CN108985409B - Identity card information reading method and device and electronic equipment - Google Patents

Identity card information reading method and device and electronic equipment Download PDF

Info

Publication number
CN108985409B
CN108985409B CN201810789233.2A CN201810789233A CN108985409B CN 108985409 B CN108985409 B CN 108985409B CN 201810789233 A CN201810789233 A CN 201810789233A CN 108985409 B CN108985409 B CN 108985409B
Authority
CN
China
Prior art keywords
identity
authentication
information
identity card
card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810789233.2A
Other languages
Chinese (zh)
Other versions
CN108985409A (en
Inventor
董成根
严硕
刘海龙
郭宏杰
亓文华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Eidlink Information Technology Co ltd
Original Assignee
Eidlink Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Eidlink Information Technology Co ltd filed Critical Eidlink Information Technology Co ltd
Priority to CN201810789233.2A priority Critical patent/CN108985409B/en
Publication of CN108985409A publication Critical patent/CN108985409A/en
Application granted granted Critical
Publication of CN108985409B publication Critical patent/CN108985409B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Credit Cards Or The Like (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The embodiment of the application provides an identity card information reading method and device and electronic equipment. The method comprises the following steps: acquiring authentication information of the identity card based on an authentication strategy for authenticating the identity card; authenticating the authentication information, and acquiring the unique identification code of the identity card and the biological characteristics of the identity holder after the authentication information is successfully authenticated; inquiring an identity information database, and judging whether the identity information database stores the unique identification code and the biological characteristics at the same time, wherein the identity information database stores the association relation of the unique identification code, the biological characteristics and the identity information; and if the unique identification code and the biological characteristics are stored at the same time, acquiring the identity information corresponding to the unique identification code and the biological characteristics. This application is through authenticating the ID card, has realized carrying out the purpose of judging the true and false of ID card, reduces the time of carrying out identity information reading to the ID card that passes through the authentication, ensures the true validity of the identity information who reads, has improved the identity information and has read the success rate.

