CN111934770B - Identity authentication method and system combining visible light technology - Google Patents

Identity authentication method and system combining visible light technology Download PDF

Info

Publication number
CN111934770B
CN111934770B CN202010938003.5A CN202010938003A CN111934770B CN 111934770 B CN111934770 B CN 111934770B CN 202010938003 A CN202010938003 A CN 202010938003A CN 111934770 B CN111934770 B CN 111934770B
Authority
CN
China
Prior art keywords
information
identity
authentication
request
visible light
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010938003.5A
Other languages
Chinese (zh)
Other versions
CN111934770A (en
Inventor
杨小东
邹骁
王朝阳
肖智翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Youcheng Zhilian Information Technology Co ltd
Original Assignee
Zhejiang Youcheng Zhilian Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Youcheng Zhilian Information Technology Co ltd filed Critical Zhejiang Youcheng Zhilian Information Technology Co ltd
Priority to CN202010938003.5A priority Critical patent/CN111934770B/en
Publication of CN111934770A publication Critical patent/CN111934770A/en
Application granted granted Critical
Publication of CN111934770B publication Critical patent/CN111934770B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/11Arrangements specific to free-space transmission, i.e. transmission through air or vacuum
    • H04B10/114Indoor or close-range type systems
    • H04B10/116Visible light communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention provides an identity authentication method and an identity authentication system which are combined with a visible light technology, the method is combined with the visible light communication technology and a credible identity authentication system to realize safe and efficient identity authentication and identification of a user, visible light is transmitted between devices in a form of a secret code, and the visible light does not carry sensitive information, so that the safety performance of identity authentication and identification is improved in the mode; and the identity authentication method has low requirement on equipment and high universality.

Description

Identity authentication method and system combining visible light technology
Technical Field
The invention relates to the field of optical communication, in particular to an identity authentication method and system combining a visible light technology.
Background
The identity card is a document for proving the identity of a holder, and is a proving tool for the unique citizen identity of each person. In many scenes of life, in order to prove that the identities of specific people all need to be authenticated, the current authentication methods mainly include the following three methods:
1. the entity identity document is swiped and matched with a face recognition technology: this is the most common one, but there are: the entity identity document is inconvenient to carry and is easy to lose and the safety coefficient of identity information is low: the entity identity document is easy to be shot and acquired by illegal persons when being taken out and used, the stolen identity document number can be used for illegal purposes, and in addition, the entity identity document is very troublesome once being lost, and an individual is required to specially go to a government office to handle hung and new identity documents.
2. The two-dimensional code network certification is matched with a face recognition technology: in this way, the entity identity document is replaced by the two-dimensional code network document, but still exists: the two-dimensional code information is easily stolen and the problem of inconvenient authentication operation: the two-dimensional code exists in the form of a plain code after being generated, an illegal person can shoot and steal the two-dimensional code information in a photographing mode, in addition, a requester needs to accurately focus the two-dimensional code on the recognizer to finish identity recognition, and the identity recognition is influenced by the authentication environment, for example, the two-dimensional code network certificate can be hardly recognized well in rainy days, indoor environments without lighting, at night and the like.
And 3, matching the NFC network authentication with a face recognition technology: in this approach, NFC is used to transfer identity document information, but this approach currently exists: poor universality: the requirements on hardware and software of the mobile phone are higher, only the high-end mobile phone is configured with the NFC function at present, and the above-mentioned identity authentication mode can be realized only by configuring the NFC function.
In summary, the current internet identity authentication methods have some problems, and it is a necessary trend to obtain an efficient and secure internet identity authentication method.
Disclosure of Invention
The invention aims to provide an identity authentication method and an identity authentication system which are combined with a visible light technology, the method is combined with the visible light communication technology and a CTID system to realize safe and efficient identity authentication and identification of a user, visible light is transmitted between devices in a form of a secret code, and the visible light does not carry sensitive information, so that the safety performance of the identity authentication and identification is improved in the mode; and the identity authentication method has low requirement on equipment and high universality.
In order to achieve the above object, the present invention provides an identity authentication method combining a visible light technology, comprising the following steps: the method comprises the steps that a request terminal device obtains a unique identification code of an electronic identity card, converts the unique identification code into optical data, and sends visible light fused with the optical data to an identification terminal device, wherein the unique identification code of the electronic identity card is coded data corresponding to user identity information generated by a cloud authentication terminal; the identification end equipment extracts the unique identification code of the electronic identity card, the identification end equipment and/or the request end equipment transmit the unique identification code of the electronic identity card and the real-time face image to the cloud authentication end, and the cloud authentication end is combined with the credible identity authentication platform to perform identity authentication to obtain authentication information; the authentication information is transmitted back to the requesting terminal device and/or the identification terminal.
In addition, this scheme provides an identity authentication system who combines visible light technique, includes: the system comprises request end equipment, identification end equipment, a cloud authentication end and a trusted identity authentication platform; the request terminal equipment sends an identification request to the cloud authentication terminal to obtain a unique identification code of the electronic identity card, converts the unique identification code of the electronic identity card into optical data, and sends visible light fused with the optical data to the identification terminal equipment, wherein the unique identification code of the electronic identity card is coded data corresponding to user identity information generated by the cloud authentication terminal; the identification end equipment acquires the unique identification code of the electronic identity card, and the identification end equipment and/or the request end equipment transmit the unique identification code of the electronic identity card and the real-time face image to the cloud authentication end; the cloud authentication end acquires a unique identification code of the electronic identity card and the identity information of a requester, and transmits the identity information and the real-time face image to the trusted identity authentication platform, wherein the trusted identity authentication platform performs identity verification based on the identity information and the real-time face image and feeds back the identification information; the request end equipment is at least provided with a light-emitting device, and the identification end equipment is at least provided with an image acquisition device.
Compared with the prior art, the technical scheme aims at the problems that the entity identity document is inconvenient to carry, the identity safety coefficient is low, the two-dimensional code network card safety coefficient is influenced by the environment, the NFC universality is poor and the like in the identity authentication process at present, the unique identification code of the electronic identity card is adopted to replace the entity identity document of the user by means of the visible light technology, the unique identification code of the electronic identity card is transmitted between the identification end and the request end in the form of optical data, the optical data does not carry the information of the real identity card citizen identity number of the user, even if the optical data is stolen, the identity information in the optical data cannot be cracked by an illegal person, and the safety coefficient in the identity authentication of the user.
Drawings
Fig. 1 is a schematic diagram of the operation of an identity authentication method in combination with a visible light technology according to an embodiment of the present invention.
Fig. 2 is a block diagram of an identity authentication system incorporating visible light technology according to an embodiment of the present invention.
In the figure: the system comprises a request end device 10, a request communication module 11, an information processing module 12, a visible light sending module 13, an identification end device 20, an identification communication module 21, a visible light receiving module 22, a face image acquisition module 23, an execution module 24, a cloud authentication end 30, an identity information module 31, an unique identification code module 32 of an electronic identity card, a cloud communication module 33, a management data processing module 34, a trusted identity authentication platform 40, an identity verification module 41, a CTID communication module 42, a decryption module 43 and a trusted identity authentication encryption server 50.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments that can be derived by one of ordinary skill in the art from the embodiments given herein are intended to be within the scope of the present invention.
It should be recognized that embodiments of the present invention can be realized and implemented by computer hardware, a combination of hardware and software, or by computer instructions stored in a non-transitory computer readable memory. The methods may be implemented in a computer program using standard programming techniques, including a non-transitory computer-readable storage medium configured with the computer program, where the storage medium so configured causes a computer to operate in a specific and predefined manner, according to the methods and figures described in the detailed description. Each program may be implemented in a high level procedural or object oriented programming language to communicate with a computer system. However, the program(s) can be implemented in assembly or machine language, if desired. In any case, the language may be a compiled or interpreted language. Furthermore, the program can be run on a programmed application specific integrated circuit for this purpose.
Further, the operations of processes described herein can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The processes described herein (or variations and/or combinations thereof) may be performed under the control of one or more computer systems configured with executable instructions, and may be implemented as code (e.g., executable instructions, one or more computer programs, or one or more applications) collectively executed on one or more processors, by hardware, or combinations thereof. The computer program includes a plurality of instructions executable by one or more processors.
The identity authentication method and system provided by the scheme and combined with the visible light technology need to be communicated with the CTID system to complete identity authentication. The CTID, which can be called as a resident identity card online function certificate system, is an Internet and credible identity authentication service application platform and can provide online identity authentication service based on identity cards as trust roots for users. The basic working principle of CTID is as follows: and after the identity information of the user is acquired, inquiring and calling the face photo stored in the database, and then acquiring the photographed photo and comparing the face photo in the database to judge whether the operation action is performed by the user. Since the CTID actually provides a network certificate, the CTID has the effects of easy storage, easy carrying, multiple password guarantee and very safe use, and can greatly reduce the probability of certificate loss and the possibility of being falsely used by people. In the verification process, the network license electronic file cannot transmit or store the citizen privacy information in the internet space. Even if the mobile phone is lost, the possibility that the network certificate is falsely used is very little. Because the generation process of the network card is safe, no information can be kept, and the network card information is bound with the face, the fingerprint and the identity card chip and can hardly be counterfeited. The network certificate information is mastered and checked by the public security organization, a user directly connects the public security database through the information collected by the network certificate, the verification and comparison are carried out by the public security organization, the private information of the citizen is not transmitted or stored in the internet space in the verification process, a third party organization or other people can only receive the authentication information provided by the public security organization, the third party organization or other people are difficult to directly contact the personal information of the citizen, and the information security of the identity authentication method of the scheme is further ensured.
Specifically, the present invention provides an identity authentication method and system combining with visible light technology, as shown in fig. 1, an identity authentication system according to an embodiment of the present invention includes a request device 10, an identification device 20, a cloud authentication end 30 and a trusted identity authentication platform 40, wherein the requesting end device 10 is held by a requester needing to be authenticated, the identification end device 20 is placed in a place needing authentication, the requesting end device 10 may be a smartphone, tablet computer or other electronic device held by the requester, the only requirements are that the requesting end device 10 is equipped with a lighting device (such as a flashlight of a mobile phone), the identification end device 20 is a smart device with a light receiving module, the intelligent equipment can be arranged on a gate in a public place, such as a high-speed rail ticket checking port gate, an entrance gate of a college and university, an entrance gate of an office area and the like.
In some embodiments, the identification-side device 20 and/or the request-side device 10 are camera devices with complete information transmission.
As shown in fig. 2, the request end device 10 at least includes a request communication module 11, an information processing module 12 and a visible light sending module 13, the request communication module 11 is coupled to the information processing module 12, and the information processing module 12 is coupled to the visible light sending module 13, wherein the request communication module 11 communicates with the cloud authentication end 30 in multiple communication modes, and sends an identification request to the cloud authentication end 30 after being triggered, and obtains an identification code unique to the electronic identity card, where the identification code unique to the electronic identity card is encoded data corresponding to user identity information, and the information processing module 12 may be a microprocessor or a chip or other circuits and hardware having related functional elements, and converts the identification code unique to the electronic identity card into optical data that can be fused; the visible light transmitting module 13 includes a light source and a light processing unit, wherein the light processing unit receives the light data of the information processing module 12 and then fuses the light data into visible light with light data generated from the light, a visible light technical algorithm is built in the light processing unit, and the light source transmits the visible light with the light data to the outside. It is worth mentioning that here the optical data does not carry sensitive data.
It should be noted that, in the present solution, the requesting device 10 only needs to have the flash function and the communication function, so that the requirement for the requesting device 10 is low, and the universality of the present solution is relatively improved. Especially compared with the technology of using the NFC function to complete the identity authentication in the prior art, the scheme has better advantages in cost and application scenes.
The identification terminal device 20 at least comprises an identification communication module 21, a visible light receiving module 22 and a face image acquisition module 23, wherein the face image acquisition module 23 is coupled to the visible light receiving module 22 and is triggered to acquire a real-time face image of the requester after acquiring visible light; the recognition communication module 21, the face image acquisition module 23, the visible light receiving module 22 and the cloud authentication terminal 30 are coupled to upload the real-time face image and light data to the cloud authentication terminal 30.
It should be noted that, in the present scheme, the requirement for the identification end device 20 is only to satisfy the communication function and the camera function, the requirement for the identification end device 20 is low, and the face recognition action is performed at the cloud end, so that a complex recognition algorithm does not need to be configured in the identification end device 20, thereby reducing the manufacturing cost of the identification end device 20 and improving the application scenario of the identity authentication system of the present scheme.
In some embodiments, the identification terminal device 20 additionally includes an executing module 24, wherein the executing module 24 is coupled to the identification communication module 21 to obtain the authentication information of the cloud authentication terminal 30 or the trusted identity authentication platform 40, and select to execute or not execute the action according to the authentication information. For example, when the identification terminal device 20 is a gate provided at a high-speed rail ticket checking station, the execution module 24 is connected to control the gate, and after the authentication information meaning "user compliance" is acquired, the execution module 24 opens the gate. Of course, other acts of execution are also not limited.
In addition, in this embodiment, the face image obtaining module 23 is an image obtaining device, which may be a camera device, and obtains the real-time face image of the requester by aligning with the face of the requester. In addition, the face image acquisition module 23 is coupled to the visible light receiving module 22, and controls the camera device to acquire images automatically after the identification terminal device 20 acquires visible light, so as to realize the acquisition of real-time face images, thereby preventing an illegal person from forging face images by using photos of the face of another person or other means.
In some embodiments, the identification-side device 20 does not have the face image obtaining module 23, and the face image is sent to the cloud authentication side 30 by the requesting-side device 10. At this time, the identification terminal device 20 extracts the unique identification code of the electronic identity card from the visible light, information intercommunication occurs between the cloud authentication terminal 30 and the request terminal device 10, and the cloud authentication terminal 30 can prompt the request terminal device 10 to send a real-time face image in various ways.
The cloud authentication end 30 at least comprises an identity information module 31, an unique identification code module 32 of an electronic identity card, a cloud communication module 33 and a management data processing module 34, wherein the management data processing module 34 is coupled to the cloud communication module 33, the identity information module 31 and the unique identification code module 32 of the electronic identity card, the management data processing module 34 matches the identity information module 31 to find the identity information of the user after acquiring the identification request of the request end device 10, and triggers the identification code module 32 to generate the unique identification code of the electronic identity card, wherein the unique identification code of the electronic identity card is the coded data corresponding to the identity information of the user; the cloud communication module 33 is coupled to the identification end device 20, acquires the real-time face image and the unique identification code of the electronic identity card, which are returned by the identification end device 20, and the management data processing module 34 acquires the unique identification code of the electronic identity card, reversely searches the identity information of the user and sends the identity information and the real-time face image to the trusted identity authentication platform 40; the cloud communication module 33 is further coupled to the requesting device 10 to send the final authentication result to the requesting device 10, and in some embodiments, the authentication result is also sent to the identifying device 20.
Wherein the identity information module 31 of the cloud authentication terminal 30 stores the user information of the user using the scheme. In the scheme, a user obtains a unique user account through identity registration at the cloud authentication end 30, correspondingly, the identity information module 31 of the cloud authentication end 30 stores user information of a registered user, and sends an identification request after the user inputs the user account on the request end device 10, wherein the identification request has user account information, and the cloud authentication end 30 obtains the user information according to the user account information.
The cloud authentication end 30 may be a management platform system, where a user performs identity registration on a visual system page to obtain a unique user account, and the user needs to input an own identity card number or other identity information uniquely identifying the user identity during registration, and correspondingly, the cloud authentication end 30 stores the identity information of the user based on the user account. The user logs in the user account of the user in the applet or the software of the request terminal device 10, the applet or the software and the background cloud authentication terminal 30 are in an information intercommunication relationship, then the user triggers an identification request on the applet or the APP software and sends the identification request to the cloud authentication terminal, wherein the identification request has account information of the user, the cloud authentication terminal 30 calls identity information of the user according to the account information of the user after acquiring the identification request, and feeds back a unique identification code of the electronic identity card to the request terminal device 10 based on the identity information.
It is worth mentioning that in the scheme, the identity information or other information of the user is stored in the cloud authentication end 30, the cloud authentication end 30 generates the unique identification code of the electronic identity card, the unique identification code of the electronic identity card is transmitted between the identification end and the request end in the form of optical data, and the optical data does not carry the information of the real identity card citizen identity number of the user, so that the illegal person can be effectively prevented from acquiring the identity information or other important information of the user, and the safety and the efficiency of the whole identity authentication process are improved.
In some embodiments, a trusted identity authentication encryption server 50 is disposed between the cloud authentication end 30 and the trusted identity authentication platform 40, that is, identity information and a real-time face image sent from the cloud authentication end 30 to the trusted identity authentication platform 40 are uniquely encrypted by the trusted identity authentication encryption server 50, and correspondingly, a decryption module is disposed in the trusted identity authentication platform 40 and can decrypt encrypted information sent from the trusted identity authentication encryption server 50. In this way, the security and the secrecy of the identity authentication method of the scheme are further improved.
The trusted identity authentication platform 40 at least comprises an identity authentication module 41, a CTID communication module 42 and a decryption module 43, wherein the decryption module 43 is coupled to the CTID communication module 42, the identity authentication module 41 is coupled to the decryption module 43, the CTID communication module 42 is coupled to the trusted identity authentication encryption server 50 to obtain encrypted information, the decryption module 43 decrypts the encrypted information in a unique manner to obtain decrypted information, wherein the decrypted information at least comprises identity information uploaded by the cloud authentication terminal 30 and a real-time face image, the identity authentication module 41 performs identity authentication according to the identity information and the real-time face image to obtain an authentication result, and the authentication result is returned to the cloud authentication terminal 30 through the CTID communication module 42, and at least one of the request terminal device 10 and the identification terminal device 20.
In some embodiments, if the identity authentication system is not provided with the trusted identity authentication encryption server 50, the trusted identity authentication platform 40 at least includes an identity verification module 41 and a CTID communication module 42, and at this time, the CTID communication module 42 directly obtains the identity information and the real-time face image uploaded by the cloud authentication end 30, and the identity verification module 41 performs verification.
The identity authentication method combined with the visible light technology is described in detail by combining the identity authentication system, namely, the identity authentication method combined with the visible light technology provided by the scheme comprises the following steps:
the request terminal device 10 acquires the unique identification code of the electronic identity card, converts the unique identification code into optical data, and sends visible light fused with the optical data to the identification terminal device 20, wherein the unique identification code of the electronic identity card is encoded data corresponding to the user identity information generated by the cloud authentication terminal 30; the identification end device 20 extracts the unique identification code of the electronic identity card, the request end device 10 and/or the identification end device 20 transmits the unique identification code of the electronic identity card and the real-time face image to the cloud authentication end 30, and the cloud authentication end 30 performs identity verification in combination with the trusted identity authentication platform 40 to obtain authentication information; the authentication information is transmitted back to the requesting device 10 and/or the identifying device 20.
It should be noted that, the important technical point in the scheme is that only the unique identification code of the electronic identity card is transmitted between the requesting end device 10 and the identifying end device 20 instead of the identity information, so that the risks of losing and stealing the identity information are avoided, and the security of identity authentication is improved; in addition, the scheme has low equipment requirements on both the requesting end equipment 10 and the identifying end equipment 20, and further can improve the universality of the identity authentication method and the identity authentication system.
Specifically, the identity authentication method combining the visible light technology comprises the following steps:
the unique identification code requesting step of the electronic identity card comprises the following steps: the request terminal device 10 sends an identification request to the cloud authentication terminal 30, wherein the identification request at least includes account information and request information of a user, the cloud authentication terminal 30 obtains identity information of the user based on the account information of the user and generates a unique identification code of the electronic identity card, and the unique identification code of the electronic identity card is coded data corresponding to the identity information of the user;
an optical communication step: the request end device 10 sends visible light to the identification end device 20, wherein the visible light at least carries an identification code unique to the electronic identity card;
a real-time image acquisition step: the identification end device 20 is triggered to acquire a real-time face image of the requester after acquiring the visible light, or the request end device 10 acquires the real-time face image of the requester, and the identification end device 20 extracts a unique identification code of the electronic identity card in the visible light;
and (3) identity authentication: the identification-side device 20 and/or the request-side device 10 returns the unique identification code of the electronic identity card and the real-time face image to the cloud authentication side 30, and the cloud authentication side 30 acquires the user information of the user based on the unique identification code of the electronic identity card and sends the user information and the real-time face image to the trusted identity authentication platform 40 to acquire the authentication information of the trusted identity authentication platform 40.
It is particularly worth mentioning that the identity verification step in the identity authentication method combining the visible light technology in the present scheme further includes the following steps:
the information of the cloud authentication end 30 is transmitted to the trusted identity authentication platform 40 through the trusted identity authentication encryption server 50, the trusted identity authentication platform 40 uniquely decrypts the encrypted information of the trusted identity authentication encryption server 50 to obtain decrypted information, specifically, the cloud authentication end 30 transmits the user information and the real-time face image to the trusted identity authentication encryption server 50 for unique encryption to obtain encrypted information, and the trusted identity authentication platform 40 uniquely decrypts the encrypted information to obtain decrypted information, wherein the decrypted information at least comprises the identity information and the real-time face image.
In the step of requesting the unique identification code of the electronic identity card, the request terminal device 10 acquires user account information of the user, the cloud authentication terminal 30 stores the user account information and an identification pair corresponding to the user information, and the user account information may be unique account information obtained after the user is registered.
The request information corresponds to an unique identification code request instruction of the electronic identity card, that is, after the cloud authentication end 30 acquires the request information, the user can know that the user needs to request the unique identification code of the electronic identity card, that is, after the cloud authentication end 30 acquires the request information, the unique identification code of the electronic identity card is generated by starting. The request end device 10 is provided with a request button (where the request button may be a physical button or a virtual button), for example, in this scheme, a "flash" virtual button is displayed on the request end device 10, and the request end device 10 generates an identification request after a user clicks the virtual button.
After acquiring the identification request, the cloud authentication terminal 30 matches the identity information of the user according to the identification information, generates a unique identification code of the electronic identity card corresponding to the identity information, and transmits the unique identification code to the request terminal device 10. It should be noted that, in some embodiments, since the unique identification code of the electronic identity card and the correspondence of the real-time face image complement each other, only the cloud authentication end 30 can match the relationship between the two, and in this way, the security of the data can be further ensured while the subsequent verification is completed.
In addition, the unique identification code of the electronic identity card only corresponds to identification information, and the optical data does not carry sensitive information of the real identity card citizen identity number of the user.
In the optical communication step, because the request end device 10 and the identification end device 20 are in visible light communication, in the light focusing of visible light, the verification and marketing process is not limited by the external light environment and the placing angle, the transmission speed of light is very high, and the verification and marketing efficiency is further improved.
In the real-time image obtaining step, the identification end device 20 is triggered to obtain the real-time face image of the requester after obtaining the visible light, so that the face image obtained by the identification end device 20 can be ensured to be the real-time image.
In addition, the method further comprises the following steps after the identity authentication step:
the processing steps are as follows: if the identification-side device 20 acquires the authentication information, the identification-side device 20 selects to execute or not execute an action according to the authentication information. For example, when the identification terminal device 20 is a gate provided at a high-speed rail ticket checking station, the execution module 24 is connected to control the gate, and after the authentication information meaning "user compliance" is acquired, the execution module 24 opens the gate.
The present invention is not limited to the above-mentioned preferred embodiments, and any other products in various forms can be obtained by anyone in the light of the present invention, but any changes in the shape or structure thereof, which have the same or similar technical solutions as those of the present application, fall within the protection scope of the present invention.

Claims (5)

1. An identity authentication method combined with a visible light technology is characterized by comprising the following steps:
the method comprises the steps that a request terminal device (10) sends an identification request to a cloud authentication terminal (30), wherein the identification request at least comprises account information and request information of a user, the cloud authentication terminal (30) obtains identity information of the user based on the account information matching of the user, and dynamically generates a unique identification code of an electronic identity card based on the identity information of the user;
the method comprises the steps that a request end device (10) obtains a unique identification code of an electronic identity card and converts the unique identification code into optical data, the optical data are fused into visible light which generates optical data, the visible light fused with the optical data is sent to a recognition end device (20), the unique identification code of the electronic identity card is coded data which are generated by a cloud authentication end (30) and correspond to user identity information, and the request end device (10) is provided with a light emitting device;
the identification end equipment (20) extracts the unique identification code of the electronic identity card, the identification end equipment (20) and/or the request end equipment (10) transmit the unique identification code of the electronic identity card and the real-time face image to the cloud authentication end (30), and the identification end equipment (20) is provided with a visible light receiving module and image acquisition equipment;
the cloud authentication end (30) acquires a unique identification code of the electronic identity card, reversely searches identity information of a user and sends the identity information and the real-time face image to the credible identity authentication platform (40), the identity information and the real-time face image sent from the cloud authentication end (30) to the credible identity authentication platform (40) are uniquely encrypted through the credible identity authentication encryption server (50) to obtain encrypted information, the credible identity authentication platform (40) uniquely decrypts the encrypted information of the credible identity authentication encryption server (50) to obtain decrypted information, wherein the decrypted information at least comprises the identity information and the real-time face image, and the authentication information is acquired based on the decrypted information to obtain authentication information; the authentication information is transmitted back to the requesting device (10) and/or the identifying device (20).
2. The visible light technology combined identity authentication method of claim 1, wherein the request information corresponds to a request instruction of an identification code unique to the electronic identity card.
3. The identity authentication method combining the visible light technology according to claim 1, wherein the identification end device (20) is triggered to acquire the real-time face image of the requester after acquiring the visible light.
4. The identity authentication method combining the visible light technology according to claim 1, wherein the manner of acquiring the real-time face image by the cloud authentication end (30) includes, but is not limited to, the identification end device (20) extracting the unique identification code of the electronic identity card and acquiring the real-time face image of the requester, or the request end device (10) acquiring the real-time face image of the requester and sending the acquired real-time face image to the cloud authentication end (30).
5. An identity authentication system incorporating visible light technology, comprising:
the system comprises a request terminal device (10), an identification terminal device (20), a cloud authentication terminal (30) and a trusted identity authentication platform (40);
the method comprises the steps that a request terminal device (10) sends an identification request to a cloud authentication terminal (30), wherein the identification request at least comprises account information and request information of a user, the cloud authentication terminal (30) obtains identity information of the user based on the account information matching of the user, and dynamically generates a unique identification code of an electronic identity card based on the identity information of the user, the request terminal device (10) obtains the unique identification code of the electronic identity card, converts the unique identification code of the electronic identity card into optical data, the optical data is fused into visible light which is generated by visible light and has optical data, and sends the visible light fused with the optical data to an identification terminal device (20), wherein the unique identification code of the electronic identity card is coded data which is generated by the cloud authentication terminal (30) and corresponds to the identity information of the user; the identification end equipment (20) extracts the unique identification code of the electronic identity card, and the identification end equipment (20) and/or the request end equipment (10) transmit the unique identification code of the electronic identity card and the real-time face image to the cloud authentication end (30); the cloud authentication end (30) acquires a unique identification code of the electronic identity card, reversely searches identity information of a user, sends the identity information and the real-time face image to the credible identity authentication platform (40), and uniquely encrypts the identity information and the real-time face image which are sent from the cloud authentication end (30) to the credible identity authentication platform (40) through the credible identity authentication encryption server (50) to obtain encryption information;
the credible identity authentication platform (40) uniquely decrypts the encrypted information of the credible identity authentication encryption server (50) to obtain decrypted information, wherein the decrypted information at least comprises identity information and a real-time face image, and the authentication information is obtained based on the decrypted information to obtain authentication information; the request end device (10) is at least provided with a light-emitting device, and the identification end device (20) is at least provided with a visible light receiving module and an image acquisition device.
CN202010938003.5A 2020-09-09 2020-09-09 Identity authentication method and system combining visible light technology Active CN111934770B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010938003.5A CN111934770B (en) 2020-09-09 2020-09-09 Identity authentication method and system combining visible light technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010938003.5A CN111934770B (en) 2020-09-09 2020-09-09 Identity authentication method and system combining visible light technology

Publications (2)

Publication Number Publication Date
CN111934770A CN111934770A (en) 2020-11-13
CN111934770B true CN111934770B (en) 2021-01-29

Family

ID=73310198

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010938003.5A Active CN111934770B (en) 2020-09-09 2020-09-09 Identity authentication method and system combining visible light technology

Country Status (1)

Country Link
CN (1) CN111934770B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106557732A (en) * 2015-09-30 2017-04-05 腾讯科技(深圳)有限公司 A kind of identity identifying method and system
CN109951422A (en) * 2017-12-20 2019-06-28 金联汇通信息技术有限公司 Identity authentication method, system, device and server
CN110533427A (en) * 2019-08-13 2019-12-03 中电智能技术南京有限公司 A kind of unmanned tobacco vending method authenticated based on Internet of Things and trusted identity

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104851166B (en) * 2015-05-08 2018-04-06 邹骁 A kind of gate control system, method and relevant device
CN110400145A (en) * 2018-07-13 2019-11-01 腾讯科技(深圳)有限公司 A kind of digital identity application system and method, identity authorization system and method
CN111091387A (en) * 2019-12-31 2020-05-01 中国银行股份有限公司 Authentication method, device and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106557732A (en) * 2015-09-30 2017-04-05 腾讯科技(深圳)有限公司 A kind of identity identifying method and system
CN109951422A (en) * 2017-12-20 2019-06-28 金联汇通信息技术有限公司 Identity authentication method, system, device and server
CN110533427A (en) * 2019-08-13 2019-12-03 中电智能技术南京有限公司 A kind of unmanned tobacco vending method authenticated based on Internet of Things and trusted identity

Also Published As

Publication number Publication date
CN111934770A (en) 2020-11-13

Similar Documents

Publication Publication Date Title
CN104994114B (en) A kind of identity authorization system and method based on electronic ID card
EP3146744B1 (en) Method, apparatus, and system for providing a security check
CN104065653B (en) A kind of interactive auth method, device, system and relevant device
JP5859953B2 (en) Biometric authentication system, communication terminal device, biometric authentication device, and biometric authentication method
CN104321777B (en) Public identifier is generated to verify the personal method for carrying identification object
KR101812969B1 (en) System for dealing a digital currency with block chain with preventing security and hacking
CN110290134B (en) Identity authentication method, identity authentication device, storage medium and processor
CN106789077A (en) A kind of real name identification method and system
KR101856038B1 (en) System for dealing a digital currency with block chain with preventing security and hacking
CN101420301A (en) Human face recognizing identity authentication system
WO2012097362A2 (en) Protecting codes, keys and user credentials with identity and patterns
CN111095246B (en) Method and electronic device for authenticating user
CN104767617A (en) Message processing method, system and related device
CN117786140A (en) Information processing method, information processing device, electronic equipment and computer readable storage medium
CN106936775A (en) A kind of authentication method and system based on fingerprint recognition
CN107221094A (en) A kind of information encryption and identification system for unmanned delivery equipment
JP2011165102A (en) Biometrics authentication system and portable terminal
JP2023519081A (en) Digital Signature System with Extensible Server
US20190028470A1 (en) Method For Verifying The Identity Of A Person
CN110826038B (en) Data encryption and decryption method and device
CN210536657U (en) Multi-user intelligent password terminal based on biological identification technology
CN111934770B (en) Identity authentication method and system combining visible light technology
CN104462926A (en) Intelligent card identity recognition method and system
US10771970B2 (en) Method of authenticating communication of an authentication device and at least one authentication server using local factor
US20230094432A1 (en) Method, electronic identity object, and terminal for recognizing and/or identifying a user

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant