CN109831441B - Identity authentication method, system and related components - Google Patents
Identity authentication method, system and related components Download PDFInfo
- Publication number
- CN109831441B CN109831441B CN201910133171.4A CN201910133171A CN109831441B CN 109831441 B CN109831441 B CN 109831441B CN 201910133171 A CN201910133171 A CN 201910133171A CN 109831441 B CN109831441 B CN 109831441B
- Authority
- CN
- China
- Prior art keywords
- authentication
- information
- user
- face
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Collating Specific Patterns (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The application discloses an identity authentication method, which comprises the steps of collecting face information of a user, and judging whether the face information of the user passes face identification authentication; if so, determining user login information corresponding to the user face information so that the authentication server can record the corresponding relation between the user login information and the identity verification code; and generating authentication information comprising user login information, and sending the authentication information to the authentication server so that the authentication server executes identity authentication operation according to the corresponding relation. The method can realize the identity authentication with high safety factor and convenience, and also discloses an identity authentication system, a computer readable storage medium and an electronic device, which have the beneficial effects.
Description
Technical Field
The present application relates to the field of information security technologies, and in particular, to a method and a system for identity authentication, a computer-readable storage medium, and an electronic device.
Background
With the further development of the mobile internet, the traditional identity authentication methods in the computer field include static passwords, smart cards, short message password dynamic passwords, two-dimensional code authentication, mailbox authentication, USB KEY, two-factor authentication and other identity authentication methods. In the traditional identity authentication method, the safety coefficient of the static password is low, and a user is easy to forget and crack; the USB KEY and the smart card are inconvenient to carry, easy to lose, easy to damage due to excessive use and troublesome in use steps; the method of two-dimension code authentication, mailbox authentication and short message password dynamic password requires more user interaction and is inconvenient to operate.
At present, the traditional identity authentication method has the problems that passwords are easy to forget and crack, or the password is inconvenient to carry, easy to lose, too much in use and easy to damage, the safety coefficient is low and the like, and the current technology of verifying identity information by using a mobile terminal faces a serious challenge and cannot meet the requirements of modern technological development and social progress.
Therefore, how to implement high-safety and convenient identity authentication is a technical problem that needs to be solved by those skilled in the art at present.
Disclosure of Invention
The application aims to provide an identity authentication method, an identity authentication system, a computer readable storage medium and an electronic device, which can realize high-safety-factor and convenient identity authentication.
In order to solve the above technical problem, the present application provides an identity authentication method, including:
collecting user face information, and judging whether the user face information passes face identification authentication;
if so, determining user login information corresponding to the user face information so that the authentication server can record the corresponding relation between the user login information and the identity verification code;
and generating authentication information comprising user login information, and sending the authentication information to the authentication server so that the authentication server executes identity authentication operation according to the corresponding relation.
Optionally, before acquiring the face information of the user, the method further includes:
receiving a network list sent by an authentication server;
when a network selection instruction is received, determining a target network corresponding to the network selection instruction from a network list;
correspondingly, the sending of the authentication information to the authentication server includes:
authentication information is sent to an authentication server through a target network.
Optionally, the determining whether the face information of the user passes the face recognition authentication includes:
sending the user face information to a face recognition server so that the face recognition server can execute face recognition operation on the user face information to obtain a recognition result;
receiving an identification result sent by a face identification server;
when the recognition result is that the face information passes the face recognition authentication, judging that the face information of the user passes the face recognition authentication;
and when the recognition result is failed, judging that the face information of the user fails the face recognition authentication.
Optionally, determining the user login information corresponding to the user face information includes:
when the face information of the user passes face identification authentication, receiving user login information generated by a face identification server;
correspondingly, the identity verification code is generated by the authentication server according to the verification code generation request sent by the face recognition server.
Optionally, before acquiring the face information of the user, the method further includes:
when a network connection instruction sent by a user is received, generating a portal page, and detecting whether the user inputs an authentication instruction through the portal page; and if so, generating a face recognition instruction.
Optionally, sending the authentication information to the authentication server includes:
sending a portal authentication request to the wireless controller so that the wireless controller generates a public key corresponding to the portal authentication request;
encrypting the user login information by using a public key to obtain authentication information;
authentication information is sent to the wireless controller for the wireless controller to forward the authentication information to the authentication server.
Optionally, before determining the user login information corresponding to the user face information, the method further includes:
and generating a verification code generation request, and sending the verification code generation request to the authentication server so that the authentication server generates the identity verification code.
The present application further provides an identity authentication system, which includes:
the face recognition module is used for collecting the face information of the user and judging whether the face information of the user passes face recognition authentication;
the login information determining module is used for determining user login information corresponding to the user face information when the user face information passes face identification authentication so that the authentication server can record the corresponding relation between the user login information and the identity verification code;
and the authentication module is used for generating authentication information comprising user login information and sending the authentication information to the authentication server so that the authentication server executes identity authentication operation according to the corresponding relation.
Optionally, the method further includes:
the network determining module is used for receiving a network list sent by the authentication server; the network selection device is also used for determining a target network corresponding to the network selection instruction from the network list when the network selection instruction is received;
correspondingly, the authentication module is specifically a module that generates authentication information including user login information and sends the authentication information to the authentication server through the target network.
Optionally, the face recognition module includes:
the information acquisition unit is used for acquiring the face information of the user and sending the face information of the user to the face recognition server so that the face recognition server can execute face recognition operation on the face information of the user to obtain a recognition result;
the judging unit is used for receiving the recognition result sent by the face recognition server; the face recognition authentication module is also used for judging that the face information of the user passes the face recognition authentication when the recognition result is passing; and the face recognition module is also used for judging that the face information of the user does not pass the face recognition authentication when the recognition result is failed.
Optionally, the login information determining module is specifically a module for receiving user login information generated by the face recognition server when the user face information passes face recognition authentication;
correspondingly, the identity verification code is generated by the authentication server according to the verification code generation request sent by the face recognition server.