Description

Identity card information reading method and device and electronic equipment
Technical Field
The application relates to the technical field of identity card information reading, in particular to an identity card information reading method and device and electronic equipment.
Background
The identity card is one of legal certificates for proving the identity of a holder, and identity information needs to be read in places needing identity verification, such as hotels, railway stations and the like. The related identity card reading technology generally realizes the purpose of reading identity information by directly reading ciphertext information of an identity card or reading a unique identification code of the identity card. The cipher text information reading mode is influenced by factors such as the interaction times, the success rate of reading the identity card is low, the time is long, the user experience is poor, the authenticity of the identity card cannot be judged through the unique identification code mode, and therefore the real validity of the read identity information cannot be guaranteed after the identity card is forged.
Disclosure of Invention
The application provides a method and a device for reading identity card information and electronic equipment, which are used for judging the authenticity of an identity card and ensuring the authenticity and validity of the read identity information.
In a first aspect, a method for reading identity card information is provided, where the method includes: acquiring authentication information of the identity card based on an authentication strategy for authenticating the identity card; authenticating the authentication information, and acquiring the unique identification code of the identity card and the biological characteristics of the identity holder after the authentication information is successfully authenticated; inquiring an identity information database, and judging whether the identity information database stores the unique identification code and the biological characteristics at the same time, wherein the identity information database stores the association relation of the unique identification code, the biological characteristics and the identity information; and if the unique identification code and the biological characteristics are stored at the same time, acquiring the identity information corresponding to the unique identification code and the biological characteristics.
In a second aspect, an identification card information reading apparatus is provided, the apparatus including: the authentication information acquisition module is used for acquiring authentication information of the identity card based on an authentication strategy for authenticating the identity card; the identification code acquisition module is used for authenticating the authentication information and acquiring the unique identification code of the identity card and the biological characteristics of the identity holder after the authentication information is successfully authenticated; the identification code query module is used for querying an identity information database and judging whether the unique identification code and the biological characteristics are simultaneously stored in the identity information database, and the identity information database stores the association relation of the unique identification code, the biological characteristics and the identity information; and the identity information acquisition module is used for acquiring the identity information corresponding to the unique identification code and the biological characteristics if the unique identification code and the biological characteristics are stored at the same time.
In a third aspect, a server is provided, and the electronic device includes: one or more processors; a memory; one or more application programs, wherein the one or more application programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to: and executing the identity card information reading method.
In a fourth aspect, there is provided a computer-readable storage medium having stored thereon a computer program, wherein the program is for implementing an identification card information reading method when executed by a processor.
The technical scheme provided by the embodiment of the application has the following beneficial effects: this application is through authenticating the ID card, realized carrying out the purpose of judging to the true and false of ID card, the time of directly reading ID card ciphertext information cost is verified to the true and false of ID card has been got rid of, thereby reduce the time of carrying out identity information reading to the ID card through the authentication, finally carry out identity information through unique identification code and ID card possessor's biological characteristic and compare, play the accuracy of the identity information who guarantees to read through the mode of testimony and testimony unification, the success rate of reading of identity information has been improved, user experience has been improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings used in the description of the embodiments of the present application will be briefly described below.
Fig. 1 is a schematic flowchart of an identity card information reading method according to an embodiment of the present disclosure;
fig. 2 is a schematic flowchart of another method for reading information of an identification card according to an embodiment of the present disclosure;
fig. 3 is a schematic flowchart of an authentication method according to an embodiment of the present application;
fig. 4 is a schematic flowchart of another method for passing line authentication according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an identification card information reading apparatus according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of another identification card information reading apparatus according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of an electronic device of an identification card information reading apparatus according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to the embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are exemplary only for the purpose of explaining the present application and are not to be construed as limiting the present application.
As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or wirelessly coupled. As used herein, the term "and/or" includes all or any element and all combinations of one or more of the associated listed items.
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
In the related identity information reading technology, identity information reading is generally carried out through identity ciphertext information, namely the identity information is directly read, or the identity information is read through the unique identification code of the identity card, so that the unique identification code of the identity card is copied, the identity information is easy to forge, and real and effective identity information cannot be read.
The method, the device and the electronic equipment for reading the identity card information aim to solve the technical problems in the prior art.
The following describes the technical solutions of the present application and how to solve the above technical problems with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
Example one
The embodiment of the application provides an identity card information reading method, as shown in fig. 1, the method includes:
s101, acquiring authentication information of the identity card based on an authentication strategy for authenticating the identity card;
s102, authenticating the authentication information, and acquiring the unique identification code of the identity card and the biological characteristics of the identity holder after the authentication information is successfully authenticated;
s103, inquiring an identity information database, and judging whether the identity information database simultaneously stores a unique identification code and biological characteristics, wherein the identity information database stores an association relation among the unique identification code, the biological characteristics and identity information;
and S104, if the unique identification code and the biological characteristics are stored at the same time, acquiring the identity information corresponding to the unique identification code and the biological characteristics.
This application is through authenticating the ID card, carry out identity information to the ID card through the authentication and read and played the effect of judging the ID card true and false, prevent to carry out under the prerequisite of authentication unsuccessful (false ID card promptly), get rid of the time that directly reads the ciphertext information cost of the ID card of true and false unconscious, thereby reduce the time of carrying out identity information to the ID card through the authentication and reading, carry out identity information through unique identification code and ID card possessor's biological characteristic simultaneously and compare, play and guarantee the accuracy of the identity information who reads through the mode of testimony of the people unification, the identity information reading success rate has been improved, user experience nature has been improved.
The identity card information reading method can be applied to terminal equipment (such as an identity card reader) with an identity information reading function, and can also be applied to cloud equipment communicated with the terminal equipment. When the method is applied to terminal equipment, the identity card is placed on the terminal equipment, the terminal equipment acquires authentication information of the identity card, so that the terminal equipment can conveniently authenticate according to the received authentication information, directly acquires the unique identification code of the identity card and biological characteristics (such as fingerprints and voice) of an identity card holder after the authentication is successful, matches the unique identification code and the biological characteristics with an identity information database, judges whether the unique identification code and the biological characteristics are stored at the same time, and acquires the identity information corresponding to the unique identification code and the biological characteristics if the unique identification code and the biological characteristics are stored at the same time.
When the authentication method is applied to cloud equipment such as a server, the cloud equipment is connected with terminal equipment with an identity information reading function, the terminal equipment reads authentication information of an identity card and uploads the authentication information to the cloud equipment, and the cloud equipment performs authentication processing according to the received authentication information. After the authentication is passed, the cloud end equipment sends a unique identification code reading instruction to the terminal equipment, the terminal equipment reads the unique identification code of the identity card according to the unique identification code instruction, meanwhile, the cloud end equipment sends a biological characteristic reading instruction of an identity card holder to the terminal equipment, and the terminal equipment reads the biological characteristic and uploads the biological characteristic to the cloud end equipment. Therefore, the cloud device receives the unique identification code and the biological characteristics, the cloud device carries out matching query on the unique identification code and the biological characteristics and the identity information database, judges whether the unique identification code and the biological characteristics are stored in the identity information database at the same time, acquires the identity information corresponding to the unique identification code and the biological characteristics if the unique identification code and the biological characteristics are stored in the identity information database at the same time, and finally sends the identity information to the terminal device.
Example two
The embodiment of the present application provides another authentication method for authenticating authentication information, which further includes the authentication method shown in the second embodiment on the basis of the first embodiment, where as shown in fig. 2, the method includes:
s201, acquiring authentication information of the identity card based on an authentication strategy for authenticating the identity card;
s202, authenticating the authentication information, and acquiring the unique identification code of the identity card and the biological characteristics of the identity holder after the authentication information is successfully authenticated;
s203, inquiring an identity information database, and judging whether the identity information database simultaneously stores a unique identification code and biological characteristics, wherein the identity information database stores an association relation among the unique identification code, the biological characteristics and identity information;
s204, if the unique identification code and the biological characteristics are not stored at the same time, acquiring the ciphertext information of the identity card;
s205, the ciphertext information is decrypted to obtain the identity information corresponding to the ciphertext information.
The identity card is authenticated, identity information reading is carried out on the authenticated identity card, the purpose of judging the authenticity of the identity card is achieved, the time spent on reading the false identity card is prevented from being removed on the premise that authentication is unsuccessful (namely, the false identity card), and therefore the time spent on reading the identity information of the authenticated identity card is reduced; the embodiment provides the technical problem that the identity information cannot be read when the unique identification code and the biological characteristics are not simultaneously stored in the identity information database, and the identity information is directly read according to the effective ciphertext information of the identity card, so that the success rate of reading the identity information is improved.
Specifically, the method provided by this embodiment may be applied to the terminal device or the cloud device connected to the terminal device with reference to the embodiment. Under the condition that the unique identification code and the biological characteristics are not simultaneously stored in the identity information database, directly reading the ciphertext information of the identity card by using the terminal equipment, and finally decrypting the ciphertext information by using the terminal equipment to obtain corresponding identity information; or after the terminal equipment is used for directly reading the ciphertext message of the identity card, the ciphertext message is uploaded to the cloud equipment, and the cloud equipment decrypts the ciphertext message to obtain the corresponding identity information.
EXAMPLE III
The embodiment of the present application provides an authentication information obtaining method, which further includes an authentication method shown in the third embodiment on the basis of the first embodiment or the second embodiment, as shown in fig. 3, where S101 or S201 includes:
s301, sending an authentication instruction to the identity card according to the authentication strategy;
s302, acquiring authentication data fed back by the identity card according to the authentication instruction, wherein the authentication data is the encrypted authentication instruction;
the authentication information is authenticated in S102 or S202, including S303 (not shown in the figure), wherein,
s303, decrypting the encrypted authentication instruction, and determining whether the authentication of the identity card is successful according to a decryption result.
Before the authentication method is used, a private key for encrypting the authentication instruction and a public key for decrypting the authentication instruction are respectively stored on the identity card and the terminal equipment or the cloud equipment for reading the identity card information provided by the application.
When the method for reading the identity card information provided by this embodiment is applied to a terminal device (such as an identity card reader) having an identity information reading function, the terminal device directly sends an authentication instruction (specifically, a group of random codes) to the identity card, the identity card encrypts the authentication instruction by using a stored private key to obtain authentication data, and the identity returns the authentication data to the terminal device.
When the identity card information reading method provided by this embodiment is applied to the cloud device, the cloud device sends an authentication instruction to an identity through a terminal device (such as an identity information reader) having an identity information reading function, the terminal device uploads authentication data returned by the identity card according to the authentication instruction to the cloud device, the cloud device decrypts the received authentication data by using a public key, and if decryption is successful, it is determined that authentication is successful, otherwise authentication is failed.
In the embodiment, the authentication instruction is generated conveniently, so that the authentication completed in the authentication mode through the authentication instruction is quick, the authentication time is shortened, the authentication efficiency is improved, and the user experience is high.
Example four
The embodiment of the present application provides another authentication information obtaining method, which further includes an authentication method shown in a fourth embodiment on the basis of the first embodiment or the second embodiment, as shown in fig. 4, where S101 or S201 includes:
s401, providing an authentication mode corresponding to the authentication strategy according to the authentication strategy;
s402, receiving authentication information input based on an authentication mode, wherein the authentication mode comprises identity card image authentication and/or image authentication of an identity card holder;
the authentication information is authenticated in S102 or S202, including S403, S404, and S405, which are not shown in the drawing, wherein,
s403, acquiring an identity card image corresponding to identity card image authentication or a user image corresponding to image authentication of an identity card holder according to an authentication mode;
s404, inquiring an identity information database, and judging whether an identity card image or a user image is stored in the identity information database, wherein the identity information database stores the association relation between identity information and the identity card image or the user image;
s405, if the matching data is stored, the authentication is successful.
The embodiment provides two authentication modes of identity card image authentication and identity card holder image authentication. In particular, the two authentication methods may be included at the same time.
When the method for reading identity card information provided by this embodiment is applied to a terminal device (such as an identity information reader) having an identity information reading function, an authentication manner corresponding to an authentication policy, such as identity card image authentication and/or identity card holder image authentication, is provided on the terminal device. The user receives authentication information input based on an authentication mode through the terminal equipment, namely receives an identity card image and/or a user image, the terminal equipment inquires an identity information database and judges whether the identity card image or the user image is stored in the identity information database, the identity information database stores the association relation between the identity information and the identity card image or the user image, so that the terminal equipment can judge the authentication success according to the received identity card image or the user image, if the identity information and the identity card image or the user image are stored, the authentication is passed, otherwise, if the authentication fails, the authentication is passed, otherwise, the authentication fails.
When the method for reading the identity card information provided by the embodiment is applied to the cloud device, the cloud device provides an authentication mode corresponding to an authentication policy, such as identity card image authentication and/or identity card holder image authentication, through a terminal device (such as an identity information reader) having an identity information reading function. The user receives authentication information input based on an authentication mode through the terminal device, namely an identity card image and/or a user image are/is received through the terminal device, the terminal device uploads the received authentication information to the cloud device, so that the cloud device can inquire an identity information database and judge whether the identity card image or the user image is stored in the identity information database, the association relation between the identity information and the identity card image or the user image is stored in the identity information database, if the association relation between the identity information and the identity card image or the user image is stored, the authentication is passed, and if the association relation is stored, the authentication is failed.
When the authentication modes are various, the user can select through the terminal equipment, so that the authentication information corresponding to the authentication mode selected by the user is received.
It should be noted that, the authentication by the authentication instruction provided in the third embodiment or the authentication manner provided in the fourth embodiment is to authenticate the identity card, so as to ensure the authenticity and validity of the identity card, prevent reading of identity information of a counterfeit identity card, and ensure the accuracy of reading of identity information. Therefore, in specific application, authentication can be performed through the authentication instruction according to the embodiment; optionally, the authentication is performed by referring to the image authentication of the identity card or the image authentication of the identity card holder provided in the fourth embodiment; or, with reference to the third embodiment and the fourth embodiment, several authentication manners of performing authentication, identity card image authentication, and image authentication of an identity card holder according to the authentication instruction are provided, and more specifically, in a case where several authentication manners of performing authentication by the authentication instruction, performing identity card image authentication, and image authentication of the identity card holder are provided at the same time, one of the authentication manners may be selected as a default authentication manner, and in a case where the default authentication manner fails, another authentication manner is provided.
Further, in this embodiment, authenticating the authentication information further includes: judging whether the identity card image falls into a first image acquisition frame or not, or judging whether the user image falls into a second image acquisition frame or not, wherein a first information display limiting mark frame is arranged in the first image acquisition frame, and a second information display limiting mark frame is arranged in the second image acquisition frame; and if the identification card image does not fall into the image authentication system, acquiring the identification card image corresponding to the identification card image authentication or the user image corresponding to the image authentication of the identification card holder again according to the authentication mode.
The embodiment judges the received identity card image or the user image through the first acquisition frame or the second acquisition frame, thereby ensuring that the received identity card image is a complete image falling into the first acquisition frame and ensuring that the received user image is a complete image falling into the second acquisition frame, so as to authenticate the identity card image or the user image. This application is gathered the frame through first collection frame, second and is judged ID card image and user's image respectively, judges whether meet the demands to guarantee received authentication information's accuracy, for reading identity information provides the assurance, prevent because of ID card image or the unqualified influence of user's image to the authentication of ID card
EXAMPLE five
An embodiment of the present application provides an identification card information reading apparatus, as shown in fig. 5, the identification card information reading apparatus 50 may include: an authentication information acquisition module 501, an identification code acquisition module 502, an identification code query module 503, and an identity information acquisition module 504, wherein,
an authentication information obtaining module 501, configured to obtain authentication information of an identity card based on an authentication policy for authenticating the identity card;
an identification code obtaining module 502, configured to authenticate the authentication information, and obtain a unique identification code of the identity card and a biometric feature of the identity holder after the authentication information is successfully authenticated;
the identification code query module 503 is configured to query the identity information database, and determine whether the identity information database stores the unique identification code and the biometric feature at the same time, and the identity information database stores an association relationship between the unique identification code, the biometric feature, and the identity information;
an identity information obtaining module 504, configured to obtain identity information corresponding to the unique identification code and the biometric feature if the unique identification code and the biometric feature are stored at the same time.
This embodiment is through the authentication to the identity card, the true validity of identity card has been guaranteed, prevent because of carrying out the increase of reading the work load that identity information read caused to counterfeit identity card, the identity information reading time of increase, on the true effectual basis of identity card guaranteeing, utilize the only identifying code completion of identity card to the reading of identity information, the true validity of identity card has both been guaranteed, the security that identity information read has been improved, the efficiency that identity information read is provided simultaneously, the user's latency who reduces, high user experience nature has been improved.
Further, as shown in fig. 6, the apparatus 50 further includes: a ciphertext obtaining module 505 and a ciphertext parsing module 506, wherein,
a ciphertext obtaining module 505, configured to obtain ciphertext information of the identity card if the unique identifier and the biometric feature are not stored at the same time;
and the ciphertext parsing module 506 is configured to decrypt the ciphertext information to obtain the identity information corresponding to the ciphertext information.
The embodiment ensures that when the unique identification code and the biological characteristics do not exist in the identity information database at the same time, the identity information is obtained by reading the ciphertext of the identity card, so that the situation that the identity information cannot be read because the identity information corresponding to the unique identification code is not stored in the identity information database after the authentication mode passes is prevented, the identity information is obtained according to the ciphertext information of the identity card, the true validity of the identity card is ensured, and the purpose of reading the identity information is also ensured.
Further, the authentication information obtaining module 501 is configured to send an authentication instruction to the identity card according to the authentication policy; acquiring authentication data fed back by the identity card according to the authentication instruction, wherein the authentication data is the encrypted authentication instruction; the identification code obtaining module 502 is configured to decrypt the encrypted authentication instruction, and determine whether the authentication of the identity card is successful according to a decryption result.
Further, the authentication information obtaining module 501 is configured to provide an authentication manner corresponding to the authentication policy according to the authentication policy; receiving authentication information input based on an authentication mode, wherein the authentication mode comprises identity card image authentication and/or image authentication of an identity card holder;
the identification code obtaining module 502 is configured to obtain an identity card image corresponding to identity card image authentication or a user image corresponding to image authentication of an identity card holder according to an authentication manner; inquiring an identity information database, and judging whether an identity card image or a user image is stored in the identity information database, wherein the identity information database stores the association relation between identity information and the identity card image or the user image; and if the matching data is stored, the authentication is successful. Further, the identification code obtaining module 502 is configured to obtain a corresponding identity card image or a user image of an identity card holder according to the authentication information; judging whether the identity card image falls into a first image acquisition frame or not, or judging whether the user image falls into a second image acquisition frame or not, wherein a first information display limiting mark frame is arranged in the first image acquisition frame, and a second information display limiting mark frame is arranged in the second image acquisition frame; and if the identification card does not fall into the corresponding identification card image or the user image of the identification card holder is obtained again according to the authentication information.
This application is gathered the frame through first collection frame, second and is judged ID card image and user's image respectively, judges whether meet the demands to guarantee the accuracy of received authentication information, for reading identity information provides the assurance, prevent because of ID card image or the unqualified authentication of influence of user's image to the ID card.
EXAMPLE six
An embodiment of the present application provides an electronic device, as shown in fig. 7, an electronic device 700 shown in fig. 7 includes: a processor 7001 and a memory 7003. Wherein the processor 7001 and the memory 7003 are coupled, such as via a bus 7002. Optionally, the electronic device 700 may also include a transceiver 7004. Note that the transceiver 7004 is not limited to one in practical use, and the structure of the electronic device 700 is not limited to the embodiment of the present application.
The processor 7001 may be a CPU, general purpose processor, DSP, ASIC, FPGA or other programmable logic device, transistor logic device, hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. The processor 7001 may also be a combination implementing computing functionality, e.g., comprising one or more microprocessors, a combination of DSPs and microprocessors, or the like.
Bus 7002 may include a path to transfer information between the above components. The bus 7002 may be a PCI bus, an EISA bus, or the like. The bus 7002 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in FIG. 7, but this is not intended to represent only one bus or type of bus.
Memory 7003 may be a ROM or other type of static storage device that can store static information and instructions, a RAM or other type of dynamic storage device that can store information and instructions, an EEPROM, a CD-ROM or other optical disk storage, optical disk storage (including compact disk, laser disk, optical disk, digital versatile disk, blu-ray disk, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited to such.
Optionally, the memory 7003 is used for storing application program codes for executing the scheme of the application, and the processor 7001 is used for controlling the execution. The processor 7001 is configured to execute application program codes stored in the memory 7003 to realize the actions of the identification card information reading apparatus provided by the embodiment shown in fig. 5.
The embodiment of the present application provides a computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the method shown in any one of the first to fourth embodiments.
The embodiment of the application provides a computer readable storage medium, compared with the prior art, this application is through authenticating the ID card, carry out identity information to the ID card through the authentication and read the effect of having played the true and false judgement to the ID card true and false, prevent under the prerequisite of authentication unsuccessfully (being false ID card), get rid of the time of reading false ID card cost, thereby reduce the time of carrying out identity information to the ID card through the authentication and read, carry out identity information through unique identification code and identity card possessor's biological characteristic simultaneously and read, play and guarantee the accuracy of the identity information who reads through the mode of testimony of the people unification, the success rate of reading of identity information is improved, user experience nature is improved.
The embodiment of the application provides a computer-readable storage medium which is suitable for the method embodiment. And will not be described in detail herein.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least a portion of the steps in the flow chart of the figure may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
The foregoing is only a partial embodiment of the present application, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present application, and these modifications and decorations should also be regarded as the protection scope of the present application.

Claims (8)

1. An identity card information reading method is applied to equipment and comprises the following steps:
sending a group of random codes to an identity card according to an authentication strategy, and acquiring encrypted data fed back by the identity card, wherein an encryption key is prestored in the identity card, a decryption key corresponding to the encryption key is prestored in the equipment, and the encrypted data is obtained by encrypting the random codes by the identity card according to the encryption key;
decrypting the encrypted data according to the decryption key;
when the decryption is successful, determining that the identity card is successfully authenticated, and acquiring a unique identification code of the identity card and the biological characteristics of an identity holder;
inquiring an identity information database, and judging whether the unique identification code and the biological characteristics are simultaneously stored in the identity information database, wherein the association relation among the unique identification code, the biological characteristics and the identity information is stored in the identity information database;
and if the unique identification code and the biological characteristics are stored at the same time, acquiring identity information corresponding to the unique identification code and the biological characteristics.
2. The method of claim 1, further comprising:
if the unique identification code and the biological characteristics are not stored at the same time, acquiring ciphertext information of the identity card;
and decrypting the ciphertext information to obtain the identity information corresponding to the ciphertext information.
3. The method of claim 1, further comprising:
providing an authentication mode corresponding to the authentication strategy according to the authentication strategy;
receiving authentication information input based on the authentication mode, wherein the authentication mode comprises identity card image authentication and/or image authentication of an identity card holder;
the determining that the authentication of the identity card is successful comprises:
acquiring an identity card image corresponding to identity card image authentication or a user image corresponding to image authentication of an identity card holder according to the authentication mode;
querying an identity information database;
and if the identity card image or the user image is stored in the identity information database, determining that the authentication is successful, wherein the association relation between the identity information and the identity card image or the user image is stored in the identity information database.
4. The method of claim 3, wherein the authenticating the authentication information further comprises:
judging whether the identity card image falls into a first image acquisition frame or not, or judging whether the user image falls into a second image acquisition frame or not, wherein a first information display limiting mark frame is arranged in the first image acquisition frame, and a second information display limiting mark frame is arranged in the second image acquisition frame;
and if the identification card image does not fall into the image authentication system, acquiring the identification card image corresponding to the identification card image authentication or the user image corresponding to the image authentication of the identification card holder again according to the authentication mode.
5. An identity card information reading device is characterized by being applied to equipment and comprising:
the authentication information acquisition module is used for sending a group of random codes to an identity card according to an authentication strategy and acquiring encrypted data fed back by the identity card, wherein an encryption key is prestored in the identity card, a decryption key corresponding to the encryption key is prestored in the equipment, and the encrypted data is obtained by encrypting the random codes by the identity card according to the encryption key;
the identification code acquisition module is used for decrypting the encrypted data according to the decryption key, determining that the identity card is successfully authenticated when the decryption is successful, and acquiring the unique identification code of the identity card and the biological characteristics of the identity holder;
the identification code query module is used for querying an identity information database and judging whether the unique identification code and the biological characteristics are simultaneously stored in the identity information database, and the identity information database stores the association relation of the unique identification code, the biological characteristics and the identity information;
and the identity information acquisition module is used for acquiring the identity information corresponding to the unique identification code and the biological characteristics if the unique identification code and the biological characteristics are stored at the same time.
6. The apparatus of claim 5, further comprising:
the ciphertext acquisition module is used for acquiring ciphertext information of the identity card if the unique identification code and the biological characteristics are not stored at the same time;
and the ciphertext analysis module is used for decrypting the ciphertext information to obtain the identity information corresponding to the ciphertext information.
7. An electronic device, comprising:
one or more processors;
a memory;
one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to: executing the identity card information reading method according to any one of claims 1 to 4.
8. A computer-readable storage medium on which a computer program is stored, the program being characterized by implementing the identification card information reading method of any one of claims 1 to 4 when executed by a processor.
CN201810789233.2A 2018-07-18 2018-07-18 Identity card information reading method and device and electronic equipment Active CN108985409B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810789233.2A CN108985409B (en) 2018-07-18 2018-07-18 Identity card information reading method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810789233.2A CN108985409B (en) 2018-07-18 2018-07-18 Identity card information reading method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN108985409A CN108985409A (en) 2018-12-11
CN108985409B true CN108985409B (en) 2022-04-26

Family

ID=64549649

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810789233.2A Active CN108985409B (en) 2018-07-18 2018-07-18 Identity card information reading method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN108985409B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110752914B (en) * 2019-09-03 2023-04-18 青岛海泰新光科技股份有限公司 Identification device and identity authentication system
CN113282903A (en) * 2020-03-26 2021-08-20 深圳怡化电脑股份有限公司 Authentication method and device for electronic card
CN112597988A (en) * 2020-06-01 2021-04-02 支付宝实验室(新加坡)有限公司 System suitable for detecting identity card, and device and authentication method associated with system
CN114666142B (en) * 2022-03-28 2023-10-10 杭州海康威视数字技术股份有限公司 Object authentication method, device and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013153118A1 (en) * 2012-04-10 2013-10-17 Sita Information Networking Computing Ireland Limited Airport security check system and method therefor
CN105939196A (en) * 2016-03-15 2016-09-14 天地融科技股份有限公司 Identity authentication method and system
CN107332825A (en) * 2017-06-09 2017-11-07 国政通科技股份有限公司 A kind of client identity authentication method and system
CN107808118A (en) * 2017-09-28 2018-03-16 平安科技(深圳)有限公司 Personal identification method, electronic installation and computer-readable recording medium
CN108091011A (en) * 2017-04-24 2018-05-29 孟庆国 Method and system of the verification technique to equipment progress permission control is unified by the testimony of a witness

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013153118A1 (en) * 2012-04-10 2013-10-17 Sita Information Networking Computing Ireland Limited Airport security check system and method therefor
CN105939196A (en) * 2016-03-15 2016-09-14 天地融科技股份有限公司 Identity authentication method and system
CN108091011A (en) * 2017-04-24 2018-05-29 孟庆国 Method and system of the verification technique to equipment progress permission control is unified by the testimony of a witness
CN107332825A (en) * 2017-06-09 2017-11-07 国政通科技股份有限公司 A kind of client identity authentication method and system
CN107808118A (en) * 2017-09-28 2018-03-16 平安科技(深圳)有限公司 Personal identification method, electronic installation and computer-readable recording medium

Also Published As

Publication number Publication date
CN108985409A (en) 2018-12-11

Similar Documents

Publication Publication Date Title
CN110519260B (en) Information processing method and information processing device
US10498542B2 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
US20190280863A1 (en) Recovery of secret data in a distributed system
US10333705B2 (en) Methods and apparatus for providing attestation of information using a centralized or distributed ledger
CN108985409B (en) Identity card information reading method and device and electronic equipment
CN104765999B (en) Method, terminal and server for processing user resource information
TWI683567B (en) Security verification method, device, server and terminal
CN110086608A (en) User authen method, device, computer equipment and computer readable storage medium
KR101658501B1 (en) Digital signature service system based on hash function and method thereof
CN103201998B (en) For the protection of the data processing of the local resource in mobile device
JP5601729B2 (en) How to log into a mobile radio network
CN103413159B (en) A kind of RFID electronic certificate off-line false proof realization method and system of Jianzhen based on CPK
CN111556007B (en) Identity verification method, device and equipment based on block chain and storage medium
EP3779792B1 (en) Two-dimensional code generation method, data processing method, apparatus, and server
CN103546289B (en) USB (universal serial bus) Key based secure data transmission method and system
WO2018145127A1 (en) Electronic identification verification methods and systems with storage of certification records to a side chain
CN106452770B (en) Data encryption method, data decryption method, device and system
CN106534171B (en) Security authentication method, device and terminal
CN110290134A (en) A kind of identity identifying method, device, storage medium and processor
CN106059760B (en) A kind of cryptographic system from user terminal crypto module calling system private key
CN112235260B (en) Anonymous data storage method, device, equipment and storage medium
CN105553654A (en) Key information query processing method and device and key information management system
CN109495268A (en) A kind of two dimension code authentication method, device and computer readable storage medium
CN111770081B (en) Role authentication-based big data confidential file access method
CN113849797A (en) Method, device, equipment and storage medium for repairing data security vulnerability

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant