CN112884958A - Electronic certificate identification method and access control equipment - Google Patents

Electronic certificate identification method and access control equipment Download PDF

Info

Publication number
CN112884958A
CN112884958A CN202110143722.2A CN202110143722A CN112884958A CN 112884958 A CN112884958 A CN 112884958A CN 202110143722 A CN202110143722 A CN 202110143722A CN 112884958 A CN112884958 A CN 112884958A
Authority
CN
China
Prior art keywords
electronic certificate
user
identification data
identified
unique identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110143722.2A
Other languages
Chinese (zh)
Inventor
陈慈俤
张乐意
江峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Suixing Software Co ltd
Original Assignee
Fujian Suixing Software Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Suixing Software Co ltd filed Critical Fujian Suixing Software Co ltd
Priority to CN202110143722.2A priority Critical patent/CN112884958A/en
Publication of CN112884958A publication Critical patent/CN112884958A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/26Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition using a biometric sensor integrated in the pass
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/29Individual registration on entry or exit involving the use of a pass the pass containing active electronic elements, e.g. smartcards

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Time Recorders, Dirve Recorders, Access Control (AREA)

Abstract

The invention discloses an electronic certificate identification method and access control equipment, which are used for receiving an electronic certificate to be identified and acquiring user unique identification data in the electronic certificate to be identified; and acquiring the user unique identification data of the user to be identified in real time, judging whether the user unique identification data acquired in real time is the same as the user unique identification data in the electronic certificate to be identified, and if so, passing the identity authentication. When the access control equipment is in an off-line state, the access control equipment can also realize the identity authentication of the user without manual verification.

Description

Electronic certificate identification method and access control equipment
Technical Field
The invention relates to the technical field of data authentication, in particular to an electronic certificate identification method and an access control device.
Background
Based on safety considerations, a plurality of existing facility places are provided with corresponding entrance guards for access restriction, and the facility places can be accessed only after a pre-authorized pass is used for swiping a card to confirm identity. In some fields, a large number of temporary visitors are authorized to have access rights, such as a railway station, a cinema and a bidding site, the access rights of the railway station are based on an identity card or a railway ticket, the access rights of the cinema are based on the identity card or a movie ticket, and the bidding site gives a pass to the pass in advance for card swiping, wherein the pass comprises an entity pass and an electronic certificate.
However, no matter what kind of access control verification is performed, the data are required to be sent to a server background for verification without opening the access control system, so that the access control system cannot confirm access authority of a user if the access control system is offline and cannot be connected with the server due to unstable network and the like, the user can only be verified through manual comparison at present, the accuracy and efficiency of a manual verification mode are low, meanwhile, personal information is required to be published for verification, the user identity is required to be kept secret in some places, and information leakage risks exist in the manual verification mode.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: the electronic certificate identification method and the access control equipment are provided, so that the identity authentication of a user can be realized when the access control equipment is in an offline state.
In order to solve the technical problems, the invention adopts the technical scheme that:
an electronic certificate identification method, comprising the steps of:
s1, receiving the electronic certificate to be identified, and acquiring the unique user identification data in the electronic certificate to be identified;
s2, collecting the user unique identification data of the user to be identified in real time, judging whether the user unique identification data collected in real time is the same as the user unique identification data in the electronic certificate to be identified, and if so, passing the identity authentication.
In order to solve the technical problem, the invention adopts another technical scheme as follows:
an access control device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
s1, receiving the electronic certificate to be identified, and acquiring the unique user identification data in the electronic certificate to be identified;
s2, collecting the user unique identification data of the user to be identified in real time, judging whether the user unique identification data collected in real time is the same as the user unique identification data in the electronic certificate to be identified, and if so, passing the identity authentication.
The invention has the beneficial effects that: an electronic certificate identification method and an access control device store unique identification data of a user in an electronic certificate in advance, and send the electronic certificate to a user terminal in advance. When a user holds a user terminal to transmit an electronic certificate to an access control device, the access control device acquires user unique identification data in the electronic certificate to be identified; and then starting the acquisition equipment to acquire the user unique identification data in real time, and judging whether the user unique identification data acquired in real time is the same as the user unique identification data in the electronic certificate to be identified, if so, the identity authentication is passed, so that when the access control equipment is in an off-line state, manual verification is not needed, and the access control equipment can also realize the identity authentication of the user.
Drawings
FIG. 1 is a schematic diagram of a main flow chart of an electronic certificate identification method according to an embodiment of the present invention;
FIG. 2 is a schematic flow chart of the bid evaluation expert obtaining the electronic voucher according to the embodiment of the present invention;
FIG. 3 is a flowchart illustrating an embodiment of a method for identifying electronic certificates;
fig. 4 is a schematic structural diagram of an access control device according to an embodiment of the present invention.
Description of reference numerals:
1. an access control device; 2. a processor; 3. a memory.
Detailed Description
In order to explain technical contents, achieved objects, and effects of the present invention in detail, the following description is made with reference to the accompanying drawings in combination with the embodiments.
Referring to fig. 1 to 3, an electronic certificate identification method includes the steps of:
s1, receiving the electronic certificate to be identified, and acquiring the unique user identification data in the electronic certificate to be identified;
s2, collecting the user unique identification data of the user to be identified in real time, judging whether the user unique identification data collected in real time is the same as the user unique identification data in the electronic certificate to be identified, and if so, passing the identity authentication.
From the above description, the beneficial effects of the present invention are: and storing the unique identification data of the user in the electronic certificate in advance, and sending the electronic certificate to the user terminal in advance. When a user holds a user terminal to transmit an electronic certificate to an access control device, the access control device acquires user unique identification data in the electronic certificate to be identified; and then starting the acquisition equipment to acquire the user unique identification data in real time, and judging whether the user unique identification data acquired in real time is the same as the user unique identification data in the electronic certificate to be identified, if so, the identity authentication is passed, so that when the access control equipment is in an off-line state, manual verification is not needed, and the access control equipment can also realize the identity authentication of the user.
Further, the step S1 is to receive the to-be-identified electronic certificate, specifically, the to-be-identified electronic certificate transmitted by the user terminal is received through the NFC technology.
As can be seen from the above description, the data transmission is performed through NFC to realize big data transmission, so that sufficient verification data, such as a sufficiently clear picture of a human face, can be stored in the electronic certificate to ensure the accuracy of recognition.
Further, the step S1 specifically includes the following steps:
receiving an encrypted electronic voucher;
acquiring a current time point, and encrypting by taking the current time point as a seed to obtain a current key;
decrypting the encrypted electronic certificate by using the current key to obtain an electronic certificate to be identified;
and acquiring the unique user identification data in the electronic certificate to be identified.
From the above description, it can be known that the current time point is used as the seed for encryption, which ensures that the secret key is dynamically updated along with the change of the time point to prevent the secret key from being cracked, and the secret key is used for encrypting the electronic certificate to prevent the electronic certificate from being leaked, thereby ensuring the security of the electronic certificate.
Further, the step S1 specifically includes the following steps:
receiving an electronic certificate to be identified, and acquiring user identity information, user unique identification data, target information, permission information and electronic certificate information in the electronic certificate to be identified, wherein the user unique identification data is biological identification data, the permission information comprises an access control device ID, the electronic certificate information comprises an electronic certificate physical validity period, and the electronic certificate physical validity period is a preset fixed time range after issuing time;
the step S2 specifically includes the following steps:
s21, judging whether the entrance guard equipment ID in the electronic certificate to be identified is consistent with the entrance guard equipment ID of the local machine, if so, executing a step S22, otherwise, failing to authenticate the identity;
s22, judging whether the current time point is within the physical validity period of the electronic certificate, if so, executing a step S23, otherwise, failing to authenticate the identity;
s23, judging whether the current time point is in the authorized time range, if so, executing a step S24, otherwise, failing to authenticate the identity;
s24, collecting the user unique identification data of the user to be identified in real time, judging whether the user unique identification data is the same as the user unique identification data, if so, passing the identity authentication, and executing the step S25, otherwise, failing the identity authentication;
and S25, displaying the user identity information and the target information.
From the above description, the electronic certificate is verified and confirmed by the gate inhibition device ID, the physical validity period and the authorization time range of the electronic certificate, so as to confirm the right of passage of the electronic certificate and ensure that the authorized user can only enter the authorization place within the authorization time. Meanwhile, the electronic certificate will automatically lose efficacy within a preset fixed time range after the electronic certificate issuing time based on the physical validity period of the electronic certificate, so that the problem that the electronic certificate before being changed can pass due to the fact that the access control equipment cannot synchronize the latest data after the information of the electronic certificate is changed is solved.
Further, the user unique identification data is face picture and/or fingerprint data.
From the above description, the face recognition or fingerprint recognition is adopted, the technology is mature, the application is wide, and the recognition reliability is high.
Referring to fig. 4, an access control apparatus includes a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor executes the computer program to implement the following steps:
s1, receiving the electronic certificate to be identified, and acquiring the unique user identification data in the electronic certificate to be identified;
s2, collecting the user unique identification data of the user to be identified in real time, judging whether the user unique identification data collected in real time is the same as the user unique identification data in the electronic certificate to be identified, and if so, passing the identity authentication.
From the above description, the beneficial effects of the present invention are: and storing the unique identification data of the user in the electronic certificate in advance, and sending the electronic certificate to the user terminal in advance. When a user holds a user terminal to transmit an electronic certificate to an access control device, the access control device acquires user unique identification data in the electronic certificate to be identified; and then starting the acquisition equipment to acquire the user unique identification data in real time, and judging whether the user unique identification data acquired in real time is the same as the user unique identification data in the electronic certificate to be identified, if so, the identity authentication is passed, so that when the access control equipment is in an off-line state, manual verification is not needed, and the access control equipment can also realize the identity authentication of the user.
Further, the step S1 is to receive the to-be-identified electronic certificate, specifically, the to-be-identified electronic certificate transmitted by the user terminal is received through the NFC technology.
As can be seen from the above description, the big data transmission is realized by transmitting data through NFC (Near Field Communication), so that sufficient verification data, such as a clear picture of a human face, can be stored in the electronic certificate to ensure the accuracy of recognition.
Further, the step S1 specifically includes the following steps:
receiving an encrypted electronic voucher;
acquiring a current time point, and encrypting by taking the current time point as a seed to obtain a current key;
decrypting the encrypted electronic certificate by using the current key to obtain an electronic certificate to be identified;
and acquiring the unique user identification data in the electronic certificate to be identified.
From the above description, it can be known that the current time point is used as the seed for encryption, which ensures that the secret key is dynamically updated along with the change of the time point to prevent the secret key from being cracked, and the secret key is used for encrypting the electronic certificate to prevent the electronic certificate from being leaked, thereby ensuring the security of the electronic certificate.
Further, the step S1 specifically includes the following steps:
receiving an electronic certificate to be identified, and acquiring user identity information, user unique identification data, target information, permission information and electronic certificate information in the electronic certificate to be identified, wherein the user unique identification data is biological identification data, the permission information comprises an access control device ID, the electronic certificate information comprises an electronic certificate physical validity period, and the electronic certificate physical validity period is a preset fixed time range after issuing time;
the step S2 specifically includes the following steps:
s21, judging whether the entrance guard equipment ID in the electronic certificate to be identified is consistent with the entrance guard equipment ID of the local machine, if so, executing a step S22, otherwise, failing to authenticate the identity;
s22, judging whether the current time point is within the physical validity period of the electronic certificate, if so, executing a step S23, otherwise, failing to authenticate the identity;
s23, judging whether the current time point is in the authorized time range, if so, executing a step S24, otherwise, failing to authenticate the identity;
s24, collecting the user unique identification data of the user to be identified in real time, judging whether the user unique identification data is the same as the user unique identification data, if so, passing the identity authentication, and executing the step S25, otherwise, failing the identity authentication;
and S25, displaying the user identity information and the target information.
From the above description, the electronic certificate is verified and confirmed by the Identity Document (ID), the physical validity period, the authorization time range, etc. to confirm the passing authority of the electronic certificate, so as to ensure that the authorized user can only enter the authorization place within the authorization time. Meanwhile, the electronic certificate will automatically lose efficacy within a preset fixed time range after the electronic certificate issuing time based on the physical validity period of the electronic certificate, so that the problem that the electronic certificate before being changed can pass due to the fact that the access control equipment cannot synchronize the latest data after the information of the electronic certificate is changed is solved.
Further, the user unique identification data is face picture and/or fingerprint data.
From the above description, the face recognition or fingerprint recognition is adopted, the technology is mature, the application is wide, and the recognition reliability is high.
Referring to fig. 1 to fig. 3, a first embodiment of the present invention is:
in the bidding site, because each bidding site may have a plurality of bids to be bid, and each bid may have a plurality of randomly extracted bidding experts coming to the site, in order to ensure the fairness of bidding, the information of the bidding experts needs to be kept secret. Because the number of people of the bid evaluation experts at each time is large, strange and different every time, a pass needs to be issued to the bid evaluation experts, but when the access control equipment and the local server or the cloud server in the access control system perform communication verification, a scene that the access control equipment cannot perform stable communication or cannot perform communication with the local server or the cloud server in the access control system exists, namely the access control equipment cannot perform identity verification in an offline state, only manual verification can be performed, but the information of the bid evaluation experts needs to be known in advance through the manual verification, and therefore the risk of affecting the bid evaluation fairness exists.
Therefore, the embodiment provides an electronic certificate identification method, which comprises the following steps:
s1, receiving the electronic certificate to be identified, and acquiring the unique user identification data in the electronic certificate to be identified;
in this embodiment, as shown in fig. 2, first, the expert information is collected and evaluated to the access control system, and after the expert uses the user terminal, that is, the mobile phone to download the electronic certificate APP (application, mobile phone software), the electronic certificate in the mobile phone is transmitted to the access control device through the NFC technology when the expert arrives at the bid evaluation site, so that the step S1 of receiving the electronic certificate to be identified specifically is to receive the electronic certificate to be identified transmitted by the user terminal through the NFC technology.
S2, collecting the user unique identification data of the user to be identified in real time, judging whether the user unique identification data collected in real time is the same as the user unique identification data in the electronic certificate to be identified, and if so, passing the identity authentication.
In this embodiment, the unique user identification data is a face image and/or fingerprint data, that is, only face identification or fingerprint identification may be performed, and both may be verified together. The NFC technology is adopted to realize large data transmission, so that the electronic certificate can store enough verification data, such as a clear human face picture, to ensure the accuracy of identification.
Therefore, when the access control equipment is in an off-line state, the access control equipment can also realize the identity authentication of the user without manual verification. And because the electronic certificate is downloaded in advance, the identity can be verified only through the electronic certificate on the spot, and the entrance efficiency is improved.
Of course, when the access control device can communicate with a local server or a cloud server in the access control system, the information of the electronic certificate can be directly submitted to the server for authentication, so that the identity authentication of the user can be realized during networking communication or in an offline state, and the availability of the access control system is improved.
In other equivalent embodiments, the electronic certificate identification method of the embodiment can be applied to other places without fixed people and needing a large amount of identity verification, such as a gymnasium unmanned ticket checking access control system, a cinema unmanned ticket checking access control system, a railway station unmanned ticket checking access control system and the like, so that the entrance efficiency is ensured, and meanwhile, the identity verification of the access control equipment can be realized in an offline state.
Referring to fig. 1 to fig. 3, a second embodiment of the present invention is:
on the basis of the first embodiment, as shown in fig. 3, the step S1 specifically includes the following steps:
receiving an encrypted electronic voucher;
acquiring a current time point, and encrypting by taking the current time point as a seed to obtain a current key;
decrypting the encrypted electronic certificate by using the current key to obtain an electronic certificate to be identified;
receiving an electronic certificate to be identified, and acquiring user identity information, user unique identification data, target information, authority information and electronic certificate information in the electronic certificate to be identified, wherein the user unique identification data is biological identification data, the authority information comprises an access control device ID, the electronic certificate information comprises an electronic certificate physical validity period, and the electronic certificate physical validity period is a preset fixed time range after issuing time;
in this embodiment, the current time point is the current date, so that the key changes with the number of days. In other equivalent embodiments, the number of hours of an authorized time range may be selected as the current time point, i.e. the key is changed according to the hours, so as to ensure that the key is prevented from being cracked by the dynamic key, for example, if the authorized time range is 2020-01-0111:00:00-2020-01-0115:00:00, any one of the preselected time points of 2020-01-0111: 00-2020-01-0115:00:00, 2020-01-0112:00:00, etc. may be used as the seed for encryption, which can further ensure the unpredictability of the dynamic key.
It should be understood that the same key algorithm is used for the keys of the access control device and the access control system.
The user identity information is basic expert information and comprises a user name, a gender, a birth year and month, an identity card, a contact telephone, a work unit, a residence place, a graduation institution, a specialty, qualification information, a face picture, face feature information and fingerprint information, and the face picture, the face feature information and the fingerprint information are unique user identification data and are used for carrying out consistency verification on the arriving experts. The target information includes related information such as a target name, a mark opening time, a target type, an agent company, and an owner unit. The authority information includes site information, an evaluation room, an ID of the access control device, and an authorized time range, for example, the ID of the access control device is 1.
In this embodiment, the physical validity period of the electronic certificate may be set by the electronic certificate module of the access control system according to different scenarios, such as 30 minutes, 2 hours, and so on. The electronic certificate is prevented from being changed and the latest data is not synchronized, so that the electronic certificate before being changed can pass in and out.
Wherein, step S2 specifically includes the following steps:
s21, judging whether the entrance guard equipment ID in the electronic certificate to be identified is consistent with the entrance guard equipment ID of the local machine, if so, executing a step S22, otherwise, failing to authenticate the identity;
s22, judging whether the current time point is within the physical validity period of the electronic certificate, if so, executing a step S23, otherwise, failing to authenticate the identity;
s23, judging whether the current time point is in the authorized time range, if so, executing a step S24, otherwise, failing to authenticate the identity;
s24, collecting the user unique identification data of the user to be identified in real time, judging whether the user unique identification data and the user unique identification data are the same, if so, passing the identity authentication, and executing the step S25, otherwise, failing the identity authentication;
and S25, displaying the user identity information and the target information.
Therefore, the electronic certificate is verified and confirmed by the access control equipment ID, the physical validity period, the authorization time range and the like so as to confirm the passing authority of the electronic certificate and ensure that an authorized user can only enter an authorization place within the authorization time.
Referring to fig. 4, a third embodiment of the present invention is:
an access control device 1 comprises a memory 3, a processor 2 and a computer program stored on the memory 3 and operable on the processor 2, wherein the processor 2 implements the steps of one or two of the above embodiments when executing the computer program.
In summary, the electronic certificate identification method and the access control device provided by the present invention pre-store the user unique identification data in the electronic certificate, encrypt the electronic certificate with the current time point as the seed, and pre-send the encrypted electronic certificate to the user terminal. When a user holds a user terminal and transmits an electronic certificate to an access control device through an NFC technology, the access control device verifies and confirms the electronic certificate through an access control device ID, an electronic certificate physical validity period, an authorization time range and the like so as to confirm the passing authority of the electronic certificate; and then starting the acquisition equipment to acquire the user unique identification data in real time, and judging whether the user unique identification data acquired in real time is the same as the user unique identification data in the electronic certificate to be identified, if so, the identity authentication is passed, so that when the access control equipment is in an off-line state, manual verification is not needed, and the access control equipment can also realize the identity authentication of the user. And when the network communication is carried out, the information of the electronic certificate can be directly submitted to the server for authentication, so that the identity authentication of the user can be realized when the network communication is carried out or the user is in an off-line state, and the availability of the access control system is improved. Meanwhile, the electronic certificate will automatically lose efficacy within a preset fixed time range after the electronic certificate issuing time based on the physical validity period of the electronic certificate, so that the problem that the electronic certificate before being changed can pass due to the fact that the access control equipment cannot synchronize the latest data after the information of the electronic certificate is changed is solved.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all equivalent changes made by using the contents of the present specification and the drawings, or applied directly or indirectly to the related technical fields, are included in the scope of the present invention.

Claims (10)

1. An electronic voucher identification method, comprising the steps of:
s1, receiving the electronic certificate to be identified, and acquiring the unique user identification data in the electronic certificate to be identified;
s2, collecting the user unique identification data of the user to be identified in real time, judging whether the user unique identification data collected in real time is the same as the user unique identification data in the electronic certificate to be identified, and if so, passing the identity authentication.
2. The method according to claim 1, wherein the step S1 of receiving the electronic certificate to be recognized is to receive the electronic certificate to be recognized transmitted from the user terminal by means of NFC technology.
3. The method for identifying electronic certificates according to claim 1, wherein the step S1 specifically comprises the steps of:
receiving an encrypted electronic voucher;
acquiring a current time point, and encrypting by taking the current time point as a seed to obtain a current key;
decrypting the encrypted electronic certificate by using the current key to obtain an electronic certificate to be identified;
and acquiring the unique user identification data in the electronic certificate to be identified.
4. The method for identifying electronic certificates according to claim 1, wherein the step S1 specifically comprises the steps of:
receiving an electronic certificate to be identified, and acquiring user identity information, user unique identification data, target information, permission information and electronic certificate information in the electronic certificate to be identified, wherein the user unique identification data is biological identification data, the permission information comprises an access control device ID, the electronic certificate information comprises an electronic certificate physical validity period, and the electronic certificate physical validity period is a preset fixed time range after issuing time;
the step S2 specifically includes the following steps:
s21, judging whether the entrance guard equipment ID in the electronic certificate to be identified is consistent with the entrance guard equipment ID of the local machine, if so, executing a step S22, otherwise, failing to authenticate the identity;
s22, judging whether the current time point is within the physical validity period of the electronic certificate, if so, executing a step S23, otherwise, failing to authenticate the identity;
s23, judging whether the current time point is in the authorized time range, if so, executing a step S24, otherwise, failing to authenticate the identity;
s24, collecting the user unique identification data of the user to be identified in real time, judging whether the user unique identification data is the same as the user unique identification data, if so, passing the identity authentication, and executing the step S25, otherwise, failing the identity authentication;
and S25, displaying the user identity information and the target information.
5. An electronic certificate identification method as claimed in any of claims 1 to 4, characterised in that said user unique identification data is face picture and/or fingerprint data.
6. An access control device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the following steps when executing the computer program:
s1, receiving the electronic certificate to be identified, and acquiring the unique user identification data in the electronic certificate to be identified;
s2, collecting the user unique identification data of the user to be identified in real time, judging whether the user unique identification data collected in real time is the same as the user unique identification data in the electronic certificate to be identified, and if so, passing the identity authentication.
7. The access control device according to claim 6, wherein the step S1 is implemented by receiving the electronic certificate to be identified, specifically by receiving the electronic certificate to be identified transmitted by the user terminal through NFC technology.
8. The access control device according to claim 6, wherein the step S1 specifically includes the following steps:
receiving an encrypted electronic voucher;
acquiring a current time point, and encrypting by taking the current time point as a seed to obtain a current key;
decrypting the encrypted electronic certificate by using the current key to obtain an electronic certificate to be identified;
and acquiring the unique user identification data in the electronic certificate to be identified.
9. The access control device according to claim 6, wherein the step S1 specifically includes the following steps:
receiving an electronic certificate to be identified, and acquiring user identity information, user unique identification data, target information, permission information and electronic certificate information in the electronic certificate to be identified, wherein the user unique identification data is biological identification data, the permission information comprises an access control device ID, the electronic certificate information comprises an electronic certificate physical validity period, and the electronic certificate physical validity period is a preset fixed time range after issuing time;
the step S2 specifically includes the following steps:
s21, judging whether the entrance guard equipment ID in the electronic certificate to be identified is consistent with the entrance guard equipment ID of the local machine, if so, executing a step S22, otherwise, failing to authenticate the identity;
s22, judging whether the current time point is within the physical validity period of the electronic certificate, if so, executing a step S23, otherwise, failing to authenticate the identity;
s23, judging whether the current time point is in the authorized time range, if so, executing a step S24, otherwise, failing to authenticate the identity;
s24, collecting the user unique identification data of the user to be identified in real time, judging whether the user unique identification data is the same as the user unique identification data, if so, passing the identity authentication, and executing the step S25, otherwise, failing the identity authentication;
and S25, displaying the user identity information and the target information.
10. An access control device as claimed in any one of claims 6 to 9, wherein the user unique identification data is face picture and/or fingerprint data.
CN202110143722.2A 2021-02-02 2021-02-02 Electronic certificate identification method and access control equipment Pending CN112884958A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110143722.2A CN112884958A (en) 2021-02-02 2021-02-02 Electronic certificate identification method and access control equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110143722.2A CN112884958A (en) 2021-02-02 2021-02-02 Electronic certificate identification method and access control equipment

Publications (1)

Publication Number Publication Date
CN112884958A true CN112884958A (en) 2021-06-01

Family

ID=76055766

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110143722.2A Pending CN112884958A (en) 2021-02-02 2021-02-02 Electronic certificate identification method and access control equipment

Country Status (1)

Country Link
CN (1) CN112884958A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113421367A (en) * 2021-06-08 2021-09-21 熵基科技股份有限公司 Access control device passing method, terminal, electronic device and storage medium
CN115223290A (en) * 2022-07-19 2022-10-21 中国银行股份有限公司 Access control method and device, electronic equipment and computer readable storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1574740A (en) * 2003-05-23 2005-02-02 财团法人工业技术研究院 Personal authentication device and method thereof
CN103310141A (en) * 2013-05-03 2013-09-18 周羽 Method and system for monitoring of certificate information security
CN108109080A (en) * 2017-12-29 2018-06-01 深圳春沐源控股有限公司 Hotel occupancy method and device self-service moves in machine and computer readable storage medium
CN108923931A (en) * 2018-06-27 2018-11-30 努比亚技术有限公司 A kind of electronic certificate processing method, equipment and computer readable storage medium
US20190260589A1 (en) * 2017-07-13 2019-08-22 Shenzhen GOODIX Technology Co., Ltd. Identity validity verification method, apparatus and system
US20190327228A1 (en) * 2018-04-24 2019-10-24 Apple Inc. Identity credential verification techniques
CN111489464A (en) * 2020-03-25 2020-08-04 北京小米移动软件有限公司 Identity verification method and device, electronic equipment and computer readable storage medium
CN111815833A (en) * 2020-08-06 2020-10-23 中国人民武装警察部队工程大学 Hotel access control authentication system based on intelligent identification and encryption technology

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1574740A (en) * 2003-05-23 2005-02-02 财团法人工业技术研究院 Personal authentication device and method thereof
CN103310141A (en) * 2013-05-03 2013-09-18 周羽 Method and system for monitoring of certificate information security
US20190260589A1 (en) * 2017-07-13 2019-08-22 Shenzhen GOODIX Technology Co., Ltd. Identity validity verification method, apparatus and system
CN108109080A (en) * 2017-12-29 2018-06-01 深圳春沐源控股有限公司 Hotel occupancy method and device self-service moves in machine and computer readable storage medium
US20190327228A1 (en) * 2018-04-24 2019-10-24 Apple Inc. Identity credential verification techniques
CN108923931A (en) * 2018-06-27 2018-11-30 努比亚技术有限公司 A kind of electronic certificate processing method, equipment and computer readable storage medium
CN111489464A (en) * 2020-03-25 2020-08-04 北京小米移动软件有限公司 Identity verification method and device, electronic equipment and computer readable storage medium
CN111815833A (en) * 2020-08-06 2020-10-23 中国人民武装警察部队工程大学 Hotel access control authentication system based on intelligent identification and encryption technology

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113421367A (en) * 2021-06-08 2021-09-21 熵基科技股份有限公司 Access control device passing method, terminal, electronic device and storage medium
CN115223290A (en) * 2022-07-19 2022-10-21 中国银行股份有限公司 Access control method and device, electronic equipment and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN108604991B (en) Dual-channel authentication agent system capable of detecting tampering of application program and method thereof
US5864667A (en) Method for safe communications
CN105050081B (en) Method, device and system for connecting network access device to wireless network access point
RU2216114C2 (en) Method, mobile device, subscriber identity module (sim), and system for authenticating subscriber or group of subscribers
US8756421B2 (en) Authentication device using true random number generating element or pseudo-random number generating element, authentication apparatus, and authentication method
CN101373528B (en) Electronic payment system, device and method based on position authentication
US8340296B2 (en) Method and system for registering and verifying smart card certificate for users moving between public key infrastructure domains
CN101517598B (en) Legitimacy confirmation system, legitimacy confirming method, information processing card, confirming device and authentication device
CN102510333B (en) Authorization method and system
US20160012272A1 (en) Fingerprint authentication system and a fingerprint authentication method based on nfc
CN106227503A (en) Safety chip COS firmware update, service end, terminal and system
JP2005509231A (en) Stored value data object safety management system and method, and user device for the system
CN105376208B (en) Secure data verification method, system and computer readable storage medium
CN103971043A (en) Identity authentication method and authentication information acquisition method
CN101771680B (en) Method for writing data to smart card, system and remote writing-card terminal
US20130061051A1 (en) Method for authenticating electronic transaction, server, and terminal
CN103914913A (en) Intelligent card application scene recognition method and system
CN112232814A (en) Encryption and decryption method of payment key, payment authentication method and terminal equipment
US8990887B2 (en) Secure mechanisms to enable mobile device communication with a security panel
CN112884958A (en) Electronic certificate identification method and access control equipment
RU2454819C2 (en) Method and system to read data from memory of remote mobile device
CN111583482A (en) Access control system based on two-dimensional code and control method thereof
CN102468962A (en) Method for personal identity authentication utilizing a personal cryptographic device
CN107395600B (en) Service data verification method, service platform and mobile terminal
CN113595714A (en) Contactless card with multiple rotating security keys

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210601

RJ01 Rejection of invention patent application after publication