Optionally, the method further includes:
the Portal authentication module is used for generating a Portal page when receiving a network connection instruction sent by a user and detecting whether the user inputs an authentication instruction through the Portal page; and if so, generating a face recognition instruction.
Optionally, the authentication module includes:
the encryption unit is used for sending a portal authentication request to the wireless controller so that the wireless controller can generate a public key corresponding to the portal authentication request; the public key is used for encrypting the user login information to obtain authentication information;
and the authentication information sending unit is used for sending the authentication information to the wireless controller so that the wireless controller forwards the authentication information to the authentication server.
Optionally, the method further includes:
and the verification code sending module is used for generating a verification code generation request and sending the verification code generation request to the authentication server so that the authentication server can generate the identity verification code.
The present application further provides a computer-readable storage medium, on which a computer program is stored, which, when executed, implements the steps performed by the above-mentioned method for identity authentication.
The application also provides an electronic device, which comprises a memory and a processor, wherein the memory stores a computer program, and the processor calls the computer program in the memory to realize the steps executed by the identity authentication method.
The application provides an identity authentication method, which comprises the steps of collecting face information of a user, and judging whether the face information of the user passes face identification authentication; if so, determining user login information corresponding to the user face information so that the authentication server can record the corresponding relation between the user login information and the identity verification code; and generating authentication information comprising user login information, and sending the authentication information to the authentication server so that the authentication server executes identity authentication operation according to the corresponding relation.
The method comprises the steps of firstly collecting face information of a user, carrying out face recognition according to the face information of the user, and determining user login information corresponding to the face information of the user after passing face recognition authentication so as to establish a corresponding relation between the user login information and an identity verification code in an authentication server. Further, the authentication information including the user login information is generated after the user login information is determined, the authentication information is sent to the authentication server, the authentication server judges whether the identity verification code corresponding to the user login information in the authentication information exists or not according to the corresponding relation recorded before, and if the identity verification code exists, the authentication information passes the identity verification. For the identity authentication mode in the prior art that a user needs to provide information such as a user name, a password or a verification code, the related authentication operation is performed by actively acquiring the face information of the user, the user does not need to additionally input related information about identity authentication, and the identity authentication with high safety factor and convenience is realized. The application also provides an identity authentication system, a computer readable storage medium and an electronic device, which have the beneficial effects and are not repeated herein.
Drawings
In order to more clearly illustrate the embodiments of the present application, the drawings needed for the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings can be obtained by those skilled in the art without inventive effort.
Fig. 1 is a flowchart of an identity authentication method according to an embodiment of the present application;
fig. 2 is a flowchart of an enterprise authentication method based on a face recognition server according to an embodiment of the present application;
FIG. 3 is a schematic view of an enterprise authentication information interaction based on a face recognition server;
fig. 4 is a flowchart of a portal authentication method based on a face recognition server according to an embodiment of the present application;
FIG. 5 is a schematic diagram illustrating portal authentication information interaction based on a face recognition server;
fig. 6 is a flowchart of a method for APP-based enterprise authentication according to an embodiment of the present disclosure;
FIG. 7 is an interaction diagram of enterprise authentication information based on APP;
fig. 8 is a flowchart of a method for APP-based enterprise authentication according to an embodiment of the present disclosure;
FIG. 9 is a schematic diagram illustrating portal authentication information interaction based on APP;
fig. 10 is a schematic structural diagram of an identity authentication system according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Identity authentication is also called as "identity verification" or "identity authentication", and refers to a process of confirming an identity of an operator in a computer and a computer network system, so as to determine whether the user has access and use rights to a certain resource, thereby enabling access policies of the computer and the network system to be reliably and effectively executed, preventing an attacker from impersonating a legitimate user to obtain the access rights of the resource, ensuring the security of the system and data, and authorizing the legitimate interests of the accessor. Since the current identity authentication operation depends on the user to actively input information about the identity of the user, but the authentication method requiring the information actively input by the user has the problems of low safety factor and tedious process, in order to solve the above problems, embodiments for implementing safe and convenient identity authentication are described in the following embodiments.
Referring to fig. 1, fig. 1 is a flowchart of an identity authentication method according to an embodiment of the present disclosure.
The specific steps may include:
s101: collecting user face information, and judging whether the user face information passes face identification authentication; if yes, entering S102; if not, ending the flow;
the implementation subject of this embodiment may be a terminal device used by a user, and the user may obtain some resources or some rights through the terminal device. In the embodiment, a default is that before the face information of the user is collected, there may be a request that the user needs to execute a certain action, but the user is allowed to execute the action only on the premise that the user is judged to have the corresponding authority, so that the user needs to be authenticated first. Before S101, there is a step of generating an identity authentication request, and in this step, face information of a user may be collected according to the identity authentication request.
It can be understood that the purpose of collecting the user face information in this step is to perform face recognition authentication on the user face information. The face recognition and authentication technology is a computer technology for recognizing faces by using analysis and comparison, belongs to a biological feature recognition technology, and is used for distinguishing organism individuals from biological features of organisms (generally, specifically, people). Specifically, the user face information mentioned here is information describing a facial feature of the user, and the user face information collected in this step may be a picture of the user face or face feature data obtained by extracting features of a facial image of the user, and is not specifically limited here.
It should be noted that, the specific process of determining whether the face information of the user passes the face identification authentication may be: comparing the obtained user face information with pre-stored standard face information, and judging that the face identification authentication is passed when the similarity is greater than a preset value; otherwise, it is determined that the face recognition authentication is not passed. Specifically, the execution main body of this embodiment may be a terminal device, and this embodiment defaults to the existence of standard face information corresponding to face recognition software running on the terminal device, and also defaults to the fact that the user has already entered the standard face information, and the standard face information may have a binding relationship with the terminal device or the face recognition software running on the terminal device. Therefore, in this embodiment, when a certain action performed by the user of the terminal device needs to perform authentication, it is necessary to collect the face information of the user who uses the terminal device at the current time, perform face recognition authentication on the face information of the user based on the pre-stored standard face information, and determine whether the user who uses the terminal device currently and the user who has previously entered the standard face information are the same person. When the step judges that the face information of the user passes the face identification authentication, the next step can be carried out; when the step determines that the face information of the user does not pass the face identification authentication, the operation flow of the embodiment can be directly quitted, and new face information of the user can be obtained again to perform face identification authentication operation again, so that the condition of false identification caused by the fact that the shooting angle or the face of the user is shielded can be eliminated.
