CN105608362A - Internet identity authentication trusted system and terminal and authentication method - Google Patents

Internet identity authentication trusted system and terminal and authentication method Download PDF

Info

Publication number
CN105608362A
CN105608362A CN201610147743.0A CN201610147743A CN105608362A CN 105608362 A CN105608362 A CN 105608362A CN 201610147743 A CN201610147743 A CN 201610147743A CN 105608362 A CN105608362 A CN 105608362A
Authority
CN
China
Prior art keywords
trusted system
identity
module
information
card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610147743.0A
Other languages
Chinese (zh)
Inventor
苏明儒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201610147743.0A priority Critical patent/CN105608362A/en
Publication of CN105608362A publication Critical patent/CN105608362A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions

Abstract

The invention relates to the technical field of computer security information, and provides an Internet identity authentication trusted system and terminal and an authentication method. The Internet identity authentication trusted system terminal which is internally provided with a power module, an antenna built-in interpretation module, an IC intelligent card antenna, a human image face collecting camera, a voice sound-light alarm device, a single chip microcomputer integration module and an integrated control circuit module is used for reading a chip special data ID number in an identity card, reading a special data serial number in an IC intelligent card, reading graph-text data information in the second-generation identity card and collecting facial related data information of a customer image; by means of servers of all layers and a total data bank of the ministry of public security, whether citizen identification card information is in accordance with originally collected and stored human image facial information is checked, and a comparison result is returned back to the special industry network identity authentication system and identification terminal in the same way. By means of the system and the method, identity of a person and a corresponding identity card can be verified, and the transmission security of information in a network can be further guaranteed.

Description

Internet authentication trusted system and terminal and authentication method
Technical field
The present invention relates to computer safety information technical field, particularly relate to citizenshipAuthentication techniques, are specially a kind of Internet authentication trusted system and terminal and authenticating partyMethod.
Background technology
Identity card is the proof of citizenship, plays the part of important role in life. Along withThe development of society, the Ministry of Public Security of China has released No.2 residence card, this identity recentlyThe maximum feature of card identity card is than before exactly with memory function, the information on identity cardBe stored in RAM, be easy to read relevant information by PC, comprising faceImage.
But, after reading relevant information, how to confirm that identity must need manually to go oneOne comparison, especially compares photo on identity card whether consistent with actual persons. This sideMethod except increasing the cost of labor of the identification identity card true and false, the subjectivity of manual identifiedAlso reduce the accuracy rate of identification.
The existing system of automatically No.2 residence card being identified in prior art,As Chinese patent CN103218599A, disclose one and occupied based on the recognition of face second generationThe Verification System of people's identity card, comprises the second generation body for reading the information in identity cardPart card card reader, for gathering the picture pick-up device of real human face image, identifying data informationStorehouse, recognition of face device, the letter in the identity card of reading according to second generation identity card card readerBreath is derived the corresponding information that in identifying data information bank, storage provides, and with second generation identityInformation in the identity card that card card reader is read is compared. Based on the recognition of face second generationThe authentication method of resident identification card, comprises the following steps: the first step, and by second generation bodyPart card card reader is read the information in second generation identity card; Second step, by second generation identityThe communication that card card reader is read is in recognition of face device; The 3rd step, by picture pick-up deviceGather real human face image, and real human face image is passed in recognition of face device; The 4thStep, in the second generation identity card that recognition of face device is read according to second generation identity card read write lineInformation, derive the corresponding information of storing in identifying data information bank; The 5th step, identificationJudge the true and false of this second generation identity card, if personal identification card document is for carrying out the 6th really againStep; The 6th step, distinguishes that whether this second generation identity card is by holding in person.
Can find out the letter to China second-generation identity card in currently available technology by above technologyBreath extracts the information in second generation identity card of still adopting, by network information communication whole theInformation in China second-generation identity card is also compared with image, and such mode exists two to askTopic, first problem is chip information and document surface information whole in China second-generation identity cardCause, in the transmitting procedure of reading full detail, easily intercepted, thereby personal information is let outClose; Second Problem is that external information is fixing data in identity card, causes the personal information cannotEnsure, cannot with the national people information storehouse more uncertain information factor of new data of networking,Due to the second generation identity card term of validity 10 to 20 years and and chronicity reason, this is accreditedPeople changes greatly etc., then adds the identifying data information bank of individual inhabitation information or enterprises and institutionsThere is the problems such as uncertain, imperfect and unstable more in its content.
Summary of the invention
For the problems of the prior art, the invention provides one and not only can extract twoFull detail in generation ID, can also only call partial information in China second-generation identity card and carry outInformation comparison, and compare with the total storehouse of Ministry of Public Security's information, thereby not only guarantee information passesThe credible system of Internet authentication of the accuracy of defeated security and guarantee the resultSystem and terminal and authentication method.
For realizing above technical purpose, technical scheme of the present invention is: a kind of interconnected bodyPart certification trusted system terminal, comprises housing, described housing be provided with two generation citizenshipCertificate read-write card acquisition zone, voice sound and light alarm highlight and external antenna, described housingInside be provided with power module, built-in antenna solution read through model, IC smart card antenna, portrait facePortion's acquisition camera, voice acoustic-optic alarm, single-chip microcomputer integration module and integrated controlCircuit module, described power module respectively with built-in antenna solution read through model, IC smart cardAntenna, voice acoustic-optic alarm, single-chip microcomputer integration module and integral control circuit moduleElectrical connection, described built-in antenna solution read through model is connected with IC smart card antenna, described dayThe China second-generation identity card part IC that the built-in solution read through model of line and IC smart card antenna, collection are readThe sequence number of the ID number code in intelligent card chip and identity document IC intelligent cardsCode, and the China second-generation identity card part reading by SAM secure decryption module numbering picture and textData message, described portrait face acquisition camera and voice acoustic-optic alarm all withSingle-chip microcomputer integration module circuit connects, described single-chip microcomputer integration module and integral control circuitModule electrical connection.
As preferably, in described housing, be also provided with for ensureing testimony of a witness uniformity and for adoptingCollection reads and deciphers ID number code and the identity document in China second-generation identity card part chipThe extraordinary module of secure decryption of the sequence number code information of IC intelligent cards.
As preferably, also comprise LCDs, described LCDs and integrated controlCircuit module electrical connection.
As preferably, also comprise Certification of Second Generation fingerprint authentication module, described Certification of Second Generation fingerprint is recognizedCard module is electrically connected with integral control circuit module.
As preferably, also comprise network communication module, described network communication module is wirelessNetwork interface card module or wired network adapter module.
A kind of Internet authentication trusted system, comprises the credible system of Internet authenticationSystem terminal, special trade back-end data storage PC, point streaming server, general headquarters' dataStorehouse and Ministry of Public Security's data bank, described Internet authentication trusted system terminal is with a pair ofOne or many-one pattern be connected with special trade data storage PC, described interconnected bodyPart certification trusted system terminal and communication module and portrait face acquisition camera are all with specialKind of industry data storage PC connects, described special trade back-end data storage PC andPoint streaming server connects, and described point of streaming server is connected with general headquarters databases, described general headquartersDatabase is connected with Ministry of Public Security data bank by designated port.
As preferably, also comprise PC main frame, described Internet authentication trusted systemTerminal and portrait face acquisition camera with one to one or many-one pattern and PC main frame connectConnect.
As preferably, described backstage PC main frame is according to Internet authentication trusted systemThe relevant information of the China second-generation identity card part that terminal reads is uploaded to special trade back-end dataStorage PC, described special trade data storage PC is according to special trade actual needsGeographical position preserve on the spot.
A kind of Internet authentication trusted system authentication method, comprising: step 1:By reading of the extraordinary module of the secure decryption in Internet authentication trusted system terminalGet ID number code and identity document IC intelligent cards in China second-generation identity card part chipsSequence number code, then read citizen identification card SMIS by SAM secure decryption moduleAll information in sheet and surface and image, text and data and identity numbering and certificate;
Step 2: by the acquisition camera captured identity certificate holder's of portrait face portrait facePortion's image;
Step 3: by chip id number in the portrait face image of now adopting and China second-generation identity card partAccording to body in the sequence number code of code, identity document IC intelligent cards and citizen ID certificateIn part numbering and identity document, all character image information sends to special trade backstageData storage is preserved;
Step 4: in the China second-generation identity card part chip storing in special trade data storageSequence number code, the citizenship of ID number code, identity document IC intelligent cardsIn card, identity numbering and face image information are uploaded on long-range point of streaming server, all the other citizensIdentity document Word message is kept in special trade back-end data memory on the spot.
Step 5: ID number generation in the China second-generation identity card part chip in described point of streaming serverIn the sequence number code, citizen ID certificate of code, identity document IC intelligent cards, identity is compiledNumber and face image information send to general headquarters' database and register and retain;
Step 6: general headquarters' database is by ID number generation in the China second-generation identity card part chip of receivingIn the sequence number code, citizen ID certificate of code, identity document IC intelligent cards, identity is compiledNumber and face image information exchange cross designated port and be sent to Ministry of Public Security's data bank numberIt is believed that breath comparison;
Step 7: Ministry of Public Security's data bank feeds back to information comparison result in general headquarters' database;Step 8: if portrait face image information and identity document phase that result of determination is holderPass information matches success, data are deposited in general headquarters' database, and general headquarters' database concurrency sendSpecify secret signal A to a point streaming server, a point streaming server sends to secret signal ASpecial trade data storage PC, the special trade data storage PC letter of maintaining secrecyNumber A sends to Internet authentication trusted system terminal will show and point out identity cardThe all information of part;
Step 9: if result of determination is ID number generation in holder's China second-generation identity card part chipThe sequence number code of code and identity document IC intelligent cards, or portrait face image informationUnsuccessful with identity document information matches, the log-on data that sends general headquarters' database is deletedRemove, general headquarters' database concurrency send specifies secret signal B to a point streaming server, shunting serviceSecret signal B is sent to special trade data storage PC, special trade data by deviceSecret signal B is sent to Internet authentication trusted system terminal by storage PCComparison information result;
Step 10: after step 9 sends to Internet authentication trusted system terminal, mutuallyNetworking authentication trusted system terminal will show and point out warning.
As preferably, described Internet authentication trusted system terminal and backstage special typeIndustry data storage PC is that cable network connects or wireless network connects.
As preferably, described Internet authentication trusted system terminal can also be for movingMoving communication apparatus.
As preferably, when Internet authentication trusted system terminal is mobile communication equipmentTime, secret signal A is that certificate form is kept at mobile communication equipment, can be for specifying journeyOrder is called.
As can be seen from the above description, the present invention possesses following advantage: from China second-generation identity cardInformation gathering angle, the terminal of this Internet authentication trusted system not only canWith identity numbering in captured identity additional clause image, text and data information and citizen ID certificate withAnd face head portrait image, can also gather ID spy in China second-generation identity card part chip simultaneouslyThe sequence number special code of different data confidentiality code and identity document IC intelligent cards.
From the Internet Transmission angle of the information of China second-generation identity card, in the time of communicationOnly need to transmit the secret code of ID special data and identity in China second-generation identity card part chipThe sequence number special code of certificate IC intelligent cards and the feature coding of head portrait image,Even if intercept these codes and also cannot obtain identity card holder's in-depth identity information.
From the safety and stability angle of network system, whole system is passed through manyLevel shunt server and special trade data storage PC and the common structure of backstage PC main frameBecome multistage storage, the effect of information allotment and shunting information, thus make system in informationAll high in the speed of feedback and stability.
From the reliability angle of network system, whole system is and Ministry of Public Security's dataData message comparison is carried out in total storehouse, thus the comparison result obtaining, the result therefore obtainingConfidence level is high.
Brief description of the drawings
Fig. 1 is the structural representation of Internet authentication trusted system terminal.
Fig. 2 is the cutaway view of Internet authentication trusted system terminal.
Fig. 3 is the cutaway view of Internet authentication trusted system terminal.
Fig. 4 is that the circuit of Internet authentication trusted system terminal connects block diagram.
Fig. 5 is the connection block diagram of Internet authentication trusted system.
Brief description of the drawings: 1, housing, 2, read-write card acquisition zone, 3, voice sound and light alarm highlight, 4,External antenna, 5, power module, 6, built-in antenna solution read through model, 7, IC smart card skyLine, 8, portrait face acquisition camera, 9, voice acoustic-optic alarm, 10, single-chip microcomputerIntegration module, 11, integral control circuit module, 12, SAM secure decryption module, 13, peaceThe close extraordinary module of complete solution, 14, LCDs, 15, Certification of Second Generation fingerprint authentication module, 16,Network communication module.
Detailed description of the invention
With reference to the accompanying drawings described in 1 to 5, a kind of Internet authentication trusted system terminal,Comprise housing 1, described housing 1 is provided with second-generation resident identification card part read-write card acquisition zone2, voice sound and light alarm highlight 3 and external antenna 4, is provided with electricity in described housing 1Source module 5, built-in antenna solution read through model 6, IC smart card antenna 7, portrait face adoptCollection camera 8, voice acoustic-optic alarm 9, single-chip microcomputer integration module 10 and integrated controlCircuit module 11 processed, described power module 5 respectively with Anneta module 6, IC smart cardAntenna 7, voice acoustic-optic alarm 9, single-chip microcomputer integration module 10 and integrated control electricityRoad 11 module electrical connections, described Anneta module 6 is connected with IC smart card antenna 7, instituteState built-in antenna solution read through model 6 and gather the China second-generation identity card part IC intelligent card chip readingThe interior secret code of ID special data, the sequence number spy of identity document IC intelligent cardsDifferent code, and the China second-generation identity card part reading by SAM secure decryption module 12 is compiledNumber, described portrait face acquisition camera 8 and voice acoustic-optic alarm 3 are all with singleSheet machine integration module 10 circuit connect, described single-chip microcomputer integration module 10 and integrated controlCircuit module 11 is electrically connected.
In described housing 1, be also provided with and gather No. ID that reads in China second-generation identity card part chipThe sequence number special code of the secret code of special data and identity document IC intelligent cardsThe extraordinary module 13 of secure decryption.
Also comprise LCDs 14, described LCDs 14 and integral control circuitModule 11 electrical links.
Also comprise Certification of Second Generation fingerprint authentication module 15, described Certification of Second Generation fingerprint authentication moduleBe electrically connected with integral control circuit module.
Also comprise network communication module 16, described network communication module is wireless network snap gaugePiece or wired network adapter module.
A kind of Internet authentication trusted system, comprises the credible system of Internet authenticationSystem terminal, special trade data storage PC, divide streaming server, general headquarters' database andMinistry of Public Security's data bank, described Internet authentication trusted system terminal is a pair of to combineOne or many-one pattern be connected with special trade data storage PC, described interconnected bodyPart certification trusted system terminal and communication module and portrait face acquisition camera are all with specialPlant industry data storage PC and connect, described special trade data storage PC and shuntingServer connects, and described point of streaming server is connected with general headquarters databases, described general headquarters dataStorehouse is connected with Ministry of Public Security data bank by designated port.
Also comprise backstage PC main frame, described Internet authentication trusted system terminal andPortrait face acquisition camera is connected with backstage PC main frame respectively.
Described backstage PC main frame reads according to Internet authentication trusted system terminalThe relevant information of China second-generation identity card part is uploaded to special trade data storage PC, described inSpecial trade data storage PC carries out according to the geographical position of special trade actual needsPreserve on the spot.
A kind of Internet authentication trusted system authentication method, comprising:
Step 1: by the secure decryption spy in Internet authentication trusted system terminalKind of module read in China second-generation identity card part chips the secret code of ID special data andThe sequence number special code of identity document IC intelligent cards, then by SAM secure decryptionModule reads citizen identification card chips and surface and image, text and data and identity numberingAnd all information in certificate;
Step 2: by the acquisition camera captured identity certificate holder's of portrait face peoplePicture face image;
Step 3: by chip id in the portrait face image of now adopting and China second-generation identity card partThe sequence number special code of number secret code of special data, identity document IC intelligent cardsSend out with all character image information in identity numbering and identity document in citizen ID certificateDelivering to special trade data storage preserves;
Step 4: by the China second-generation identity card part chip storing in special trade data storageThe sequence number of the secret code of interior ID special data, identity document IC intelligent cards is specialIn code, citizen ID certificate, identity numbering and face image information are uploaded long-range shunting serviceOn device, all the other citizen identification card Word messages are kept at the storage of special trade data on the spotIn device.
Step 5: ID spy in the China second-generation identity card part chip in described point of streaming serverSequence number special code, the public affairs of different data confidentiality code, identity document IC intelligent cardsIn people's identity card, identity numbering and face image information send to general headquarters' database and noteVolume and retention;
Step 6: general headquarters' database is by ID spy in the China second-generation identity card part chip of receivingSequence number special code, the public affairs of different data confidentiality code, identity document IC intelligent cardsIn people's identity card, identity numbering and face image information exchange are crossed designated port and are sent to public securityPortion's data bank carries out data message comparison;
Step 7: information comparison result is fed back to general headquarters' database by Ministry of Public Security's data bankIn;
Step 8: if portrait face image information and identity card that result of determination is holderThe success of part correlated information match, data are deposited in general headquarters' database, and general headquarters' database is alsoSend and specify secret signal A to a point streaming server, a point streaming server is sent out secret signal AGive special trade data storage PC, special trade data storage PC will be protectedClose signal A sends to Internet authentication trusted system terminal will show and point out bodyThe all information of part certificate;
Step 9: if result of determination is ID spy in holder's China second-generation identity card part chipThe sequence number special code of different data confidentiality code and identity document IC intelligent cards, orPortrait face image information and identity document information matches are unsuccessful, send general headquarters' dataThe log-on data in storehouse is deleted, and general headquarters' database concurrency send specifies secret signal B to shunting clothesBusiness device, secret signal B is sent to special trade data storage PC by a point streaming server,Special trade data storage PC sends to the Internet authentication can secret signal BThe comparison information result of communication system terminal;
Step 10: send to Internet authentication trusted system terminal through step 9After, Internet authentication trusted system terminal will show and point out warning.
Described Internet authentication trusted system terminal and backstage special trade dataStorage PC is that cable network connects or wireless network connects.
Described Internet authentication trusted system terminal can also be established for mobile communicationStandby.
In the time that Internet authentication trusted system terminal is mobile communication equipment, maintain secrecySignal A is that certificate form is kept at mobile communication equipment, can call for designated program.
Simultaneously by the secure decryption special type in Internet authentication trusted system terminalModule read the secret code of ID special data and body in China second-generation identity card part chipsThe sequence number special code of part certificate IC intelligent cards, then by SAM secure decryption mouldPiece read citizen identification card chips and surface and image, text and data and identity numbering andMore than at least two information of information in certificate in all information composition " information group " is wholeIn individual system, transmitting final and state ministry of public security total data storehouse compares.
Described portrait face's acquisition camera and Certification of Second Generation fingerprint authentication module and internetBetween authentication trusted system terminal, can adopt integral structure also can adopt pointBody formula structure.
Above the present invention and embodiment thereof are described, this description does not limitProperty, also one of embodiments of the present invention just as shown in the drawing, actual structureBe not limited to this. If generally speaking those of ordinary skill in the art is enlightened by it,In the situation that not departing from the invention aim, design and this skill without creationaryThe frame mode that art scheme is similar and embodiment, all should belong to protection scope of the present invention.

Claims (12)

1. an Internet authentication trusted system terminal, comprises housing (1), described shellBody (1) is provided with two generation citizen identification card read-write card acquisition zones (2), voice acousto-opticAlarm notice area (3) and external antenna (4), described housing is provided with power supply in (1)Module (5), built-in antenna solution read through model (6), IC smart card antenna (7), peoplePicture face's acquisition camera (8), voice acoustic-optic alarm (9), single-chip microcomputer are integratedModule (10) and integral control circuit module (11), described power module (5) pointNot and built-in antenna solution read through model (6), IC smart card antenna (7), voice acousto-opticWarning device (9), single-chip microcomputer integration module (10) and integral control circuit (11)Module electrical connection, described built-in antenna solution read through model (6) and IC smart card antenna (7)Connect, described built-in antenna solution read through model (6) and IC smart card antenna (7), adoptID number code and identity in the China second-generation identity card part IC intelligent card chip that collection readsThe sequence number code of certificate IC intelligent cards, and by SAM secure decryption module (12)The China second-generation identity card part numbering image, text and data information reading, described portrait face gathers and takes the photographPicture head (8) and voice acoustic-optic alarm (3) all with single-chip microcomputer integration module (10)Circuit connects, described single-chip microcomputer integration module (10) and integral control circuit module (11)Electrical connection.
2. Internet authentication trusted system terminal according to claim 1, its spyLevy and be: in described housing (1), be also provided with for ensureing testimony of a witness uniformity and for adoptingCollection reads and deciphers ID number code and the identity document in China second-generation identity card part chipThe extraordinary module of secure decryption (13) of the sequence number code information of IC intelligent cards.
3. Internet authentication trusted system terminal according to claim 1, its spyLevy and be: also comprise LCDs (14), described LCDs (14) and collectionBecome control circuit module (11) electrical connection.
4. Internet authentication trusted system terminal according to claim 1, its spyLevy and be: also comprise Certification of Second Generation fingerprint authentication module (15), described Certification of Second Generation fingerprint is recognizedCard module is electrically connected with integral control circuit module.
5. Internet authentication trusted system terminal according to claim 1, its spyLevy and be: also comprise network communication module (16), described network communication module is wirelessNetwork interface card module or wired network adapter module.
6. an Internet authentication trusted system, is characterized in that: comprise interconnected bodyPart certification trusted system terminal, special trade back-end data storage PC, shunting serviceDevice, general headquarters' database and Ministry of Public Security's data bank, described Internet authentication is credible systemSystem terminal with one to one or many-one pattern be connected with special trade data storage PC,Described Internet authentication trusted system terminal and communication module and portrait face gatherCamera is all connected with special trade data storage PC, number of units after described special tradeBe connected described point of streaming server and general headquarters' database with dividing a streaming server according to storage PCConnect, described general headquarters database is connected with Ministry of Public Security data bank by designated port.
7. Internet authentication trusted system according to claim 6, its feature existsIn: also comprise PC main frame, described Internet authentication trusted system terminal and portraitFace's acquisition camera with one to one or many-one pattern be connected with PC main frame.
8. Internet authentication trusted system according to claim 6, its feature existsIn: described backstage PC main frame reads according to Internet authentication trusted system terminalThe relevant information of China second-generation identity card part is uploaded to special trade back-end data storage PC,Described special trade data storage PC is according to the geographical position of special trade actual needsPreserve on the spot.
9. an Internet authentication trusted system authentication method, is characterized in that:
Step 1: by the extraordinary mould of the secure decryption in Internet authentication trusted system terminalPiece read ID number code and identity document IC intelligence in China second-generation identity card part chipsThe sequence number code of energy card, then read citizen ID certificate by SAM secure decryption moduleAll information in part chips and surface and image, text and data and identity numbering and certificate;
Step 2: by the acquisition camera captured identity certificate holder's of portrait face portrait facePortion's image;
Step 3: by chip id number in the portrait face image of now adopting and China second-generation identity card partAccording to body in the sequence number code of code, identity document IC intelligent cards and citizen ID certificateIn part numbering and identity document, all character image information sends to special trade backstageData storage is preserved;
Step 4: in the China second-generation identity card part chip storing in special trade data storageSequence number code, the citizenship of ID number code, identity document IC intelligent cardsIn card, identity numbering and face image information are uploaded on long-range point of streaming server, all the other citizensIdentity document Word message is kept in special trade back-end data memory on the spot.
Step 5: ID number generation in the China second-generation identity card part chip in described point of streaming serverIn the sequence number code, citizen ID certificate of code, identity document IC intelligent cards, identity is compiledNumber and face image information send to general headquarters' database and register and retain;
Step 6: general headquarters' database is by ID number generation in the China second-generation identity card part chip of receivingIn the sequence number code, citizen ID certificate of code, identity document IC intelligent cards, identity is compiledNumber and face image information exchange cross designated port and be sent to Ministry of Public Security's data bank numberIt is believed that breath comparison;
Step 7: Ministry of Public Security's data bank feeds back to information comparison result in general headquarters' database;
Step 8: if portrait face image information and identity document phase that result of determination is holderPass information matches success, data are deposited in general headquarters' database, and general headquarters' database concurrency sendSpecify secret signal A to a point streaming server, a point streaming server sends to secret signal ASpecial trade data storage PC, the special trade data storage PC letter of maintaining secrecyNumber A sends to Internet authentication trusted system terminal will show and point out identity cardThe all information of part;
Step 9: if result of determination is ID number generation in holder's China second-generation identity card part chipThe sequence number code of code and identity document IC intelligent cards, or portrait face image informationUnsuccessful with identity document information matches, the log-on data that sends general headquarters' database is deletedRemove, general headquarters' database concurrency send specifies secret signal B to a point streaming server, shunting serviceSecret signal B is sent to special trade data storage PC, special trade data by deviceSecret signal B is sent to Internet authentication trusted system terminal by storage PCComparison information result;
Step 10: after step 9 sends to Internet authentication trusted system terminal, mutuallyNetworking authentication trusted system terminal will show and point out warning.
10. Internet authentication trusted system authentication method according to claim 9,It is characterized in that: the extraordinary row in described Internet authentication trusted system terminal and backstageIndustry data storage PC is that cable network connects or wireless network connects.
11. Internet authentication trusted system authentication methods according to claim 9,It is characterized in that: described Internet authentication trusted system terminal can also be for mobileCommunication apparatus.
12. Internet authentication trusted system authenticating parties according to claim 11Method, is characterized in that: when Internet authentication trusted system terminal is that mobile communication is establishedWhen standby, secret signal A is that certificate form is kept at mobile communication equipment, can be for specifyingRoutine call.
CN201610147743.0A 2016-03-15 2016-03-15 Internet identity authentication trusted system and terminal and authentication method Pending CN105608362A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610147743.0A CN105608362A (en) 2016-03-15 2016-03-15 Internet identity authentication trusted system and terminal and authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610147743.0A CN105608362A (en) 2016-03-15 2016-03-15 Internet identity authentication trusted system and terminal and authentication method

Publications (1)

Publication Number Publication Date
CN105608362A true CN105608362A (en) 2016-05-25

Family

ID=55988291

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610147743.0A Pending CN105608362A (en) 2016-03-15 2016-03-15 Internet identity authentication trusted system and terminal and authentication method

Country Status (1)

Country Link
CN (1) CN105608362A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106098070A (en) * 2016-06-21 2016-11-09 佛山科学技术学院 A kind of identity identifying method and network system
CN109063463A (en) * 2018-06-26 2018-12-21 上海常仁信息科技有限公司 A kind of robot ID card verification method
CN109447029A (en) * 2018-11-12 2019-03-08 公安部第三研究所 Electronic identity license generates system and method
CN109981525A (en) * 2017-12-27 2019-07-05 航天信息股份有限公司 Identity information authentication method, terminal, server and system
CN110148236A (en) * 2019-04-30 2019-08-20 广州微证互联网有限公司 A kind of identification authentication system
CN110214455A (en) * 2016-12-22 2019-09-06 土耳其技术研究与开发联合股份公司 System for personal authentication
CN110443740A (en) * 2019-07-30 2019-11-12 广州大白互联网科技有限公司 A kind of identity identifying method and system
CN110533427A (en) * 2019-08-13 2019-12-03 中电智能技术南京有限公司 A kind of unmanned tobacco vending method authenticated based on Internet of Things and trusted identity
CN112070188A (en) * 2020-08-28 2020-12-11 湖北中科网络科技股份有限公司 Identity authentication method and system based on space-time uniqueness
CN112926519A (en) * 2021-03-29 2021-06-08 安徽华典大数据科技有限公司 Identity recognition system based on quantum secret data
KR20220159207A (en) * 2021-05-25 2022-12-02 오성시스템 주식회사 Non face-to-face identification assistive device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1564184A (en) * 2004-04-21 2005-01-12 苏明儒 Credentials information identifying system
US7346778B1 (en) * 2000-11-29 2008-03-18 Palmsource, Inc. Security method and apparatus for controlling the data exchange on handheld computers
CN104951727A (en) * 2015-07-03 2015-09-30 江苏买卖网电子商务有限公司 Second-generation ID card data verification system and method based on NFC (near field communication) technology
CN105138985A (en) * 2015-08-25 2015-12-09 北京拓明科技有限公司 Real-name authentication method based on WeChat public number and system
CN205827374U (en) * 2016-03-15 2016-12-21 苏明儒 Internet authentication trusted system and terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7346778B1 (en) * 2000-11-29 2008-03-18 Palmsource, Inc. Security method and apparatus for controlling the data exchange on handheld computers
CN1564184A (en) * 2004-04-21 2005-01-12 苏明儒 Credentials information identifying system
CN104951727A (en) * 2015-07-03 2015-09-30 江苏买卖网电子商务有限公司 Second-generation ID card data verification system and method based on NFC (near field communication) technology
CN105138985A (en) * 2015-08-25 2015-12-09 北京拓明科技有限公司 Real-name authentication method based on WeChat public number and system
CN205827374U (en) * 2016-03-15 2016-12-21 苏明儒 Internet authentication trusted system and terminal

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106098070B (en) * 2016-06-21 2019-12-17 佛山科学技术学院 identity authentication method and network system
CN106098070A (en) * 2016-06-21 2016-11-09 佛山科学技术学院 A kind of identity identifying method and network system
CN110214455A (en) * 2016-12-22 2019-09-06 土耳其技术研究与开发联合股份公司 System for personal authentication
CN109981525A (en) * 2017-12-27 2019-07-05 航天信息股份有限公司 Identity information authentication method, terminal, server and system
CN109063463A (en) * 2018-06-26 2018-12-21 上海常仁信息科技有限公司 A kind of robot ID card verification method
CN109447029A (en) * 2018-11-12 2019-03-08 公安部第三研究所 Electronic identity license generates system and method
CN109447029B (en) * 2018-11-12 2022-09-02 公安部第三研究所 Electronic identity card photo generation system and method
CN110148236A (en) * 2019-04-30 2019-08-20 广州微证互联网有限公司 A kind of identification authentication system
CN110443740A (en) * 2019-07-30 2019-11-12 广州大白互联网科技有限公司 A kind of identity identifying method and system
CN110533427A (en) * 2019-08-13 2019-12-03 中电智能技术南京有限公司 A kind of unmanned tobacco vending method authenticated based on Internet of Things and trusted identity
CN112070188A (en) * 2020-08-28 2020-12-11 湖北中科网络科技股份有限公司 Identity authentication method and system based on space-time uniqueness
CN112926519A (en) * 2021-03-29 2021-06-08 安徽华典大数据科技有限公司 Identity recognition system based on quantum secret data
KR20220159207A (en) * 2021-05-25 2022-12-02 오성시스템 주식회사 Non face-to-face identification assistive device
KR102561729B1 (en) * 2021-05-25 2023-07-31 오성시스템 주식회사 Non face-to-face identification assistive device

Similar Documents

Publication Publication Date Title
CN105608362A (en) Internet identity authentication trusted system and terminal and authentication method
CN104134253B (en) A kind of gate control system and gate inhibition's deployment method
CN104167041B (en) The gate control system and its control method used based on smart mobile phone
CN107578519A (en) A kind of intelligent access control system and intelligent entrance guard method for unlocking
CN205827374U (en) Internet authentication trusted system and terminal
CN105005720B (en) Computer security control system
CN105279416A (en) Identity recognition method and system based on multi-biometric feature in combination with device fingerprint
CN107294721A (en) The method and apparatus of identity registration, certification based on biological characteristic
CN102800017A (en) Identity verification system based on face recognition
CN105187217A (en) Dual-factor identity authentication method and apparatus thereof
CN105488495A (en) Identity identification method and system based on combination of face characteristics and device fingerprint
CN103714315A (en) Identity authentication method based on biological feature information
CN103226703A (en) Identity authentication and management system based on biological feature identification technology
CN106710032B (en) Entrance guard opening method and device
CN103259800A (en) Internet login system based on face recognition and internet login method
CN107038509A (en) Self-service registration-management system
CN202815870U (en) Certificate photograph and face automatic identification system
CN203616756U (en) Fingerprint identity verifying system in Internet bar
CN205015906U (en) Anti -fake verification system of electron certificate
CN110032851A (en) A kind of login system being used to encrypt file polling platform based on recognition of face
CN106971363A (en) A kind of police service way system
CN111368334A (en) Safety maintenance system based on data asset data in database
CN110084020A (en) A kind of recognition of face passenger information system and implementation method
CN205427857U (en) Identity identification system based on many biological characteristics combine equipment fingerprint
CN202838367U (en) Security identity card fingerprint authentication device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160525