the present disclosure are programs or code segments used to perform the required tasks. The program or code segments may be stored in a machine-readable medium or transmitted over a transmission medium or communication link by a data signal carried in a carrier wave. A "machine-readable medium" may include any medium that can store or transmit information. Examples of machine-readable media include electronic circuits, semiconductor memory devices, ROM, flash memory, erasable ROM (EROM), floppy disks, CD-ROMs, optical disks, hard disks, fiber optic media, radio frequency (RF) links, and the like. The code segments may be downloaded via a computer network such as the Internet, an intranet, or the like.
还需要说明的是,本公开中提及的示例性实施例,基于一系列的步骤或者装置描述一些方法或系统。但是,本公开不局限于上述步骤的顺序,也就是说,可以按照实施例中提及的顺序执行步骤,也可以不同于实施例中的顺序,或者若干步骤同时执行。It should also be noted that the exemplary embodiments mentioned in the present disclosure describe some methods or systems based on a series of steps or devices. However, the present disclosure is not limited to the order of the above steps, that is, the steps may be performed in the order mentioned in the embodiment, or may be different from the order in the embodiment, or several steps may be performed simultaneously.
以上,仅为本公开的具体实施方式,所属领域的技术人员可以清楚地了解到,为了描述的方便和简洁,上述描述的系统、模块和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。应理解,本公开的保护范围并不局限于此,任何熟悉本技术领域的技术人员在 本公开揭露的技术范围内,可轻易想到各种等效的修改或替换,这些修改或替换都应涵盖在本公开的保护范围之内。The above are only specific implementations of the present disclosure, and those skilled in the art can clearly understand that, for the convenience and brevity of the description, the specific working process of the above-described systems, modules and units can be referred to in the foregoing method embodiments. The corresponding process is not repeated here. It should be understood that the protection scope of the present disclosure is not limited to this, and any person skilled in the art can easily think of various equivalent modifications or replacements within the technical scope disclosed in the present disclosure, and these modifications or replacements should all cover within the scope of protection of the present disclosure.

Claims (32)

  1. 一种信息处理方法,应用于电子设备,包括:An information processing method applied to electronic equipment, comprising:
    接收对用户身份认证的第一输入;receiving a first input for user identity authentication;
    响应于所述第一输入,在可信执行环境下,通过近场通信获取用户的待认证身份信息;In response to the first input, in a trusted execution environment, obtain the user's identity information to be authenticated through near field communication;
    根据所述用户的待认证身份信息,确定用于表征用户身份的目标信息,所述目标信息包括用户的第一生物特征信息,以及在预设时间段内获取的用户图像,所述用户图像包括用户的第二生物特征信息;According to the user's identity information to be authenticated, target information for characterizing the user's identity is determined, the target information includes the user's first biometric feature information, and a user image acquired within a preset time period, the user image includes second biometric information of the user;
    基于所述第一生物特征信息与所述第二生物特征信息的对比结果,确定所述待认证身份信息的用户身份认证结果。Based on the comparison result of the first biometric information and the second biometric information, a user identity authentication result of the identity information to be authenticated is determined.
  2. 根据权利要求1所述的方法,其中,所述响应于所述第一输入,在可信执行环境下,通过近场通信获取用户的待认证身份信息,包括:The method according to claim 1, wherein, in response to the first input, in a trusted execution environment, acquiring the user's identity information to be authenticated through near field communication, comprising:
    响应于所述第一输入,In response to the first input,
    在所述数据交互环境满足预设交互环境、且在可信执行环境下,通过近场通信读取所述近场通信芯片,获取所述近场通信芯片的标签内容和用户身份标识;When the data interaction environment satisfies the preset interaction environment and under the trusted execution environment, read the near field communication chip through near field communication, and obtain the label content and user identity of the near field communication chip;
    基于所述标签内容和用户身份标识,生成所述用户的待认证身份信息。Based on the content of the label and the user identity, the identity information to be authenticated of the user is generated.
  3. 根据权利要求2所述的方法,其中,所述通过近场通信读取所述近场通信芯片,获取所述近场通信芯片的标签内容和用户身份标识之前,所述方法还包括:The method according to claim 2, wherein before reading the near field communication chip through near field communication and acquiring the label content and user identity of the near field communication chip, the method further comprises:
    检测与所述近场通信芯片的数据交互环境,所述数据交互环境包括所述电子设备与所述近场通信芯片的距离值和/或在预设距离内所述电子设备与所述近场通信芯片的接触时长;Detecting a data interaction environment with the near field communication chip, where the data interaction environment includes a distance value between the electronic device and the near field communication chip and/or the electronic device and the near field within a preset distance The contact time of the communication chip;
    在所述距离值满足预设距离值和/或所述接触市场满足预设接触时长时,确定所述数据交互环境满足预设交互环境。When the distance value satisfies the preset distance value and/or the contact market satisfies the preset contact duration, it is determined that the data interaction environment satisfies the preset interaction environment.
  4. 根据权利要求1所述的方法,其中,所述响应于所述第一输入,在可信执行环境下,通过近场通信获取用户的待认证身份信息,包括:The method according to claim 1, wherein, in response to the first input, in a trusted execution environment, acquiring the user's identity information to be authenticated through near field communication, comprising:
    响应于所述第一输入,在可信执行环境下,确定目标近场通信芯片,所述近场通信芯片与所述电子设备的数据交互环境满足预设近场通讯环境;In response to the first input, in a trusted execution environment, a target near field communication chip is determined, and a data interaction environment between the near field communication chip and the electronic device satisfies a preset near field communication environment;
    通过近场通信芯片与应用协议数据的预设对应关系,获取与所述目标近场通信芯片对应的目标应用协议数据;Obtain the target application protocol data corresponding to the target near field communication chip through the preset correspondence between the near field communication chip and the application protocol data;
    根据所述目标应用协议数据,获取用户的待认证身份信息。Obtain the identity information of the user to be authenticated according to the target application protocol data.
  5. 根据权利要求1所述的方法,其中,所述根据所述用户的待认证身份信息,确定用于表征用户身份的目标信息,包括:The method according to claim 1, wherein the determining the target information for characterizing the user's identity according to the identity information of the user to be authenticated comprises:
    根据所述待认证的身份信息,确定所述待认证的身份信息的身份信息明文数据;Determine the identity information plaintext data of the identity information to be authenticated according to the identity information to be authenticated;
    根据所述身份信息明文数据和目标信息数据解密授权凭证,确定所述第一生物特征信息。The first biometric feature information is determined by decrypting the authorization certificate according to the plaintext data of the identity information and the target information data.
  6. 根据权利要求5所述的方法,其中,所述根据所述待认证的身份信息,确定所述待认证的身份信息的身份信息明文数据,包括:The method according to claim 5, wherein determining the identity information plaintext data of the identity information to be authenticated according to the identity information to be authenticated comprises:
    向服务器发送身份认证请求,所述身份认证请求包括所述待认证的身份信息,所述身份认证请求用于请求所述服务器对所述待认证的身份信息进行解析,以得到所述待认证的身份信息的身份信息明文数据;Send an identity authentication request to the server, where the identity authentication request includes the identity information to be authenticated, and the identity authentication request is used to request the server to parse the identity information to be authenticated to obtain the identity information to be authenticated. identity information plaintext data;
    接收所述服务器发送的身份认证反馈信息,所述身份认证反馈信息包括所述待认证的身份信息的身份信息明文数据。Receive identity authentication feedback information sent by the server, where the identity authentication feedback information includes identity information plaintext data of the identity information to be authenticated.
  7. 根据权利要求6所述的方法,其中,所述向服务器发送身份认证请求之前,所述方法还包括:The method according to claim 6, wherein before the sending the identity authentication request to the server, the method further comprises:
    向所述服务器发送电子设备的身份标识,所述电子设备的电子标识用于确定所述电子设备是否满足身份认证的条件;Sending the identity identification of the electronic device to the server, where the electronic identification of the electronic device is used to determine whether the electronic device satisfies the conditions for identity authentication;
    接收所述服务器发送的身份标识反馈信息;receiving the identity feedback information sent by the server;
    在所述身份标识反馈信息表征所述电子设备未满足身份认证的条件下,向所述服务器发送身份认证请求。The identity authentication request is sent to the server under the condition that the identity identification feedback information indicates that the electronic device does not meet the identity authentication condition.
  8. 根据权利要求5所述的方法,其中,所述确定所述第一生物特征信息之前,所述方法还包括:The method of claim 5, wherein before the determining the first biometric information, the method further comprises:
    根据所述电子设备中的数字证书,生成设备公私密钥对;Generate a device public-private key pair according to the digital certificate in the electronic device;
    通过可信身份认证初始化接口向服务器发送用户身份认证初始化请求,所述用户身份认证初始化请求包括所述设备公私密钥对,所述用户身份认证初始化请求用于与所述服务器建立安全通信链接,并通过所述安全通信链接进行密钥交换;Send a user identity authentication initialization request to the server through the trusted identity authentication initialization interface, the user identity authentication initialization request includes the device public and private key pair, and the user identity authentication initialization request is used to establish a secure communication link with the server, and perform key exchange through said secure communication link;
    接收所述服务器的用户身份认证初始化反馈信息,所述用户身份认证初始化反馈信息包括所述目标信息数据解密授权凭证。Receive user identity authentication initialization feedback information from the server, where the user identity authentication initialization feedback information includes the target information data decryption authorization credential.
  9. 根据权利要求8所述的方法,其中,所述通过可信身份认证初始化接口向服务器发送用户身份认证初始化请求之前,所述方法还包括:The method according to claim 8, wherein before the user identity authentication initialization request is sent to the server through the trusted identity authentication initialization interface, the method further comprises:
    基于服务器公钥,获取与所述服务器对应的可信身份认证初始化接口。Based on the server public key, a trusted identity authentication initialization interface corresponding to the server is obtained.
  10. 根据权利要求9所述的方法,其中,所述用户身份认证初始化请求还包括应用程序信息,所述应用程序信息包括下述中的至少一种:应用程序标识、签名证书信息和证书指纹信息,其中,所述应用程序信息用于确定所述待认证身份信息的用户身份认证结果的执行环境。The method according to claim 9, wherein the user identity authentication initialization request further includes application program information, and the application program information includes at least one of the following: application program identification, signature certificate information and certificate fingerprint information, The application program information is used to determine the execution environment of the user identity authentication result of the identity information to be authenticated.
  11. 根据权利要求5或6所述的方法,其中,所述根据所述身份信息明文数据和目标信息数据解密授权凭证,确定所述第一生物特征信息,包括:The method according to claim 5 or 6, wherein the decrypting the authorization certificate according to the plaintext data of the identity information and the target information data to determine the first biometric information comprises:
    向所述服务器发送生物特征信息请求,所述生物特征信息请求包括所述身份信息明文数据和目标信息数据解密授权凭证,所述生物特征信息请求用于请求所述服务器基于所述身份信息明文数据和目标信息数据解密授权凭证,确定第一生物特征信息;Send a biometric information request to the server, the biometric information request includes the identity information plaintext data and the target information data decryption authorization credential, the biometric information request is used to request the server based on the identity information plaintext data Decrypt the authorization certificate with the target information data to determine the first biometric information;
    接收所述服务器发送的生物特征反馈信息,所述生物特征反馈信息包括被设备公钥加密的第一生物特征信息。The biometric feedback information sent by the server is received, where the biometric feedback information includes the first biometric information encrypted by the public key of the device.
  12. 根据权利要求1所述的方法,其中,所述在预设时间段内获取拍摄的用户图像,包括:The method according to claim 1, wherein the acquiring the captured user image within a preset time period comprises:
    显示固定人像位置区域,所述固定人像位置区域用于获取用户与固定人像位置区域对应的人体部位图像;Displaying a fixed portrait position area, the fixed portrait position area is used to obtain a human body part image corresponding to the user and the fixed portrait position area;
    在接收到用户拍摄图像的第二输入时,通过所述固定位置区域获取待处理的人体部位图像;When receiving the second input of the image captured by the user, obtain the image of the human body part to be processed through the fixed position area;
    对所述待处理的人体部位图像进行灰度归一化处理,得到所述用户图像。Grayscale normalization is performed on the image of the human body part to be processed to obtain the user image.
  13. 根据权利要求12所述的方法,其中,所述通过所述固定位置区域获取待处理的人体部位图像,包括:The method according to claim 12, wherein the acquiring the image of the human body part to be processed through the fixed position area comprises:
    通过所述固定位置区域,从人体部位中的多个特征点筛选目标特征点;Screening target feature points from a plurality of feature points in the body part through the fixed location area;
    根据所述目标特征点,获取与所述目标特征点对应的人体部位图像。According to the target feature points, a human body part image corresponding to the target feature points is acquired.
  14. 根据权利要求13所述的方法,其中,所述对所述待处理的人体部位图像进行灰度归一化处理,得到所述用户图像,包括:The method according to claim 13, wherein, performing grayscale normalization processing on the image of the human body part to be processed to obtain the user image, comprising:
    获取所述待处理的人体部位图像的第一灰度值,所述第一灰度值与第一灰度级对应;acquiring a first grayscale value of the to-be-processed human body part image, where the first grayscale value corresponds to a first grayscale level;
    根据所述第一灰度级通过灰度拉伸,调整所述待处理的人体部位图像,得到具有所述第一灰度级的用户图像。The image of the human body part to be processed is adjusted by gray scale stretching according to the first gray level, so as to obtain a user image with the first gray level.
  15. 根据权利要求12所述的方法,其中,所述第一生物特征信息包括身份证件图像;所述确定所述待认证身份信息的用户身份认证结果之前,所述方法还包括:The method according to claim 12, wherein the first biometric information comprises an image of an identity document; before the determination of the user identity authentication result of the identity information to be authenticated, the method further comprises:
    通过几何归一化对比所述身份证件图像和所述用户图像,得到所述第一生物特征信息与所述第二生物特征信息的对比结果。Comparing the identity document image and the user image through geometric normalization, a comparison result of the first biometric information and the second biometric information is obtained.
  16. 根据权利要求15所述的方法,其中,所述通过几何归一化对比所述身份证件图像和所述用户图像,得到所述第一生物特征信息与所述第二生物特征信息的对比结果,包括:The method according to claim 15, wherein the comparison result of the first biometric information and the second biometric information is obtained by comparing the identity document image and the user image through geometric normalization, include:
    识别所述身份证件图像中的用户面部区域,得到与所述用户面部区域对应的用户面部图像;Identify the user's face area in the identity document image, and obtain the user's face image corresponding to the user's face area;
    对所述用户面部图像或者所述用户图像中的面部区域进行等比放大或者缩小,并计算所述用户图像和所述用户面部图像的特征值;Perform proportional enlargement or reduction of the user face image or the face area in the user image, and calculate the feature values of the user image and the user face image;
    根据所述至少一个特征值,得到所述第一生物特征信息与所述第二生物特征信息的对比结果。According to the at least one feature value, a comparison result of the first biometric information and the second biometric information is obtained.
  17. 根据权利要求16所述的方法,其中,所述根据所述至少一个特征值,得到所述第一生物特征信息与所述第二生物特征信息的对比结果,包 括:The method according to claim 16, wherein, according to the at least one feature value, obtaining a comparison result of the first biometric information and the second biometric information, comprising:
    将所述至少一个特征值输入到目标身份证件人像特征模型中,得到所述第一生物特征信息与所述第二生物特征信息的对比结果。The at least one feature value is input into the target identity document portrait feature model to obtain a comparison result between the first biometric information and the second biometric information.
  18. 根据权利要求17所述的方法,其中,所述得到所述第一生物特征信息与所述第二生物特征信息的对比结果之前,所述方法还包括:The method according to claim 17, wherein before obtaining the comparison result between the first biometric information and the second biometric information, the method further comprises:
    根据目标身份证件中用户面部图像的训练特征值,对预设身份证件人像特征模型进行简化,得到目标身份证件人像特征模型。According to the training feature value of the user's face image in the target ID document, the preset ID document portrait feature model is simplified to obtain the target ID document portrait feature model.
  19. 根据权利要求1所述的方法,其中,所述确定所述待认证身份信息的用户身份认证结果之前,所述方法还包括:The method according to claim 1, wherein, before determining the user identity authentication result of the identity information to be authenticated, the method further comprises:
    通过对称密钥对所述第一生物特征信息和所述第二生物特征信息进行加密,得到加密生物特征信息;Encrypting the first biometric information and the second biometric information by using a symmetric key to obtain encrypted biometric information;
    向服务器发送身份认证结果请求,所述身份认证结果请求包括所述加密生物特征信息,所述身份认证结果请求用于请求所述服务器根据第一生物特征信息和所述第二生物特征信息,计算所述第一生物特征信息和所述第二生物特征信息的生物特征对比结果相似度;Send an identity authentication result request to the server, where the identity authentication result request includes the encrypted biometric information, and the identity authentication result request is used to request the server to calculate, according to the first biometric information and the second biometric information, similarity of the biometric comparison results of the first biometric information and the second biometric information;
    接收所述服务器发送的身份认证结果反馈信息,所述身份认证结果反馈信息包括被设备公钥加密的生物特征对比结果相似度;Receive the identity authentication result feedback information sent by the server, where the identity authentication result feedback information includes the similarity of the biometric comparison result encrypted by the device public key;
    通过设备私钥加密对生物特征对比结果相似度进行解密,得到所述生物特征对比结果相似度,所述生物特征对比结果相似度用于表征所述第一生物特征信息与所述第二生物特征信息的对比结果。The similarity of the biometric comparison result is decrypted by the device private key encryption to obtain the similarity of the biometric comparison result, and the similarity of the biometric comparison result is used to characterize the first biometric information and the second biometric Information comparison results.
  20. 根据权利要求19所述的方法,其中,所述基于所述第一生物特征信息与所述第二生物特征信息的对比结果,确定所述待认证身份信息的用户身份认证结果,包括:The method according to claim 19, wherein determining the user identity authentication result of the identity information to be authenticated based on the comparison result of the first biometric information and the second biometric information comprises:
    在所述生物特征对比结果相似度满足预设相似度的情况下,确定所述待认证身份信息的用户身份认证成功。If the similarity of the biometric comparison result satisfies the preset similarity, it is determined that the user identity authentication of the identity information to be authenticated is successful.
  21. 根据权利要求1所述的方法,其中,所述目标信息还包括下述中的至少一项:身份证件号码、身份证件图像、身份证件用户身份信息;所述第一生物特征信息包括下述中的至少一项:所述身份证件图像中用户面部图像、与所述身份证件对应的用户的虹膜图像。The method according to claim 1, wherein the target information further comprises at least one of the following: ID number, ID image, ID user identity information; the first biometric information includes the following: At least one of: a user's face image in the identity document image, and an iris image of the user corresponding to the identity document.
  22. 一种信息处理方法,应用于电子设备,包括:An information processing method applied to electronic equipment, comprising:
    接收对用户身份认证的第一输入;receiving a first input for user identity authentication;
    响应于所述第一输入,在可信执行环境下,通过近场通信获取用户的待认证身份信息;In response to the first input, in a trusted execution environment, obtain the user's identity information to be authenticated through near field communication;
    向服务器发送所述用户的待认证身份信息,所述用户的待认证身份信息用于确定所述待认证身份信息的用户身份认证结果;sending the identity information to be authenticated of the user to the server, where the identity information to be authenticated of the user is used to determine the user identity authentication result of the identity information to be authenticated;
    在预设时间段内获取用户图像,并向所述服务器发送所述用户图像,所述用户图像用于与所述用户的待认证身份进行对比,以确定所述用户身份认证结果;Acquire a user image within a preset time period, and send the user image to the server, where the user image is used to compare with the user's identity to be authenticated to determine the user identity authentication result;
    接收服务器发送的所述待认证身份信息的用户身份认证结果。The user identity authentication result of the identity information to be authenticated sent by the server is received.
  23. 根据权利要求22所述的方法,其中,所述在可信执行环境下,通过近场通信获取用户的待认证身份信息,包括:The method according to claim 22, wherein, in the trusted execution environment, acquiring the user's identity information to be authenticated through near field communication comprises:
    在可信执行环境下,通过执行协议数据指令集中近场通讯的指令,获取用户的待认证身份信息;其中,所述近场通讯的指令由服务器确定。Under the trusted execution environment, the near field communication instruction in the protocol data instruction set is executed to obtain the user's identity information to be authenticated; wherein the near field communication instruction is determined by the server.
  24. 一种信息处理方法,应用于服务器,包括:An information processing method, applied to a server, includes:
    接收电子设备发送的用户的待认证身份信息;Receive the identity information to be authenticated of the user sent by the electronic device;
    在检测到所述电子设备的设备类型为预设目标设备类型的情况下,获取与所述用户的待认证身份信息对应的且用于表征用户身份的目标信息,所述目标信息包括用户的第一生物特征信息;When it is detected that the device type of the electronic device is the preset target device type, acquire target information corresponding to the user's identity information to be authenticated and used to characterize the user's identity, the target information including the user's first - biometric information;
    接收所述电子设备发送的用户图像;receiving a user image sent by the electronic device;
    基于所述第一生物特征信息与所述用户图像中的第二生物特征信息的对比结果,确定所述待认证身份信息的用户身份认证结果;Determine the user identity authentication result of the identity information to be authenticated based on the comparison result between the first biometric information and the second biometric information in the user image;
    向所述电子设备发送所述用户身份认证结果。Send the user identity authentication result to the electronic device.
  25. 根据权利要求24所述的方法,其中,所述获取与所述用户的待认证身份信息对应的且用于表征用户身份的目标信息,包括:The method according to claim 24, wherein the acquiring target information corresponding to the user's identity information to be authenticated and used to characterize the user's identity comprises:
    根据所述待认证身份信息的密文信息,确定协议数据指令,所述协议数据指令用于指示按照身份证件属性格式拼接组装成的用于表征用户身份的目标信息的原文字符串;According to the ciphertext information of the identity information to be authenticated, a protocol data instruction is determined, and the protocol data instruction is used to indicate the original character string for representing the target information of the user identity assembled and assembled according to the attribute format of the identity document;
    根据预存的目标信息数据解密授权凭证和所述目标信息的原文字符 串,对待认证的身份信息进行解密,得到目标信息。According to the pre-stored target information data decryption authorization certificate and the original character string of the target information, decrypt the identity information to be authenticated to obtain the target information.
  26. 根据权利要求25所述的方法,其中,所述根据所述待认证身份信息的密文信息,确定协议数据指令,包括:The method according to claim 25, wherein the determining the protocol data instruction according to the ciphertext information of the identity information to be authenticated comprises:
    向身份鉴别服务器发送所述协议数据指令,所述协议数据指令用于指示所述身份鉴别服务器按照身份证件属性格式拼接组装成的用于表征用户身份的目标信息的原文字符串;Send the protocol data instruction to the identity authentication server, where the protocol data instruction is used to instruct the identity authentication server to splicing and assemble the original character string used to represent the target information of the user identity according to the identity document attribute format;
    接收所述身份鉴别服务器发送的所述目标信息的原文字符串。The original character string of the target information sent by the identity authentication server is received.
  27. 一种信息处理装置,应用于电子设备,包括:An information processing device, applied to electronic equipment, includes:
    接收模块,用于接收对用户身份认证的第一输入;a receiving module for receiving the first input for user identity authentication;
    获取模块,用于响应于所述第一输入,在可信执行环境下,通过近场通信获取用户的待认证身份信息;an acquisition module, configured to, in response to the first input, acquire the user's identity information to be authenticated through near field communication in a trusted execution environment;
    处理模块,用于根据所述用户的待认证身份信息,确定用于表征用户身份的目标信息,所述目标信息包括用户的第一生物特征信息,以及在预设时间段内获取的用户图像,所述用户图像包括用户的第二生物特征信息;a processing module, configured to determine target information for characterizing the user's identity according to the user's identity information to be authenticated, the target information including the user's first biometric information and a user image obtained within a preset time period, the user image includes second biometric information of the user;
    确定模块,用于基于所述第一生物特征信息与所述第二生物特征信息的对比结果,确定所述待认证身份信息的用户身份认证结果。A determination module, configured to determine a user identity authentication result of the identity information to be authenticated based on a comparison result between the first biometric information and the second biometric information.
  28. 一种信息处理装置,应用于电子设备,包括:An information processing device, applied to electronic equipment, includes:
    接收模块,用于接收对用户身份认证的第一输入;a receiving module for receiving the first input for user identity authentication;
    获取模块,用于响应于所述第一输入,在可信执行环境下,通过近场通信获取用户的待认证身份信息;an acquisition module, configured to, in response to the first input, acquire the user's identity information to be authenticated through near field communication in a trusted execution environment;
    发送模块,用于向服务器发送所述用户的待认证身份信息,所述用户的待认证身份信息用于确定所述待认证身份信息的用户身份认证结果;a sending module, configured to send the identity information to be authenticated of the user to the server, where the identity information to be authenticated of the user is used to determine the user identity authentication result of the identity information to be authenticated;
    所述发送模块还用于在预设时间段内获取用户图像,并向所述服务器发送所述用户图像,所述用户图像用于与所述用户的待认证身份进行对比,以确定所述用户身份认证结果;The sending module is further configured to acquire a user image within a preset time period, and send the user image to the server, where the user image is used to compare with the identity to be authenticated of the user to determine the user identity authentication result;
    所述接收模块还用于接收服务器发送的所述待认证身份信息的用户身份认证结果。The receiving module is further configured to receive the user identity authentication result of the identity information to be authenticated sent by the server.
  29. 一种信息处理装置,应用于服务器,包括:An information processing device, applied to a server, includes:
    接收模块,用于接收电子设备发送的用户的待认证身份信息;a receiving module, configured to receive the identity information to be authenticated of the user sent by the electronic device;
    获取模块,用于在检测到所述用户的待认证身份信息用于确定所述待认证身份信息的用户身份认证结果时,获取与所述用户的待认证身份信息对应且用于表征用户身份的目标信息,所述目标信息包括用户的第一生物特征信息;The acquiring module is configured to acquire the user's identity information corresponding to the user's identity information to be authenticated and used to characterize the user's identity when it is detected that the identity information to be authenticated of the user is used to determine the user identity authentication result of the identity information to be authenticated. target information, the target information includes the user's first biometric information;
    所述接收模块还用于接收所述电子设备发送的用户图像;The receiving module is further configured to receive the user image sent by the electronic device;
    确定模块,用于基于所述第一生物特征信息与所述用户图像中的第二生物特征信息的对比结果,确定所述待认证身份信息的用户身份认证结果;a determination module, configured to determine the user identity authentication result of the identity information to be authenticated based on the comparison result between the first biometric information and the second biometric information in the user image;
    发送模块,用于向所述电子设备发送所述用户身份认证结果。A sending module, configured to send the user identity authentication result to the electronic device.
  30. 一种电子设备,所述电子设备包括:处理器和存储有计算机程序指令的存储器;An electronic device comprising: a processor and a memory storing computer program instructions;
    所述处理器执行所述计算机程序指令时实现如权利要求1-21中任意一项所述信息处理方法或者如权利要求22-23中任一项所述信息处理方法。When the processor executes the computer program instructions, the information processing method according to any one of claims 1-21 or the information processing method according to any one of claims 22-23 is implemented.
  31. 一种服务器,所述服务器包括:处理器和存储有计算机程序指令的存储器;A server comprising: a processor and a memory storing computer program instructions;
    所述处理器执行所述计算机程序指令时实现如权利要求24-26中任意一项所述信息处理方法。When the processor executes the computer program instructions, the information processing method according to any one of claims 24-26 is implemented.
  32. 一种计算机可读存储介质,所述计算机可读存储介质上存储有计算机程序指令,所述计算机程序指令被处理器执行时实现如权利要求1-21中任意一项所述信息处理方法,或者实现如权利要求22-23中任意一项所述信息处理方法,或者实现如权利要求24-26中任意一项所述信息处理方法。A computer-readable storage medium on which computer program instructions are stored, and when the computer program instructions are executed by a processor, implement the information processing method according to any one of claims 1-21, or The information processing method according to any one of claims 22-23 is realized, or the information processing method according to any one of claims 24-26 is realized.
PCT/CN2021/117232 2021-02-09 2021-09-08 Information processing method and apparatus, and electronic device, server and medium WO2022170759A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110179442.7A CN112819475A (en) 2021-02-09 2021-02-09 Information processing method, information processing device, electronic equipment, server and medium
CN202110179442.7 2021-02-09

Publications (1)

Publication Number Publication Date
WO2022170759A1 true WO2022170759A1 (en) 2022-08-18

Family

ID=75864920

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/117232 WO2022170759A1 (en) 2021-02-09 2021-09-08 Information processing method and apparatus, and electronic device, server and medium

Country Status (3)

Country Link
CN (1) CN112819475A (en)
TW (1) TW202232407A (en)
WO (1) WO2022170759A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112819475A (en) * 2021-02-09 2021-05-18 中国银联股份有限公司 Information processing method, information processing device, electronic equipment, server and medium
KR20240019056A (en) * 2021-06-06 2024-02-14 애플 인크. Digital ID Credential User Interfaces
CN113645045B (en) * 2021-10-13 2022-01-04 北京创米智汇物联科技有限公司 Security control method, device and equipment in TEE and storage medium
CN115208704B (en) * 2022-09-16 2023-01-13 欣诚信息技术有限公司 Identity authentication system and political service application system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014082387A1 (en) * 2012-11-28 2014-06-05 鹤山世达光电科技有限公司 Nfc-based fingerprint authentication system and fingerprint authentication method
CN105187217A (en) * 2015-09-16 2015-12-23 成都三零凯天通信实业有限公司 Dual-factor identity authentication method and apparatus thereof
CN107682545A (en) * 2017-09-28 2018-02-09 山西特信环宇信息技术有限公司 Testimony of a witness machine in-one handset terminal system and operating method based on biological identification technology
CN108462725A (en) * 2018-05-29 2018-08-28 北京华大智宝电子系统有限公司 A kind of electronic signature equipment, auth method and system
CN109325332A (en) * 2018-09-17 2019-02-12 北京旷视科技有限公司 Testimony of a witness checking method, server, backstage and system
CN111831995A (en) * 2020-09-08 2020-10-27 杭州海宴科技有限公司 Trusted identity authentication method and system based on eID and human body biological information
CN112819475A (en) * 2021-02-09 2021-05-18 中国银联股份有限公司 Information processing method, information processing device, electronic equipment, server and medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014082387A1 (en) * 2012-11-28 2014-06-05 鹤山世达光电科技有限公司 Nfc-based fingerprint authentication system and fingerprint authentication method
CN105187217A (en) * 2015-09-16 2015-12-23 成都三零凯天通信实业有限公司 Dual-factor identity authentication method and apparatus thereof
CN107682545A (en) * 2017-09-28 2018-02-09 山西特信环宇信息技术有限公司 Testimony of a witness machine in-one handset terminal system and operating method based on biological identification technology
CN108462725A (en) * 2018-05-29 2018-08-28 北京华大智宝电子系统有限公司 A kind of electronic signature equipment, auth method and system
CN109325332A (en) * 2018-09-17 2019-02-12 北京旷视科技有限公司 Testimony of a witness checking method, server, backstage and system
CN111831995A (en) * 2020-09-08 2020-10-27 杭州海宴科技有限公司 Trusted identity authentication method and system based on eID and human body biological information
CN112819475A (en) * 2021-02-09 2021-05-18 中国银联股份有限公司 Information processing method, information processing device, electronic equipment, server and medium

Also Published As

Publication number Publication date
TW202232407A (en) 2022-08-16
CN112819475A (en) 2021-05-18

Similar Documents

Publication Publication Date Title
WO2022170759A1 (en) Information processing method and apparatus, and electronic device, server and medium
US10326761B2 (en) Web-based user authentication techniques and applications
KR102450025B1 (en) Encryption Methods and Systems
US9673981B1 (en) Verification of authenticity and responsiveness of biometric evidence and/or other evidence
KR102358546B1 (en) System and method for authenticating a client to a device
KR102431834B1 (en) System and method for carrying strong authentication events over different channels
US10061910B2 (en) Secure biometric data capture, processing and management for selectively prohibiting access to a data storage component from an application execution environment
EP3005202B1 (en) System and method for biometric authentication with device attestation
EP3138265B1 (en) Enhanced security for registration of authentication devices
US8966268B2 (en) Strong authentication token with visual output of PKI signatures
KR20200107976A (en) System and method for binding verifiable claims
KR20200092368A (en) Expansion of secure key storage for transaction verification and cryptocurrency
WO2021004519A1 (en) Data security processing terminal, system and method
US11665157B2 (en) Systems and methods for authenticating users within a computing or access control environment
US20180343247A1 (en) Method, user terminal and authentication service server for authentication
JP2023139259A (en) Image collection apparatus, server, encryption method, and decryption method
KR20210142180A (en) System and method for efficient challenge-response authentication
KR20160139885A (en) Certification System for Using Biometrics and Certification Method for Using Key Sharing and Recording medium Storing a Program to Implement the Method
JP2011165102A (en) Biometrics authentication system and portable terminal
US9413533B1 (en) System and method for authorizing a new authenticator
KR20220074147A (en) System and method for non-face-to-face identification kyc solution
TWI725443B (en) Method of registration and access control of identity for third-party certification
KR101792494B1 (en) Method for authenticating user and apparatus for performing the method
CN109299945B (en) Identity verification method and device based on biological recognition algorithm
KR101674314B1 (en) The method for authenticating one time security character using captcha

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21925411

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21925411

Country of ref document: EP

Kind code of ref document: A1