CN113065112A - Identity identification verification method, system, equipment and storage medium - Google Patents

Identity identification verification method, system, equipment and storage medium Download PDF

Info

Publication number
CN113065112A
CN113065112A CN202110518888.8A CN202110518888A CN113065112A CN 113065112 A CN113065112 A CN 113065112A CN 202110518888 A CN202110518888 A CN 202110518888A CN 113065112 A CN113065112 A CN 113065112A
Authority
CN
China
Prior art keywords
information
passer
identity
module
reading
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110518888.8A
Other languages
Chinese (zh)
Inventor
张焕欣
褚瑞
许国兵
王健权
周林华
章小强
周新建
孙洋
金成杰
曹晓
孙文静
李寒
姚红云
雷亚宁
李启凌
邹圆
殷学俊
郭燕
徐少文
邵鹏程
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai China Nuclear Power Engineering Technology Co ltd
China General Nuclear Power Corp
CGN Power Co Ltd
Guangdong Nuclear Power Joint Venture Co Ltd
Original Assignee
Shanghai China Nuclear Power Engineering Technology Co ltd
China General Nuclear Power Corp
CGN Power Co Ltd
Guangdong Nuclear Power Joint Venture Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai China Nuclear Power Engineering Technology Co ltd, China General Nuclear Power Corp, CGN Power Co Ltd, Guangdong Nuclear Power Joint Venture Co Ltd filed Critical Shanghai China Nuclear Power Engineering Technology Co ltd
Priority to CN202110518888.8A priority Critical patent/CN113065112A/en
Publication of CN113065112A publication Critical patent/CN113065112A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves

Abstract

The invention discloses an identity identification verification method, an identity identification verification system, identity identification verification equipment and a storage medium, and relates to the technical field of security and protection. The invention relates to an identity identification verification system, which comprises a card reading identification module, a verification module and a verification module, wherein the card reading identification module is used for reading information data of an identity card of a passer; the biological identification module is used for extracting the information data of the biological characteristics of the passer, and the conversion module is coupled with the card reading identification module and the biological identification module and used for receiving and temporarily storing the information data of the identity card of the passer sent by the card reading identification module; and a data forwarding module coupled to the conversion module; the keyboard input module is used for sending the information data input by the passer to the data forwarding module; and the entrance controller receives the data content sent by the data forwarding module and executes the verification result action. The invention solves the problem of inflexible authentication means by multiple switchable authentication modes.

Description

Identity identification verification method, system, equipment and storage medium
Technical Field
The invention belongs to the technical field of security protection, and particularly relates to an identity identification verification method, an identity identification verification system, identity identification verification equipment and a storage medium.
Background
Import and export authentication in the security field relates to the safe operation of the whole facility. Particularly for nuclear power facilities, high reliability is required for the identity verification of passers-by. The traditional identity verification mode adopts a fixed mode of encrypting codes by an identity identification card, but for the whole facility, each identity verification level is different, the same set of identity identification cannot be used at the same time, and the problem of inflexible identity verification means exists.
Disclosure of Invention
The invention aims to provide an identity identification verification method, an identity identification verification system, identity identification verification equipment and a storage medium, and solves the problem that an identity verification means is inflexible through multiple switchable identity verification modes.
In order to solve the technical problems, the invention is realized by the following technical scheme:
the invention provides an identity identification verification method, which comprises the following steps: reading the declaration identity information of the passer-by;
temporarily storing the declaration identity information of the passers;
reading the invariant feature information and/or the asymmetric information of the traffic personnel according to the traffic personnel declaration identity information;
the passer invariant feature information comprises information which cannot be modified by the passer and indicates identity features;
the asymmetric information of the passer comprises information that the passer does not know in advance and whether the asymmetric information is matched with the declaration identity information of the passer;
and comparing and verifying the identity information of the passer with the invariant feature information and/or the asymmetric information of the passer.
In one embodiment of the invention, the passer declares that the identity information and the asymmetric information of the passer are the same data or physical carrier.
In one embodiment of the invention, the reading of passer invariant feature information and/or passer asymmetric information according to the passer asserted identity information comprises,
receiving an identity verification switching signal;
selecting reading of the passer invariant feature information and passer asymmetric information according to the identity verification switching signal, wherein the state comprises,
only the passer-by invariant feature information is read, and,
reading only the pedestrian asymmetry information, and,
simultaneously reading the unchangeable characteristic information of the passers and the asymmetric information of the passers;
wherein a reading of the passer assertion identity information is maintained.
In one embodiment of the invention, the step of reading passer invariant feature information and/or passer asymmetric information according to the passer identity information comprises,
calling corresponding pre-stored invariant feature information according to the passer declaration identity information;
reading the unchangeable characteristic information of the passer and comparing the unchangeable characteristic information with the prestored unchangeable characteristic information;
reading a feature comparison result and declaring identity information of the passer;
reading the asymmetric information of the passers;
and when the characteristic comparison result is consistent and the traffic pedestrian asymmetric information is correct, judging that the traffic pedestrian passes the identity recognition verification.
In one embodiment of the present invention, the reading the feature comparison result and the passer-by declaring identity information comprises the steps of,
analyzing the byte length of a data transmission data packet when the identity information of the passer is read, and recording the byte length as N;
and recoding the characteristic comparison result and the announcement identity information of the passer, wherein the byte length of the coded data packet is kept to be N.
In one embodiment of the invention, the step of reading passer invariant feature information and/or passer asymmetric information according to the passer identity information comprises,
calling corresponding pre-stored invariant feature information according to the passer declaration identity information;
reading the unchangeable characteristic information of the passer and comparing the unchangeable characteristic information with the prestored unchangeable characteristic information;
reading a feature comparison result and declaring identity information of the passer;
and when the feature comparison result is consistent, judging that the identity identification verification is passed.
The invention provides an identity identification verification system, which comprises: which comprises the steps of preparing a mixture of a plurality of raw materials,
the card reading identification module is used for reading information data of the identity card of the passer; and the number of the first and second groups,
a biometric identification module for extracting information data of biometric features of the passer, and,
the conversion module is coupled with the card reading identification module and the biological identification module and used for receiving and temporarily storing the information data of the passer identity card sent by the card reading identification module; and the number of the first and second groups,
a data forwarding module coupled with the conversion module; and the number of the first and second groups,
the keyboard input module is used for sending the information data input by the passer to the data forwarding module;
the entrance controller receives the data content sent by the data forwarding module and executes the action of the verification result;
the card reading identification module, the conversion module, the data forwarding module, the keyboard input module and the entrance and exit controller perform data interaction according to the identity identification verification method.
In one embodiment of the invention, the system further comprises a dial switching module;
the dial switching module is coupled with the transfer module and controls the connection or disconnection of the coupling between the conversion module and the biological identification module.
The invention provides identity recognition and verification equipment, which comprises a processor, wherein the processor is coupled with a memory, the memory stores program instructions, and the program instructions stored in the memory realize the identity recognition and verification method when being executed by the processor.
The present invention provides a computer-readable storage medium containing a program which, when run on a computer, causes the computer to perform an identification verification method as described above.
The invention solves the problem of inflexible authentication means by multiple switchable authentication modes.
Of course, it is not necessary for any product in which the invention is practiced to achieve all of the above-described advantages at the same time.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flow chart of an identity authentication method disclosed in the embodiment of the present invention;
FIG. 2 is a schematic diagram illustrating the status classification of step S3 in FIG. 1 according to the present invention;
FIG. 3 is a flowchart illustrating the process of state D1 of step S3 in FIG. 2 according to the present invention;
FIG. 4 is a schematic flow chart of step S3.13 of FIG. 3 according to the present invention;
FIG. 5 is a flowchart illustrating the process of state D2 of step S3 in FIG. 2 according to the present invention;
FIG. 6 is a block diagram illustrating an exemplary embodiment of an identity verification system;
fig. 7 is a block diagram of an identification verification apparatus disclosed in the embodiment of the present invention.
In the drawings, the components represented by the respective reference numerals are listed below:
1-an identification verification system for an identity,
11-a card-reading identification module which is used for reading the card,
12-a biometric identification module, which is,
13-a conversion module for converting the signal into a digital signal,
14-a data forwarding module for forwarding data,
15-the access control device is arranged on the entrance,
16-a dial-up switching module for switching the dial-up,
17-dial switching module;
2-an identification device for identifying an individual,
21-the processor, and the processor,
22-memory.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Identity security verification of a nuclear power station needs to select different passerby verification means according to specific security levels. The scheme provides an identity identification verification method, an identity identification verification system, identity identification verification equipment and a storage medium, and solves the problem that an identity verification means is inflexible through multiple switchable identity verification modes.
Referring to fig. 1, in the method for authenticating the identity of a passer, S1 first reads the claiming identity information of the passer, where the claiming identity information of the passer refers to the identity claimed by the passer actively. This actively claimed identity may be true or imposter, thus requiring further verification. Next, S2 temporarily stores the passer declaration identity information, which is to avoid the loss of the passer declaration identity information obtained in step S1 and facilitate the calling and reading at any time. Next, S3 reads passer invariant feature information and/or passer asymmetric information corresponding to the passer declaration identity information according to the specific security level. For example, the security level is low, the unchangeable characteristic information of the passerby can be read only by D2, or the asymmetrical information of the passerby can be read only by D3. If the security level is high, the unchangeable characteristic information of the passerby and the asymmetric information of the passerby can be read by D1 at the same time. As an illustration, the feature-invariant information of the pedestrian in the present solution may be information that the pedestrian cannot modify autonomously and indicates the identity feature. The asymmetric information of the passer in the scheme can be information that the passer does not know in advance and whether the asymmetric information is matched with the declaration identity information of the passer. And finally, S4, the passer declaring identity information is compared with the unchangeable characteristic information and/or the asymmetrical information of the passer to verify, and finally, whether the passer passes or not is obtained. It should be noted that the identity information stated by the passer and the asymmetric information of the passer can be the same data, and can also be carried on the same physical carrier. Since the passer-by claim identity information may be encrypted information, the passer-by does not know its specific content.
As shown in fig. 1, the person-to-be-passed in the present embodiment declares identity information, which is, as the name implies, the self-identity information that the person-to-be-passed claims, for example, in a plaintext non-encrypted IC Card (Integrated Circuit Card), using an off-the-shelf wiegan 24 or 36 as a transmission protocol, when the Card is swiped, the person-to-be-passed in the present embodiment is recognized and read by the Card-reading recognition module 11, and the person-to-be-passed in the present embodiment does not change the characteristic information, which is, as the name implies, the characteristic information that the person-to-be-passed cannot change, for example, the characteristics that the person-to-be-passed such as face, fingerprint, palm print, and pupil blood vessel distribution, etc., it should be noted that, since the biometric recognition module 12 that collects the person-to-be-passed constant characteristic information has a limitation of sampling accuracy, there may be misidentification when a large number of persons are faced, the person-to, the asymmetric information of the scheme can be a password. Meanwhile, when the IC card with encrypted content information is used, the content information is declared identity information by passers because the information is actively declared by the passers, and the encrypted content information is not known by the passers, so the content information also belongs to asymmetric information of the passers. At the moment, the passer declares that the identity information and the asymmetric information of the passer are the same data and are located on the same physical carrier. The card reading identification module 11 is connected with the conversion module 13, the card reading identification module 11 obtains card number information by reading a state password induction card of a passer and outputs the card number information to the conversion module 13 through a Wiegand signal, and the conversion module 13 caches the card number information. The biological recognition module 12 is connected with the conversion module 13, the conversion module 13 caches the input card number information and transmits the card number information to the biological recognition module 12 through an RS232 (technical standard for serial binary data exchange interface between data terminal equipment and data communication equipment) standard protocol, the biological recognition module 12 finds the picture of the card holder in a database through the card number information and carries out 1: 1, and transmitting the comparison result to a conversion module 13 through a Wiegand signal. The dial switch module 17 is connected with the conversion module 13, and controls the conversion module 13 to start/shield the signal output of the biological recognition module 12 through different configurations of the dial switch module 17. The conversion module 13 is connected with the data forwarding module 14, the conversion module 13 outputs the card number information to the data forwarding module 14, and the data forwarding module 14 forwards the card number information. The keyboard input module 15 is connected with the data forwarding module 14, and the data forwarding module 14 obtains the pass password of the person through the keyboard input module 15 and forwards the pass password. The data forwarding module 14 is connected to the entrance controller 16, the data forwarding module 14 forwards the card number information and the pass password information to the entrance controller 16, and the entrance controller 16 completes normal authorization determination.
However, it should be noted that the above sequence of steps does not limit the claims, for example, the step S2 may be performed after the step S3, the passer declaration identity information in the step S3 is directly called after reading, and the temporary storage in the step S2 may be performed after the step S3, so as to achieve the technical purpose of the present solution.
As shown in fig. 2, according to the received authentication switching signal, the verification status of the person passing through the step S3 is divided into three categories, which are:
d1 reading the passer invariant feature information and the passer asymmetric information at the same time;
d2 only reads the passer-by invariant feature information;
d3 reads only the passer-by asymmetry information.
As shown in fig. 3, for example, in the state D1, first, S3.11 is required to call the corresponding pre-stored invariant feature information according to the identity information declared by the passer, then S3.12 reads the invariant feature information of the passer and performs feature comparison with the pre-stored invariant feature information, S3.13 is required to read the feature comparison result and the identity information declared by the passer, and S3.14 reads the asymmetric information of the passer. And when the characteristic comparison result is consistent and the traffic pedestrian asymmetric information is correct, judging that the traffic pedestrian asymmetric information passes the identity identification verification. Specifically, the scheme is a combined mode of card reading identification, face identification and keyboard password. The entrance controller 16 sets a passing rule as card number information + passing password, switches the control mode of the conversion module 13 to signal output for starting the biological identification module 12 through the dial switch module 17, reads the card number information of the national password induction card through the card reading identification module 11, the conversion module 13 caches the card number information after obtaining the card number information and transmits the card number information to the biological identification module 12 through the RS232 standard protocol, and 1: and 1, after comparison, feeding back the comparison result to the conversion module through a Wiegand signal. The conversion module 13 forwards the card number information to the entrance controller 16 through the data forwarding module 14, and the data forwarding module 14 forwards the obtained pass password information to the entrance controller 16 through the keyboard input module 15, so that the entrance controller 16 completes the authorization determination. The verification mode adopts a triple verification mode, namely the identity information of the person in the same bank, the invariant feature information of the person in the traffic and the asymmetric information of the person in the traffic need to be acquired simultaneously, so that the verification mode is safer.
As shown in fig. 3 and 6, the passer-by declaration in step S3.11 that the identity information may be IC card information read in the card reading recognition module 11. The passer invariant feature information read in step S312 may be face feature information of the passer extracted by the biometric identification module or fingerprint information of the passer. The asymmetric information of the passer read in step S3.14 may be a password input by the passer through the keyboard input module 15, or a key transmitted through the read-only memory card. The identity information of the passer declaration is read and then cached in the conversion module 13, and then is transmitted to the biological recognition module 12, and is transmitted to the conversion module 13 together with the comparison result of the unchangeable feature information of the passer. The pedestrian statement identity information and pedestrian invariant characteristic information are then further transmitted to the data forwarding module 14. The keyboard input module 15 transmits the traffic pedestrian asymmetry information to the data forwarding module 14. Then, the passer declaration identity information, passer invariant feature information, passer asymmetric information, and the comparison result are sent to the entrance/exit controller 16, so as to complete identity identification and verification.
As shown in fig. 4, in the process of reading the feature comparison result and claiming identity information by the pedestrian, the stability and security of data transmission need to be considered. S3.131, the byte length of the data transmission data packet when the identity information of the passer is read is analyzed and is marked as N, namely the byte length of the data packet is N. That is, the byte length of the data packet in the data transmission process is fixed, and the content in the data packet cannot be cracked by analyzing the data packet length without knowing the data packet encoding rule. S3.132 recoding the feature comparison result and the identity information of the passer, and keeping the byte length of the coded data packet as N. Similarly, after the identity information of the passer-by is recoded into a data packet with a fixed byte length, under the condition of not knowing the data packet coding rule, the content in the data packet cannot be cracked by analyzing the length of the data packet, and the encryption effect on the feature comparison result and the identity information of the passer-by is achieved.
As shown in fig. 5, in the state of D2, S3.21 calls the corresponding pre-stored invariant feature information according to the declared identity information of the passer, S3.22 reads the invariant feature information of the passer, performs feature comparison with the pre-stored invariant feature information, and S3.23 reads the feature comparison result and the declared identity information of the passer. And when the feature comparison result is consistent, judging that the identity identification verification is passed. The step S3.14 of reading passer asymmetry information is missing compared to the D1 state above. Specifically, the entrance/exit controller 16 sets the passing rule as the card number information, switches the control mode of the conversion module 13 to the signal output for turning on the biometric module 12 through the dial switch module 17, reads the card number information of the national password sensing card through the card reading identification module 11, and the conversion module 13 caches the card number information after acquiring the card number information and transmits the card number information to the biometric module 12 through the RS232 standard protocol. In the biometric module 12, 1: after 1 comparison, the comparison result is fed back to the conversion module 13 through the wiegand signal, and the conversion module 13 forwards card number information through the data forwarding module 14 to the entrance controller 16 to complete authorization determination. That is to say, the asymmetric information of the passers-by is not read, and the method is suitable for security inspection occasions with low security level. As for the state D3, the principle is similar to the above, specifically, the dial switch module 17 switches the control mode of the conversion module 13 to shield the signal output of the biometric identification module 12, the card number information of the national password sensing card is read by the card reading identification module 11, after the card number information is acquired by the conversion module 13, the card number information is forwarded to the entrance/exit controller 16 by the data forwarding module, and meanwhile, the pass password information of the keyboard input module 15 is forwarded to the entrance/exit controller 16 by the data forwarding module 14, and the entrance/exit controller 16 completes the authorization determination. In a transmission system of digital signals, especially a transmission system of high frequency signals, it is necessary to isolate the signals. Thereby avoiding signal interference and transmission instability. In this scheme, the transmission line parcel at the signal has the aluminium foil to there is the plastic protective layer at aluminium foil surface parcel.
As shown in FIGS. 1 and 2, states D1-D3 may be switched by receiving an authentication switch signal. That is to say, the security protection management personnel can realize multiple switchable identity verification by sending the identity verification switching signal, and the problem of inflexible identity verification means is solved. However, the authentication combination method in this embodiment is not limited to the three types D1-D3, and may be a combination of the card reading recognition module 11+ the biometric recognition module 12. Therefore, the identity verification combination of the scheme is diversified and flexible.
Referring to fig. 6, the present invention provides an identity authentication system, which includes a card reading module 11, a biometric module 12, a conversion module 13, a data forwarding module 14, a keyboard input module 15, and an entrance controller 16. In order to facilitate switching of the identity recognition and verification modes of the system, a dial switching module 17 is further arranged. The card reading identification module 11 in the scheme reads information data of the identity card of the passer. The biometrics module 12 extracts information data of biometrics characteristics of the pedestrian. The conversion module 13 is coupled with the card reading identification module 11 and the biological identification module 12, and receives and temporarily stores the information data of the passer identity card sent by the card reading identification module 11. And a data forwarding module 14 coupled to the conversion module 13. The keyboard input module 15 sends the information data input by the passer to the data forwarding module 14. The entrance controller 16 receives the data content sent by the data forwarding module 14 and performs the action of the verification result. In the present embodiment, the card identification module 11, the biometric identification module 12, the conversion module 13, the data forwarding module 14, the keyboard input module 15, and the entrance/exit controller 16 perform data interaction according to the above-mentioned one of the identification verification methods.
Referring to fig. 7, the present invention provides an identification verification apparatus 2, which includes a processor 21, wherein the processor 21 performs data interaction with a memory 22. It should be noted that the processor 21 in this embodiment may be an independent processor, or may be a processor cluster formed by several processors. Likewise, the storage 22 in the present embodiment may be a single storage, or may be a distributed cluster composed of several storages. The memory 22 stores program instructions, and when the program instructions stored in the memory 22 are executed by the processor, the memory 22 may directly interact with the processor 21, such as a memory, to implement one of the above-mentioned methods for identity authentication. The memory 22 may be an external memory, and performs data exchange with a high-speed random access memory such as a memory first, and then performs data exchange with the processor 21 through the memory. In this case, the processor 21 and the memory 22 are indirectly coupled, i.e. data exchange.
In addition, the present invention also provides a computer-readable storage medium, which includes a program, and when the program runs on a computer, the program causes the computer to execute one of the above-mentioned methods for authenticating an identity.
In addition, the present invention also provides a computer-readable storage medium storing data generated by a computer executing one of the above-mentioned methods for identity authentication. When the identification verification method is executed, specific data are generated. This data is not otherwise available to the computer.
It should be noted that, in order to highlight the innovative part of the present invention, a module which is not so closely related to solve the technical problem proposed by the present invention is not introduced in the present embodiment, but this does not indicate that no other module exists in the present embodiment.
In addition, it is clear to those skilled in the art that, for convenience and brevity of description, the specific working process of the system described above may refer to the corresponding process in the foregoing method embodiment, and is not described herein again. In the embodiments provided in the present invention, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is merely a logical division, and in actual implementation, there may be other divisions, for example, multiple modules or components may be combined or integrated into another system, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
Modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a form of hardware or a form of a software functional unit.
The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk, and an optical disk.
Referring to fig. 1-7, in one specific application of the present solution, S1 first reads the passer-by asserted identity information, where the passer-by asserted identity information refers to the identity that the passer actively asserts. This actively claimed identity may be true or imposter, thus requiring further verification. Next, S2 temporarily stores the passer declaration identity information, which is to avoid the loss of the passer declaration identity information obtained in step S1 and facilitate the calling and reading at any time. Calling the corresponding pre-stored invariant feature information according to the declaration of the identity information of the passer by S3.11, then reading the invariant feature information of the passer by S3.12, performing feature comparison with the pre-stored invariant feature information, reading the feature comparison result by S3.13, declaring the identity information of the passer, and reading the asymmetric information of the passer by S3.14. And when the characteristic comparison result is consistent and the traffic pedestrian asymmetric information is correct, judging that the traffic pedestrian asymmetric information passes the identity identification verification. Specifically, the scheme is a combined mode of card reading identification, face identification and keyboard password. The entrance controller 16 sets a passing rule as card number information + passing password, switches the control mode of the conversion module 13 to signal output for starting the biological identification module 12 through the dial switch module 17, reads the card number information of the national password induction card through the card reading identification module 11, the conversion module 13 caches the card number information after obtaining the card number information and transmits the card number information to the biological identification module 12 through the RS232 standard protocol, and 1: and 1, after comparison, feeding back the comparison result to the conversion module through a Wiegand signal. And finally, S4, the passer declaring identity information is compared with the unchangeable characteristic information and/or the asymmetrical information of the passer to verify, and finally, whether the passer passes or not is obtained. It should be noted that the identity information stated by the passer and the asymmetric information of the passer can be the same data, and can also be carried on the same physical carrier. Since the passer-by claim identity information may be encrypted information, the passer-by does not know its specific content. The conversion module 13 forwards the card number information to the entrance controller 16 through the data forwarding module 14, and the data forwarding module 14 forwards the obtained pass password information to the entrance controller 16 through the keyboard input module 15, so that the entrance controller 16 completes the authorization determination. The verification mode adopts a triple verification mode, namely the identity information of the person in the same bank, the invariant feature information of the person in the traffic and the asymmetric information of the person in the traffic need to be acquired simultaneously, so that the verification mode is safer. In the scheme, the problem of inflexible authentication means is solved by a multiple switchable authentication mode.
The preferred embodiments of the invention disclosed above are intended to be illustrative only. The preferred embodiments are not intended to be exhaustive or to limit the invention to the precise embodiments disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best utilize the invention. The invention is limited only by the claims and their full scope and equivalents.

Claims (10)

1. An identity identification and verification method is characterized by comprising the following steps,
reading the declaration identity information of the passer-by;
temporarily storing the declaration identity information of the passers;
reading the invariant feature information and/or the asymmetric information of the traffic personnel according to the traffic personnel declaration identity information;
the passer invariant feature information comprises information which cannot be modified by the passer and indicates identity features;
the asymmetric information of the passer comprises information that the passer does not know in advance and whether the asymmetric information is matched with the declaration identity information of the passer;
and comparing and verifying the identity information of the passer with the invariant feature information and/or the asymmetric information of the passer.
2. An identity authentication method according to claim 1, wherein the passer declaration identity information and the passer asymmetry information are the same data or physical carrier.
3. The identity identification verification method according to claim 1, wherein the reading of passer-invariant feature information and/or passer-asymmetric information based on the passer-asserted identity information comprises,
receiving an identity verification switching signal;
selecting reading of the passer invariant feature information and passer asymmetric information according to the identity verification switching signal, wherein the state comprises,
only the passer-by invariant feature information is read, and,
reading only the pedestrian asymmetry information, and,
simultaneously reading the unchangeable characteristic information of the passers and the asymmetric information of the passers;
wherein a reading of the passer assertion identity information is maintained.
4. The identity identification verification method according to claim 1 or 3, wherein the step of reading passer invariant feature information and/or passer asymmetric information according to the passer declaration identity information comprises,
calling corresponding pre-stored invariant feature information according to the passer declaration identity information;
reading the unchangeable characteristic information of the passer and comparing the unchangeable characteristic information with the prestored unchangeable characteristic information;
reading a feature comparison result and declaring identity information of the passer;
reading the asymmetric information of the passers;
and when the characteristic comparison result is consistent and the traffic pedestrian asymmetric information is correct, judging that the traffic pedestrian passes the identity recognition verification.
5. The method according to claim 4, wherein the reading of the comparison result of the characteristics and the declaration of the identity information by the passer comprises the steps of,
analyzing the byte length of a data transmission data packet when the identity information of the passer is read, and recording the byte length as N;
and recoding the characteristic comparison result and the announcement identity information of the passer, wherein the byte length of the coded data packet is kept to be N.
6. The identity identification verification method according to claim 1 or 3, wherein the step of reading passer invariant feature information and/or passer asymmetric information according to the passer declaration identity information comprises,
calling corresponding pre-stored invariant feature information according to the passer declaration identity information;
reading the unchangeable characteristic information of the passer and comparing the unchangeable characteristic information with the prestored unchangeable characteristic information;
reading a feature comparison result and declaring identity information of the passer;
and when the feature comparison result is consistent, judging that the identity identification verification is passed.
7. An identity authentication system, comprising,
the card reading identification module is used for reading information data of the identity card of the passer; and the number of the first and second groups,
a biometric identification module for extracting information data of biometric features of the passer, and,
the conversion module is coupled with the card reading identification module and the biological identification module and used for receiving and temporarily storing the information data of the passer identity card sent by the card reading identification module; and the number of the first and second groups,
a data forwarding module coupled with the conversion module; and the number of the first and second groups,
the keyboard input module is used for sending the information data input by the passer to the data forwarding module;
the entrance controller receives the data content sent by the data forwarding module and executes the action of the verification result;
the card reading identification module, the conversion module, the data forwarding module, the keyboard input module and the entrance and exit controller perform data interaction according to the identity identification verification method of any one of claims 1 to 6.
8. The system of claim 7, further comprising a dial-up switch module;
the dial switching module is coupled with the transfer module and controls the connection or disconnection of the coupling between the conversion module and the biological identification module.
9. An identity verification device comprising a processor coupled to a memory, the memory storing program instructions that, when executed by the processor, implement a method of identity verification as claimed in any one of claims 1 to 6.
10. A computer-readable storage medium characterized by: comprising a program which, when run on a computer, causes the computer to carry out a method of identity verification as claimed in any one of claims 1 to 6.
CN202110518888.8A 2021-05-12 2021-05-12 Identity identification verification method, system, equipment and storage medium Pending CN113065112A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110518888.8A CN113065112A (en) 2021-05-12 2021-05-12 Identity identification verification method, system, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110518888.8A CN113065112A (en) 2021-05-12 2021-05-12 Identity identification verification method, system, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN113065112A true CN113065112A (en) 2021-07-02

Family

ID=76568340

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110518888.8A Pending CN113065112A (en) 2021-05-12 2021-05-12 Identity identification verification method, system, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113065112A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101373521A (en) * 2008-10-24 2009-02-25 长春鸿达光电子与生物统计识别技术有限公司 Read-write method and apparatus integrated with finger print identification verification and IC card
CN101615309A (en) * 2008-12-05 2009-12-30 张小鹏 Identification presentation device and based on the personal identification method and the system thereof of this device
CN101887600A (en) * 2009-05-14 2010-11-17 汉王科技股份有限公司 Identity authentication method and device
CN103346888A (en) * 2013-07-02 2013-10-09 山东科技大学 Remote identity authentication method based on password, smart card and biological features
CN105447937A (en) * 2015-11-26 2016-03-30 中广核工程有限公司 Control system and control method for staff entrance of nuclear power station
CN107665522A (en) * 2016-07-27 2018-02-06 上海泓申科技发展有限公司 One kind combination authentication means and method
CN110570571A (en) * 2019-09-16 2019-12-13 北京斯科德科技有限公司 Standing-type identity authentication device and method integrating functions of people and certificate

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101373521A (en) * 2008-10-24 2009-02-25 长春鸿达光电子与生物统计识别技术有限公司 Read-write method and apparatus integrated with finger print identification verification and IC card
CN101615309A (en) * 2008-12-05 2009-12-30 张小鹏 Identification presentation device and based on the personal identification method and the system thereof of this device
CN101887600A (en) * 2009-05-14 2010-11-17 汉王科技股份有限公司 Identity authentication method and device
CN103346888A (en) * 2013-07-02 2013-10-09 山东科技大学 Remote identity authentication method based on password, smart card and biological features
CN105447937A (en) * 2015-11-26 2016-03-30 中广核工程有限公司 Control system and control method for staff entrance of nuclear power station
CN107665522A (en) * 2016-07-27 2018-02-06 上海泓申科技发展有限公司 One kind combination authentication means and method
CN110570571A (en) * 2019-09-16 2019-12-13 北京斯科德科技有限公司 Standing-type identity authentication device and method integrating functions of people and certificate

Similar Documents

Publication Publication Date Title
Jain et al. Biometrics: a tool for information security
Breebaart et al. A reference architecture for biometric template protection based on pseudo identities
CN101887600A (en) Identity authentication method and device
CN105261105A (en) Safety access control method
Connie et al. PalmHashing: a novel approach for dual-factor authentication
RU2251748C2 (en) Device and method for biometric authentication
WO2007053132A2 (en) System & apparatus for improving proximity smartcard security
CN1682242A (en) A method of secure transmission
CN101739742A (en) Networking type multi-channel access control and attendance system
CN102223233A (en) Biological code authentication system and biological code authentication method
US20070075130A1 (en) Mid-Level Local Biometric Identification Credit Card Security System
CN110175573A (en) The coding of face and iris and verification method, system and computer readable storage medium
CN109410407A (en) A kind of face and fingerprint recognition access control system
CN101246548A (en) Biological information storage method and system
Thakur et al. Wireless Fingerprint Based Security System Using ZigBee Technology
CN103577850A (en) Fingerprint management device
CN103544509A (en) Fingerprint identification system
CN203616756U (en) Fingerprint identity verifying system in Internet bar
CN103368736A (en) Business information encryption and decryption method and device
CN106340102A (en) Control method of access control system based on radio frequency identification and video monitoring
Bhuvaneswary et al. Smart Voting Machine using Fingerprint Sensor and Face Recognition
CN113065112A (en) Identity identification verification method, system, equipment and storage medium
WO1998011501A2 (en) Embeddable module for fingerprint capture and matching
CN114697043B (en) Identity authentication unified management platform based on blockchain technology and authentication method thereof
CN110084021A (en) Cabinet surface terminal, client, cabinet face data exchange method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 518000 Shennan Avenue 2002, Futian District, Shenzhen City, Guangdong Province

Applicant after: GUANGDONG NUCLEAR POWER JOINT VENTURE Co.,Ltd.

Applicant after: China Guanghe Digital Technology Co.,Ltd.

Applicant after: CHINA GENERAL NUCLEAR POWER Corp.

Applicant after: CGN POWER Co.,Ltd.

Address before: 518000 Shennan Avenue 2002, Futian District, Shenzhen City, Guangdong Province

Applicant before: GUANGDONG NUCLEAR POWER JOINT VENTURE Co.,Ltd.

Applicant before: SHANGHAI CHINA NUCLEAR POWER ENGINEERING TECHNOLOGY CO.,LTD.

Applicant before: CHINA GENERAL NUCLEAR POWER Corp.

Applicant before: CGN POWER Co.,Ltd.