The above mentioned terminal device may be a mobile terminal or a mobile communication terminal, and the mobile terminal or the mobile communication terminal may be a computer device used in mobile, and may include a mobile phone, a notebook, a tablet computer, a POS machine, and even a vehicle-mounted computer. But most often refer to cell phones or smart phones and tablets with multiple application functions.
S102: determining user login information corresponding to the face information of the user so that the authentication server can record the corresponding relation between the user login information and the identity verification code;
in this step, based on the determination that the user face information has passed the face recognition authentication in S101, the user login information corresponding to the user face information may be determined. The user login information refers to information used for verifying the identity of a user in a user login process, such as a combination of a user name and a user password.
It should be noted that, the information randomly generated by the user login information terminal device or other devices related to face recognition authentication mentioned herein may automatically generate the user login information after the user face information passes the face recognition authentication in S101. The user login information does not need to be input by the user, the user does not know the specific content of the user login information, and the step is equivalent to that the user obtains random information for identity authentication by providing correct face identification information of the user.
The authentication SERVER (AUTH-SERVER) is used for providing authentication SERVER service, supporting functions of adding user name and password, inquiring user name and password and the like. In this embodiment, there may be an operation of performing information interaction with the authentication server, and after determining the user login information corresponding to the user face information, the user login information is transmitted to the authentication server. The authentication server is provided with a table for recording the corresponding relation between the user login information and the identity verification code, and after the user login information is transmitted to the authentication server, the authentication server generates the identity verification code corresponding to the user login information and records the corresponding relation between the user login information and the identity verification code. In order to improve the security of the whole identity authentication process, the identity verification code mentioned here is uniquely corresponding to the user login information.
S103: and generating authentication information comprising user login information, and sending the authentication information to the authentication server so that the authentication server executes identity authentication operation according to the corresponding relation.
After determining the user login information, the step generates authentication information comprising the user login information, and sends the authentication information to an authentication server. It should be noted that the authentication server may store a plurality of corresponding relationships between the user login information and the identity verification code, and after receiving the authentication information, the authentication server obtains the user login information according to the authentication information, determines whether the identity verification code corresponding to the user login information exists, if so, determines that the identity authentication is passed, and if not, determines that the identity authentication is not passed. When the hacker maliciously authenticates the server to send the forged authentication information, the authentication server cannot search the identity verification code corresponding to the authentication information, and the forged authentication information is judged to fail to pass the identity authentication.
The above process combines modern biological recognition technology, and is closely combined with terminal equipment through a computer, and personal identity is identified by utilizing the inherent physiological characteristics and behavior characteristics of human body. In the embodiment, firstly, the face information of the user is collected and the face identification is carried out according to the face information of the user, and after the face identification authentication is passed, the user login information corresponding to the face information of the user is determined so as to establish the corresponding relation between the user login information and the identity verification code in the authentication server. Further, in this embodiment, after determining the user login information, authentication information including the user login information is generated, and the authentication information is sent to the authentication server, and the authentication server determines whether an identity verification code corresponding to the user login information in the authentication information exists through the correspondence recorded before, and if so, it indicates that the authentication information passes the identity verification. For the existing identity authentication mode in which a user needs to provide information such as a user name, a password or a verification code in the prior art, the embodiment performs related authentication operation by actively acquiring face information of the user, and does not need the user to additionally input related information about identity authentication, thereby realizing identity authentication with high safety factor and convenience.
In the identity authentication process of the above embodiment, applicable authentication systems include, but are not limited to, a wireless authentication system and a wired authentication system; the wireless authentication method includes but is not limited to enterprise authentication, Portal authentication, and PSK authentication. The authentication client of the terminal device mentioned above includes, but is not limited to, a mobile phone APP, an SDK providing an embeddable APP, and the like. Suitable terminal devices include but are not limited to ios terminals, android terminals, windows PC terminals, MAC OS terminals and other terminals with smart phone cameras. The identity authentication process includes, but is not limited to, a mode in which the authentication process adopts non-butt encryption and hides a user name and a password.
The face recognition technology can distinguish different individuals through the characteristic information of human bodies, and identity verification can be achieved through the face recognition technology. The following describes the processes of wireless enterprise authentication and Portal authentication by face recognition technology with the identity verification of the terminal equipment as an entry point. Enterprise authentication (such as WPA/WPA 2-enterprise authentication) is a very secure wireless authentication encryption protocol at present, and a user name and a password for enterprise authentication are hidden by combining face recognition authentication, so that the possibility of accidental leakage of the user password can be greatly reduced. The following embodiments default to the APP developer supporting operating the mobile phone system API to set a username and password into the system and perform enterprise authentication. Portal (specifically open + Portal) combines with face recognition authentication, and can also hide user names and passwords used for authentication; based on a Portal authentication mode, an APP developer can complete user authentication only through an HTTP/HTTPS protocol, and the APP does not need to relate to an access process of a wireless network.
The wireless controller provides an interface for adding user authentication information, and is used for user names and passwords used in the authentication process of the two authentication modes, and the user names and the passwords can be divided into APP addition and face recognition server addition according to different objects calling the interface. The face recognition server calls an additional user information interface which is safer than APP calls, but the face recognition server is required to intervene in the wireless controller process.
Referring to fig. 2, fig. 2 is a flowchart of an enterprise authentication method based on a face recognition server according to an embodiment of the present application; this embodiment is a further description of the embodiment corresponding to fig. 1, and a face recognition server is introduced to perform face recognition and identity verification code generation operations, and other steps are basically the same as those in the previous embodiment and may be referred to each other, which is not described herein again.
The specific steps may include:
s201: receiving a network list sent by an authentication server;
referring to fig. 3, fig. 3 is a schematic view illustrating an enterprise authentication information interaction based on a face recognition server. The execution subject of this embodiment may be a computer Application (APP) running on the terminal device, and there may be an operation of opening the APP by the user and obtaining the network list from the authentication server before S201. Taking a wireless network as an example to explain the above process, before S201, there may be an operation of sending a WiFi list query request to an authentication server by the APP, and after receiving a WiFi list sent by the authentication server, the APP may display the WiFi list so that a user knows which SSIDs (Service Set identifiers) the controller configures. The controller mentioned here is used to provide a user authentication system for user identity verification of the accessed terminal, and may be a wireless controller (WAC/AP).
After receiving the network list, there may be an operation of displaying the network list to the user so that the user selects one SSID from the network list for access, i.e., receiving a network selection instruction sent by the user regarding the selected SSID.
S202: when a network selection instruction is received, determining a target network corresponding to the network selection instruction from a network list;
as a preferred embodiment, when the network list only includes one SSID, the network list may not be listed for the user to select, and only one SSID in the network list may be directly determined as the target network without receiving the network selection instruction. It should be noted that, when the present embodiment is applied to enterprise authentication, it is determined that the target network is not equal to the access target network, and a subsequent identity authentication operation is further required before accessing the target network.
S203: the method comprises the steps of collecting user face information, and sending the user face information to a face recognition server so that the face recognition server can execute face recognition operation on the user face information to obtain a recognition result;
after receiving the user FACE information, a FACE-AUTH SERVER (FACE-AUTH SERVER) queries whether the user FACE information is matched with standard FACE information, and if the query is successful, user authentication information needs to be added to the controller. An authentication code (e.g., sessionToken) is requested to identify the complete transaction for each request, and then the add user authentication information interface is invoked. And after the face recognition server receives the returned success of the added user authentication information, the face recognition server returns a face recognition result to the APP, and attaches user login information (such as a user name and a password) for enterprise authentication on the premise that the face recognition result is passed.
S204: receiving an identification result sent by a face identification server; when the recognition result is that the face information passes the face recognition authentication, judging that the face information of the user passes the face recognition authentication, and entering S205; and when the recognition result is failed, judging that the face information of the user fails the face recognition authentication and finishing the process.
S205: determining user login information corresponding to the face information of the user so that the authentication server can record the corresponding relation between the user login information and the identity verification code;
specifically, the process of determining the user login information corresponding to the user face information in this step is as follows: and when the face information of the user passes the face identification authentication, receiving user login information generated by the face identification server. After the face recognition server judges that the face information of the user passes the face recognition verification, the operation that the face recognition server sends a verification code generation request to the authentication server can exist, and the specific process is as follows: the face recognition server generates user login information and then sends a verification code generation request to the authentication server, the authentication server generates an identity verification code and then returns the identity verification code to the face recognition server, and the face recognition server transmits the user login information and the identity verification code to the authentication server together to finish user adding operation. The user adding operation is an operation of recording the corresponding relationship between the user login information and the identity verification code in the authentication server, and checking by the user after recording the corresponding relationship.
S206: and generating authentication information comprising user login information, and sending the authentication information to the authentication server through the target network so that the authentication server executes identity authentication operation according to the corresponding relation.
After receiving the user login information sent by the face recognition server, the APP accesses the target network to the terminal device where the APP is located by default, and sends the authentication information to the authentication server through the target network.
In fig. 3, the information interaction in the dotted line is implemented through an interface provided by the controller, and before the terminal device accesses the controller, the APP sends a data request, which is transmitted through the mobile communication network. The face recognition is accessed to the authentication part, and the authentication server provides 3 interfaces in total to realize the face recognition and the authentication. (1) And acquiring a network list interface for providing the user with the network name (such as the SSID of the wireless network) selected to be accessed. Preferably, the usage scenario for selecting the target network may be different for networks that may be accessed by employees of different levels. (2) And applying for a sessionToken interface for adding the certificate of the user flow, wherein the sessionToken interface can be used only once. (3) And setting a user information interface for adding authentication information for the user after the user passes face recognition for the first time.
The above process is illustrated by taking an access to a wireless network as an example:
firstly, the APP needs to inquire which SSID is configured by the controller, and the APP user can access authentication; then the APP can provide the SSID selected for the user to access, and when the wireless controller returns only one SSID, the APP is recommended to directly perform the following process without listing the SSID list; the APP carries out a face recognition process, and an instant photo is sent to the face recognition server after the APP takes a picture. And the FACE recognition SERVER FACE-AUTH SERVER receives the FACE searching request, inquires FACE information, and if the inquiry is successful, user authentication information needs to be added to the controller. A sessionToken is required to be requested first to identify the complete transaction of each request, and then the interface for adding user authentication information is called. After receiving the authentication information of the added user and returning successfully, the face authentication server returns a face recognition result to the APP, and attaches a user name and a password for enterprise authentication; and after receiving the user name and the password, the APP can perform the operation of accessing the wireless network.
Referring to fig. 4, fig. 4 is a flowchart of a portal authentication method based on a face recognition server according to an embodiment of the present application; this embodiment is a further description of the embodiment corresponding to fig. 1, and a face recognition server is introduced to perform face recognition and identity verification code generation operations, and other steps are basically the same as those in the previous embodiment and may be referred to each other, which is not described herein again.
The specific steps may include:
s301: when a network connection instruction sent by a user is received, generating a portal page, and detecting whether the user inputs an authentication instruction through the portal page; and if so, generating a face recognition instruction.
Referring to fig. 5, fig. 5 is a schematic view illustrating portal authentication information interaction based on a face recognition server. Portal requires the user to manually connect to the SSID in order for the controller to put through traffic to the server that the APP needs to access.
S302: collecting user face information, and sending the user face information to a face recognition server so that the face recognition server can execute face recognition operation on the user face information to obtain a recognition result;
the method comprises the steps of acquiring user face information according to a face recognition instruction and sending the user face information to a face recognition server on the basis of detecting the face recognition instruction. And after receiving the user face information, the face recognition server inquires whether the user face information is matched with the standard face information, and if the inquiry is successful, user authentication information needs to be added to the controller. An authentication code (e.g., sessionToken) is requested to identify the complete transaction for each request, and then the add user authentication information interface is invoked. And after receiving the successful return of the added user authentication information, the face recognition server returns a face recognition result to the APP, and attaches user login information (such as a user name and a password) for portal authentication on the premise that the face recognition result passes.
S303: receiving an identification result sent by a face identification server; when the recognition result is that the face information of the user passes the face recognition authentication, judging that the face information of the user passes the face recognition authentication, and entering S304; and when the recognition result is failed, judging that the face information of the user fails the face recognition authentication and finishing the process.
S304: determining user login information corresponding to the face information of the user so that the authentication server can record the corresponding relation between the user login information and the identity verification code;
s305: when the face information of the user passes face identification authentication, receiving user login information generated by a face identification server so that the authentication server can record the corresponding relation between the user login information and an identity verification code;
specifically, the process of determining the user login information corresponding to the user face information in this step is as follows: and when the face information of the user passes the face identification authentication, receiving user login information generated by the face identification server. After the face recognition server judges that the face information of the user passes the face recognition verification, the operation that the face recognition server sends a verification code generation request to the authentication server can exist, and the specific process is as follows: the face recognition server generates user login information and then sends a verification code generation request to the authentication server, the authentication server generates an identity verification code and then returns the identity verification code to the face recognition server, and the face recognition server transmits the user login information and the identity verification code to the authentication server together to finish user adding operation. The user adding operation is an operation of recording the corresponding relationship between the user login information and the identity verification code in the authentication server, and checking by the user after recording the corresponding relationship.
S306: generating authentication information comprising user login information, and sending a portal authentication request to the controller so that the wireless controller generates a public key corresponding to the portal authentication request;
s307: encrypting the user login information by using a public key to obtain authentication information;
s308: and sending the authentication information to the wireless controller so that the wireless controller forwards the authentication information to the authentication server so that the authentication server executes identity authentication operation according to the corresponding relation.
In fig. 5, the information interaction at the dotted line is implemented through an interface provided by the controller, and in the above process, after the terminal device accesses the controller, the controller lets through the traffic of a server to which the APP needs to access, such as a face recognition server to which the APP is docked. For the part of face recognition access authentication, the controller provides 2 interfaces in total to realize the face recognition access authentication. (1) And applying for a sessionToken interface for adding the certificate of the user flow, wherein the sessionToken interface can be used only once. (2) And setting a user information interface for adding authentication information for the user after the user passes face recognition for the first time. To authenticate this portion of the portal, the controller provides 2 interfaces to coordinate the implementation. (1) And the public key request interface is used for acquiring a controller public key for encrypting a user name and a password before the APP performs portal authentication. (2) And the request authentication interface is used for the APP to carry out portal authentication.
The above process is illustrated by taking an access to a wireless network as an example:
firstly, a user selects a related SSID for wireless connection through a system wifi list. After the terminal is successfully accessed, the system can automatically pop up a portal authentication page after detecting wifi. The portal authentication page provides an 'authentication' button for awakening the APP, needs the APP to support the URL Scheme, and what awakening parameters are needed, and can be configured through the WEB control page of the controller. When the user clicks the "authenticate" button, the APP is automatically awakened. And after the APP is called, carrying out a face recognition process according to the obtained information. The face recognition SERVER carries out face comparison, generates a random password for the user after comparing user information, and then applies for sessionToken from an authentication SERVER (AUTH-SERVER) for subsequent addition of user authentication information. And after receiving the sessionToken, the face recognition server adds user information to the authentication server for subsequent portal authentication, replies an APP face recognition result after receiving the response of the controller, and if the result is successful, carries the user authentication information. And after receiving the authentication information, the APP requests a public key from the authentication address. The APP requests authentication from the authentication address. The process is finished, and the user can access the network through the obtained user role.
Referring to fig. 6, fig. 6 is a flowchart of an APP-based enterprise authentication method according to an embodiment of the present disclosure; this embodiment is a further description of the embodiment corresponding to fig. 1, and the specific steps may include:
s401: receiving a network list sent by an authentication server;
referring to fig. 7, fig. 7 is a schematic diagram of an enterprise authentication information interaction based on APP. The execution main body of this embodiment may be a computer Application (APP) running on the terminal device, and there may be an operation of opening the APP by the user and acquiring the network list from the authentication server before S401, and it should be noted that it is not limited herein whether the network in the network list is a wired network or a wireless network. Taking a wireless network as an example to explain the above process, before S401, there may be an operation of sending, by the APP, a WiFi list query request to the authentication server, and after receiving the WiFi list sent by the authentication server, the APP may display the WiFi list so that the user knows which SSIDs (Service Set identifiers) the controller configures. The controller mentioned here is used to provide a user authentication system for user identity verification of the accessed terminal, and may be a wireless controller (WAC/AP). After receiving the network list, there may be an operation of displaying the network list to the user so that the user selects one SSID from the network list for access, i.e., receiving a network selection instruction sent by the user regarding the selected SSID.
S402: when a network selection instruction is received, determining a target network corresponding to the network selection instruction from a network list;
s403: and generating a verification code generation request, and sending the verification code generation request to the authentication server so that the authentication server generates the identity verification code.
The embodiment is equivalent to the operation executed by the face recognition server in the embodiment corresponding to fig. 2 is executed by shifting to the APP, and there is an operation step in which the APP executes the operation step of acquiring the authentication code and the operation step of face recognition in S404 in this step.
S404: collecting user face information, and judging whether the user face information passes face identification authentication; if yes, entering S405; if not, ending the flow;
s405: determining user login information corresponding to the face information of the user so that the authentication server can record the corresponding relation between the user login information and the identity verification code;
in fig. 7, the information interaction in the dotted line is implemented through an interface provided by the controller, and before the terminal accesses the controller, the APP sends a data request, which is transmitted through the mobile communication network. When the face recognition is connected to the authentication part, the controller provides 3 interfaces to realize the following functions: (1) acquiring a wifi list interface, which is used for providing a wireless network SSID selected to be accessed by a user, wherein the use scenes are different in wireless networks which are possibly accessed by employees of different levels; (2) applying for sessionToken interface for adding user flow certificate, which can be used only once; (3) and setting a user information interface for adding authentication information for the user after the user passes face recognition for the first time.
The above process is illustrated by taking an access to a wireless network as an example:
firstly, the APP inquires which SSIDs are configured by the controller, the APP can be accessed and authenticated by an APP user, then the APP can provide the user with the SSIDs for selecting access, and when the wireless controller only returns one SSID, the APP is recommended to directly perform the following process without listing the SSID list. The APP requests a sessionToken to identify the complete transaction of each request; after the user passes the face recognition authentication, the APP needs to add user information to the controller for subsequent access to the wireless network. And after the APP is successfully added with the user information, the operation of accessing the wireless network can be carried out.
Referring to fig. 8, fig. 8 is a flowchart of an APP-based enterprise authentication method according to an embodiment of the present disclosure; this embodiment is a further description of the embodiment corresponding to fig. 1, and the specific steps may include:
s501: when a network connection instruction sent by a user is received, generating a portal page, and detecting whether the user inputs an authentication instruction through the portal page; and if so, generating a face recognition instruction.
Referring to fig. 9, fig. 9 is a schematic diagram illustrating portal authentication information interaction based on APP. Portal requires the user to manually connect to the SSID in order for the controller to put through traffic to the server that the APP needs to access.
S502: and generating a verification code generation request, and sending the verification code generation request to the authentication server so that the authentication server generates the identity verification code.
The embodiment is equivalent to the operation executed by the face recognition server in the embodiment corresponding to fig. 4 is executed by shifting to the APP, and there is an operation step in which the APP executes the operation step of acquiring the authentication code and the operation step of face recognition in S503.
S503: collecting user face information, and judging whether the user face information passes face identification authentication; if yes, entering S504; if not, the flow is ended.
S504: determining user login information corresponding to the face information of the user so that the authentication server can record the corresponding relation between the user login information and the identity verification code;
s505: generating authentication information comprising user login information, and sending a portal authentication request to the wireless controller so that the wireless controller generates a public key corresponding to the portal authentication request;
s506: encrypting the user login information by using a public key to obtain authentication information;
s507: and sending the authentication information to the wireless controller so that the wireless controller forwards the authentication information to the authentication server so that the authentication server executes identity authentication operation according to the corresponding relation.
In fig. 9, the information interaction at the dotted line is implemented through an interface provided by the controller, and in the above process, after the terminal accesses the controller, the controller lets through the traffic of the server to which the APP needs to access, such as the APP server and the face recognition server which are docked by the APP. The controller provides 3 interfaces for realizing the face recognition access authentication. (1) Applying for sessionToken interface for adding user flow certificate, which can only be used once, (2) setting user information interface for adding authentication information for user after user passes face recognition for the first time. To authenticate this portion of the portal, the controller provides 2 interfaces to coordinate the implementation. (1) And the public key request interface is used for acquiring a controller public key for encrypting a user name and a password before the APP performs portal authentication. (2) And the request authentication interface is used for the APP to carry out portal authentication.
The above process is illustrated by taking an access to a wireless network as an example:
firstly, a user selects a related SSID for wireless connection through a system wifi list. After the terminal is successfully accessed, the system can automatically pop up a portal authentication page after detecting wifi. The portal authentication page provides an 'authentication' button for awakening the APP, needs the APP to support the URL Scheme, and what awakening parameters are needed, and can be configured through the WEB control page of the controller. When the user clicks the "authenticate" button, the APP is automatically awakened. After the APP is called, the authentication SERVER (AUTH-SERVER) is accessed according to the obtained information, and sessionToken is initiated. And after receiving the sessionToken, the APP performs a face recognition process, and generates a user password after the face recognition is passed. The APP adds user information to an authentication SERVER (AUTH-SERVER) for subsequent portal authentication. And after the user is successfully added, requesting a public key from the authentication address. The APP requests authentication from the authentication address, and the process is completed, so that the user can access the network through the obtained user role.
Referring to fig. 10, fig. 10 is a schematic structural diagram of an identity authentication system according to an embodiment of the present application;
the system may include:
the face recognition module 100 is configured to collect user face information and determine whether the user face information passes face recognition authentication;
a login information determining module 200, configured to determine user login information corresponding to the user face information when the user face information passes face identification authentication, so that an authentication server records a corresponding relationship between the user login information and an identity verification code;
and the authentication module 300 is configured to generate authentication information including user login information, and send the authentication information to the authentication server, so that the authentication server performs an identity authentication operation according to the corresponding relationship.
In the embodiment, firstly, the face information of the user is collected and the face identification is carried out according to the face information of the user, and after the face identification authentication is passed, the user login information corresponding to the face information of the user is determined so as to establish the corresponding relation between the user login information and the identity verification code in the authentication server. Further, in this embodiment, after determining the user login information, authentication information including the user login information is generated, and the authentication information is sent to the authentication server, and the authentication server determines whether an identity verification code corresponding to the user login information in the authentication information exists through the correspondence recorded before, and if so, it indicates that the authentication information passes the identity verification. For the existing identity authentication mode in which a user needs to provide information such as a user name, a password or a verification code in the prior art, the embodiment performs related authentication operation by actively acquiring face information of the user, and does not need the user to additionally input related information about identity authentication, thereby realizing identity authentication with high safety factor and convenience.
Further, the system further comprises:
the network determining module is used for receiving a network list sent by the authentication server; the network selection device is also used for determining a target network corresponding to the network selection instruction from the network list when the network selection instruction is received;
correspondingly, the authentication module is specifically a module that generates authentication information including user login information and sends the authentication information to the authentication server through the target network.
Further, the face recognition module 100 includes:
the information acquisition unit is used for acquiring the face information of the user and sending the face information of the user to the face recognition server so that the face recognition server can execute face recognition operation on the face information of the user to obtain a recognition result;
the judging unit is used for receiving the recognition result sent by the face recognition server; the face recognition authentication module is also used for judging that the face information of the user passes the face recognition authentication when the recognition result is passing; and the face recognition module is also used for judging that the face information of the user does not pass the face recognition authentication when the recognition result is failed.
Further, the login information determining module is specifically a module for receiving the user login information generated by the face recognition server when the user face information passes the face recognition authentication;
correspondingly, the identity verification code is generated by the authentication server according to the verification code generation request sent by the face recognition server.
Further, the system further comprises:
the Portal authentication module is used for generating a Portal page when receiving a network connection instruction sent by a user and detecting whether the user inputs an authentication instruction through the Portal page; and if so, generating a face recognition instruction.
Further, the authentication module 300 includes:
the encryption unit is used for sending a portal authentication request to the wireless controller so that the wireless controller can generate a public key corresponding to the portal authentication request; the public key is used for encrypting the user login information to obtain authentication information;
and the authentication information sending unit is used for sending the authentication information to the wireless controller so that the wireless controller forwards the authentication information to the authentication server.
Further, the method also comprises the following steps:
and the verification code sending module is used for generating a verification code generation request and sending the verification code generation request to the authentication server so that the authentication server can generate the identity verification code.
Since the embodiment of the system part corresponds to the embodiment of the method part, the embodiment of the system part is described with reference to the embodiment of the method part, and is not repeated here.
The present application also provides a computer readable storage medium having stored thereon a computer program which, when executed, may implement the steps provided by the above-described embodiments. The storage medium may include: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The present application further provides an electronic device, which may include a memory and a processor, where the memory stores a computer program, and when the processor calls the computer program in the memory, the steps provided in the foregoing embodiments may be implemented. Of course, the electronic device may also include various network interfaces, power supplies, and the like.
The embodiments are described in a progressive manner in the specification, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. For the system disclosed by the embodiment, the description is relatively simple because the system corresponds to the method disclosed by the embodiment, and the relevant points can be referred to the method part for description. It should be noted that, for those skilled in the art, it is possible to make several improvements and modifications to the present application without departing from the principle of the present application, and such improvements and modifications also fall within the scope of the claims of the present application.
It is further noted that, in the present specification, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
Claims (16)
1. A method of identity authentication, comprising:
collecting user face information, and judging whether the user face information passes face identification authentication or not;
if so, determining user login information corresponding to the user face information so that an authentication server can record the corresponding relation between the user login information and an identity verification code;
generating authentication information comprising the user login information, and sending the authentication information to the authentication server so that the authentication server executes identity authentication operation according to the corresponding relation; the user login information is random information for identity authentication.
2. The method of claim 1, further comprising, before collecting the face information of the user:
receiving a network list sent by the authentication server;
when a network selection instruction is received, determining a target network corresponding to the network selection instruction from the network list;
correspondingly, the sending the authentication information to the authentication server includes:
and sending the authentication information to the authentication server through the target network.
3. The method of claim 1, wherein determining whether the user face information passes face recognition authentication comprises:
sending the user face information to a face recognition server so that the face recognition server can execute face recognition operation on the user face information to obtain a recognition result;
receiving an identification result sent by the face identification server;
when the recognition result is that the face information of the user passes the face recognition authentication, judging that the face information of the user passes the face recognition authentication;
and when the recognition result is that the face information of the user does not pass the face recognition authentication, judging that the face information of the user does not pass the face recognition authentication.
4. The method of claim 3, wherein determining user login information corresponding to the user face information comprises:
when the face information of the user passes face identification authentication, receiving user login information generated by the face identification server;
correspondingly, the identity verification code is generated by the authentication server according to a verification code generation request sent by the face recognition server.
5. The method of claim 1, further comprising, before collecting the face information of the user:
when a network connection instruction sent by a user is received, generating a portal page, and detecting whether the user inputs an authentication instruction through the portal page; and if so, generating a face recognition instruction.
6. The method of claim 5, wherein sending the authentication information to the authentication server comprises:
sending a portal authentication request to a wireless controller so that the wireless controller can generate a public key corresponding to the portal authentication request;
encrypting the user login information by using the public key to obtain the authentication information;
sending the authentication information to the wireless controller so that the wireless controller forwards the authentication information to the authentication server.
7. The method according to any one of claims 5 or 6, further comprising, before determining user login information corresponding to the user face information:
and generating a verification code generation request, and sending the verification code generation request to the authentication server so that the authentication server can generate the identity verification code.
8. A system for identity authentication, comprising:
the face recognition module is used for collecting face information of a user and judging whether the face information of the user passes face recognition authentication or not;
the login information determining module is used for determining user login information corresponding to the user face information when the user face information passes face identification authentication so that an authentication server can record the corresponding relation between the user login information and an identity verification code;
the authentication module is used for generating authentication information comprising the user login information and sending the authentication information to the authentication server so that the authentication server can execute identity authentication operation according to the corresponding relation; the user login information is random information for identity authentication.
9. The system of claim 8, further comprising:
the network determining module is used for receiving the network list sent by the authentication server; the network selection device is also used for determining a target network corresponding to the network selection instruction from the network list when the network selection instruction is received;
correspondingly, the authentication module is specifically a module that generates authentication information including the user login information and sends the authentication information to the authentication server through the target network.
10. The system of claim 8, wherein the face recognition module comprises:
the information acquisition unit is used for acquiring user face information and sending the user face information to a face recognition server so that the face recognition server can execute face recognition operation on the user face information to obtain a recognition result;
the judging unit is used for receiving the recognition result sent by the face recognition server; the face recognition module is also used for judging that the face information of the user passes face recognition authentication when the recognition result is passing; and the face recognition module is also used for judging that the face information of the user does not pass the face recognition authentication when the recognition result is that the face information does not pass the face recognition authentication.
11. The system according to claim 10, wherein the login information determination module is specifically a module for receiving the user login information generated by the face recognition server when the user face information passes face recognition authentication;
correspondingly, the identity verification code is generated by the authentication server according to a verification code generation request sent by the face recognition server.
12. The system of claim 8, further comprising:
the Portal authentication module is used for generating a Portal page when receiving a network connection instruction sent by a user and detecting whether the user inputs an authentication instruction through the Portal page; and if so, generating a face recognition instruction.
13. The system of claim 12, wherein the authentication module comprises:
the encryption unit is used for sending a portal authentication request to a wireless controller so that the wireless controller can generate a public key corresponding to the portal authentication request; the public key is used for encrypting the user login information to obtain the authentication information;
and the authentication information sending unit is used for sending the authentication information to the wireless controller so that the wireless controller can forward the authentication information to the authentication server.
14. The system according to any one of claims 12 or 13, further comprising:
and the verification code sending module is used for generating a verification code generating request and sending the verification code generating request to the authentication server so that the authentication server can generate the identity verification code.
15. An electronic device, comprising:
a memory for storing a computer program;
a processor for implementing the steps of the method of identity authentication according to any one of claims 1 to 7 when executing the computer program.
16. A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, which computer program, when being executed by a processor, carries out the steps of the method of identity authentication according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910133171.4A CN109831441B (en) | 2019-02-22 | 2019-02-22 | Identity authentication method, system and related components |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910133171.4A CN109831441B (en) | 2019-02-22 | 2019-02-22 | Identity authentication method, system and related components |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109831441A CN109831441A (en) | 2019-05-31 |
CN109831441B true CN109831441B (en) | 2021-10-22 |
Family
ID=66864119
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910133171.4A Active CN109831441B (en) | 2019-02-22 | 2019-02-22 | Identity authentication method, system and related components |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109831441B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110611719B (en) * | 2019-10-16 | 2022-04-19 | 四川虹美智能科技有限公司 | Message pushing method, server and system |
CN110929660A (en) * | 2019-11-28 | 2020-03-27 | 杭州云徙科技有限公司 | Contract signing method based on face recognition and electronic signature |
CN111310150B (en) * | 2020-01-19 | 2023-04-21 | 湖北工程学院新技术学院 | Security authentication system based on security computer |
CN113032047B (en) * | 2021-03-29 | 2024-07-05 | 京东方科技集团股份有限公司 | Face recognition system application method, electronic equipment and storage medium |
CN116010925B (en) * | 2023-03-30 | 2023-07-18 | 中孚安全技术有限公司 | Safety authentication method and system based on finger vein recognition |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105100097A (en) * | 2015-07-17 | 2015-11-25 | 百度在线网络技术(北京)有限公司 | Identity authentication method and apparatus |
CN105791277A (en) * | 2016-02-26 | 2016-07-20 | 浙江维尔科技股份有限公司 | Identity authentication method |
CN109219044A (en) * | 2017-07-06 | 2019-01-15 | 中兴通讯股份有限公司 | Switching method, mobile terminal and the computer readable storage medium of wireless network |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102281539B (en) * | 2011-08-29 | 2014-10-29 | 惠州Tcl移动通信有限公司 | Mobile terminal and application program login method thereof |
KR101666374B1 (en) * | 2015-02-13 | 2016-10-14 | 크루셜텍 (주) | Method, apparatus and computer program for issuing user certificate and verifying user |
CN106101136B (en) * | 2016-07-22 | 2019-04-12 | 飞天诚信科技股份有限公司 | A kind of authentication method and system of biological characteristic comparison |
CN106411856A (en) * | 2016-09-06 | 2017-02-15 | 北京交通大学 | Authentication method and apparatus based on face recognition of mobile terminal |
-
2019
- 2019-02-22 CN CN201910133171.4A patent/CN109831441B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105100097A (en) * | 2015-07-17 | 2015-11-25 | 百度在线网络技术(北京)有限公司 | Identity authentication method and apparatus |
CN105791277A (en) * | 2016-02-26 | 2016-07-20 | 浙江维尔科技股份有限公司 | Identity authentication method |
CN109219044A (en) * | 2017-07-06 | 2019-01-15 | 中兴通讯股份有限公司 | Switching method, mobile terminal and the computer readable storage medium of wireless network |
Also Published As
Publication number | Publication date |
---|---|
CN109831441A (en) | 2019-05-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109831441B (en) | Identity authentication method, system and related components | |
US12058114B2 (en) | Device identification scoring | |
US10050952B2 (en) | Smart phone login using QR code | |
TWI612792B (en) | Account login method and device | |
US8151326B2 (en) | Using audio in N-factor authentication | |
EP3864541B1 (en) | Progressive access to data and device functionality | |
US8887232B2 (en) | Central biometric verification service | |
US20180034803A1 (en) | Authentication on a computing device | |
CN105323253B (en) | Identity verification method and device | |
WO2015070732A1 (en) | Access control system, authorization method and device thereof, and storage medium | |
CN106910057B (en) | Mobile terminal and security authentication method and device on mobile terminal side | |
US11063935B2 (en) | Systems and methods for providing remote desktop access | |
US9787678B2 (en) | Multifactor authentication for mail server access | |
US20140053251A1 (en) | User account recovery | |
KR20170015038A (en) | System and method for user authentication using mobile number and personal information | |
CN105577619B (en) | Client login method, client and system | |
CN107483503A (en) | A kind of application program login method, apparatus and system | |
JP6122924B2 (en) | Providing device, terminal device, providing method, providing program, and authentication processing system | |
CN105790945B (en) | A kind of authentication method, device and system realizing user's unique identities and authenticating | |
KR20210011577A (en) | Apparatus and Method for Personal authentication using Sim Toolkit and Applet | |
CN109067715B (en) | Verification method and device | |
CN106921632B (en) | Wireless hotspot access control method and device | |
CN114745711B (en) | Cloud business card sending method and device, computer equipment and storage medium | |
CN110708271A (en) | Method for accessing third-party application, aggregation management system and terminal | |
KR20140023085A (en) | A method for user authentication, a authentication server and a user authentication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |