CN115147967B - Information verification method and system based on CTID and super SIM card - Google Patents
Information verification method and system based on CTID and super SIM card Download PDFInfo
- Publication number
- CN115147967B CN115147967B CN202210619831.1A CN202210619831A CN115147967B CN 115147967 B CN115147967 B CN 115147967B CN 202210619831 A CN202210619831 A CN 202210619831A CN 115147967 B CN115147967 B CN 115147967B
- Authority
- CN
- China
- Prior art keywords
- identity card
- digital identity
- hash value
- mobile phone
- ctid
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000012795 verification Methods 0.000 title claims abstract description 53
- 238000000034 method Methods 0.000 title claims abstract description 14
- 230000009471 action Effects 0.000 claims abstract description 29
- 238000004364 calculation method Methods 0.000 claims description 28
- 230000036541 health Effects 0.000 claims description 7
- 238000004891 communication Methods 0.000 claims description 6
- 238000004806 packaging method and process Methods 0.000 claims description 4
- 230000005540 biological transmission Effects 0.000 description 12
- 230000002265 prevention Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 2
- 230000006698 induction Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000004080 punching Methods 0.000 description 1
- 230000007306 turnover Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
- G07C9/257—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/40—Security arrangements using identity modules
- H04W12/48—Security arrangements using identity modules using secure binding, e.g. securely binding identity modules to devices, services or applications
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Human Computer Interaction (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The application provides an information verification method and system based on CTID and super SIM card in the technical field of entrance guard, the method includes: step S10, the mobile phone obtains personal information comprising a face picture and an identity card picture through a camera, and sends the personal information to a CTID server; step S20, the CTID server carries out verification on the received personal information, and after the verification is passed, a digital identity card is returned to the mobile phone; step S30, the mobile phone writes the received digital identity card into a super SIM card through a first NFC; step S40, the access control reads the digital identity card from the super SIM card of the mobile phone through the second NFC, and obtains a color feature two-dimensional code and an action track two-dimensional code based on the digital identity card; and S50, controlling the opening and closing of the electric control lock by the entrance guard based on the color characteristic two-dimensional code and the action track two-dimensional code. The application has the advantages that: and the information verification efficiency is greatly improved.
Description
Technical Field
The application relates to the technical field of access control, in particular to an information verification method and system based on CTID and super SIM card.
Background
In order to avoid expanding the spread range of epidemic situation, people in and out need to be managed in some public places, such as markets, stations, airports, communities, parks, office buildings and the like, and individual places need to avoid the entry and exit of irrelevant people.
For the management of business turn over personnel, not only need to carry out the authentication of punching the card on the entrance guard traditionally, still need artifical verification epidemic prevention to prove, for example colour characteristic two-dimensional code (health code) and action track two-dimensional code (journey code), because the people's flow in individual place is huge, artifical verification epidemic prevention proves that work load is big, causes the omission easily, and inefficiency, seriously influences passing efficiency, can't accomplish unmanned on duty.
Therefore, how to provide an information verification method and system based on CTID and super SIM card, to improve the information verification efficiency, is a technical problem to be solved urgently.
Disclosure of Invention
The application aims to solve the technical problem of providing an information verification method and an information verification system based on CTID and super SIM card, which can improve the information verification efficiency.
In a first aspect, the present application provides an information verification method based on CTID and super SIM card, comprising the following steps:
step S10, the mobile phone obtains personal information comprising a face picture and an identity card picture through a camera, and sends the personal information to a CTID server;
step S20, the CTID server carries out verification on the received personal information, and after the verification is passed, a digital identity card is returned to the mobile phone;
step S30, the mobile phone writes the received digital identity card into a super SIM card through a first NFC;
step S40, the access control reads the digital identity card from the super SIM card of the mobile phone through the second NFC, and obtains a color feature two-dimensional code and an action track two-dimensional code based on the digital identity card;
and S50, controlling the opening and closing of the electric control lock by the entrance guard based on the color characteristic two-dimensional code and the action track two-dimensional code.
Further, the step S10 specifically includes:
the mobile phone obtains personal information comprising a face picture and an identity card picture through a camera, carries out hash calculation on the personal information to obtain a first hash value, packages the personal information and the first hash value into a first data packet, encrypts the first data packet through a first encryption algorithm, and then sends the first data packet to a CTID server through a first communication module.
Further, the step S20 specifically includes:
s21, decrypting the received first data packet by using a first encryption algorithm by using a CTID server, and analyzing to obtain the personal information and a first hash value;
step S22, carrying out hash calculation on the personal information by the CTID server to obtain a second hash value, judging whether the second hash value is equal to the first hash value, and if so, entering step S23; if not, the feedback data of the mobile phone is destroyed;
step S23, checking whether the face picture and the identity card picture are the data of the same person or not by the CTID server, if yes, entering step S24; if not, the verification failure is fed back to the mobile phone;
step S24, the CTID server matches the digital identity card based on the identity card picture, carries out hash calculation on the digital identity card to obtain a third hash value, packages the digital identity card and the third hash value into a second data packet, encrypts the second data packet by utilizing a second encryption algorithm and then sends the second data packet to the mobile phone;
the step S30 specifically includes:
s31, the mobile phone decrypts the received second data packet by using a second encryption algorithm, and analyzes the received second data packet to obtain the digital identity card and a third hash value;
step S32, carrying out hash calculation on the digital identity card of the mobile phone to obtain a fourth hash value, judging whether the fourth hash value is equal to the third hash value, and if so, entering step S33; if not, the data is fed back to the CTID server to be destroyed;
and step S33, after the mobile phone encrypts the digital identity card by using a third encryption algorithm, the encrypted digital identity card is written into the super SIM card by using the first NFC through an APDU instruction.
Further, the step S40 specifically includes:
step S41, after the entrance guard senses the super SIM card through the second NFC, circularly reading data stored in the super SIM card by taking 255 bytes as a unit through an APDU instruction, and splicing to obtain a digital identity card;
s42, decrypting the read digital identity card by the access control by using a third encryption algorithm;
and step S43, the entrance guard respectively acquires the color feature two-dimensional code and the action track two-dimensional code from the health big data server and the journey record server based on the digital identity card.
Further, the step S50 specifically includes:
the entrance guard judges whether the color feature two-dimensional code is displayed in a preset color, whether the action track two-dimensional code is displayed in a preset place or not, and if yes, the electric control lock is not opened; if not, opening the electric control lock, and binding, recording and storing the passing time and the digital identity card.
In a second aspect, the application provides an information verification system based on CTID and super SIM card, comprising the following modules:
the personal information acquisition module is used for acquiring personal information comprising a face picture and an identity card picture through a camera of the mobile phone and sending the personal information to the CTID server;
the personal information verification module is used for verifying the received personal information by the CTID server, and returning a digital identity card to the mobile phone after verification;
the super SIM card data writing module is used for writing the received digital identity card into the super SIM card through the first NFC;
the super SIM card data reading module is used for reading the digital identity card from the super SIM card of the mobile phone through the second NFC by the access control, and acquiring a color characteristic two-dimensional code and a movement track two-dimensional code based on the digital identity card;
and the automatic verification module is used for controlling the opening and closing of the electric control lock by the door access based on the color characteristic two-dimensional code and the action track two-dimensional code.
Further, the personal information acquisition module specifically includes:
the mobile phone obtains personal information comprising a face picture and an identity card picture through a camera, carries out hash calculation on the personal information to obtain a first hash value, packages the personal information and the first hash value into a first data packet, encrypts the first data packet through a first encryption algorithm, and then sends the first data packet to a CTID server through a first communication module.
Further, the human information verification module specifically includes:
the first data packet decryption unit is used for decrypting the received first data packet by the CTID server through a first encryption algorithm and analyzing to obtain the personal information and a first hash value;
the personal information hash check unit is used for carrying out hash calculation on the personal information by the CTID server to obtain a second hash value, judging whether the second hash value is equal to the first hash value or not, and if yes, entering the personnel identity check unit; if not, the feedback data of the mobile phone is destroyed;
the personal identification card consistency verification unit is used for verifying whether the face picture and the identity card picture are the data of the same person or not by the CTID server, and if yes, entering the digital identity card sending unit; if not, the verification failure is fed back to the mobile phone;
the digital identity card sending unit is used for matching the digital identity card based on the identity card picture by the CTID server, carrying out hash calculation on the digital identity card to obtain a third hash value, packaging the digital identity card and the third hash value into a second data packet, encrypting the second data packet by utilizing a second encryption algorithm and then sending the second data packet to the mobile phone;
the super SIM card data writing module specifically comprises:
the second data packet decryption unit is used for decrypting the received second data packet by the mobile phone through a second encryption algorithm and analyzing to obtain the digital identity card and a third hash value;
the digital identity card hash check unit is used for carrying out hash calculation on the digital identity card of the mobile phone to obtain a fourth hash value, judging whether the fourth hash value is equal to the third hash value, and entering the digital identity card writing unit if the fourth hash value is equal to the third hash value; if not, the data is fed back to the CTID server to be destroyed;
the digital identity card writing unit is used for writing the encrypted digital identity card into the super SIM card by the first NFC through the APDU command after the digital identity card is encrypted by the mobile phone by the third encryption algorithm.
Further, the super SIM card data reading module specifically includes:
the digital identity card reading unit is used for circularly reading data stored in the super SIM card by taking 255 bytes as a unit through an APDU instruction after the access control senses the super SIM card through the second NFC, and splicing the data to obtain the digital identity card;
the digital identity card decryption unit is used for decrypting the read digital identity card by the access control through a third encryption algorithm;
the two-dimension code acquisition unit is used for acquiring the color feature two-dimension code and the action track two-dimension code from the health big data server and the journey record server based on the digital identity card.
Further, the automatic verification module specifically comprises:
the entrance guard judges whether the color feature two-dimensional code is displayed in a preset color, whether the action track two-dimensional code is displayed in a preset place or not, and if yes, the electric control lock is not opened; if not, opening the electric control lock, and binding, recording and storing the passing time and the digital identity card.
The application has the advantages that:
1. the personal information comprising the face picture and the identity card picture is sent to the CTID server through the mobile phone to check whether the personal information is consistent or not, after the personal information passes the check, the mobile phone writes the digital identity card sent by the CTID server into the super SIM card through the first NFC, the digital identity card in the super SIM card is read by the entrance guard through the second NFC, the color feature two-dimensional code and the action track two-dimensional code are obtained based on the digital identity card, the entrance guard automatically controls the opening and closing of the electric control lock after checking the color feature two-dimensional code and the action track two-dimensional code, namely, a user only needs to carry the mobile phone in the whole process, after the super SIM card of the mobile phone stores the digital identity card, the follow-up data is automatically obtained by the entrance guard to check, manual participation is not needed, the unattended operation is realized, the inefficiency and the omission caused by the manual check are avoided, the information checking efficiency is finally greatly improved, and the passing efficiency is greatly improved.
2. By encrypting the transmission of personal information, the transmission of the digital identity card and the storage of the digital identity card, encrypting by adopting different encryption algorithms respectively, and adding hash check in the transmission process of the personal information and the digital identity card, whether damage or tampering occurs in the data transmission process can be rapidly judged, five security measures (a first encryption algorithm, a second encryption algorithm, a third encryption algorithm, primary hash check and secondary hash check) are adopted before and after, and the security is greatly improved.
Drawings
The application will be further described with reference to examples of embodiments with reference to the accompanying drawings.
Fig. 1 is a flow chart of a method of information verification based on CTID and super SIM card of the present application.
Fig. 2 is a schematic structural diagram of an information verification system based on CTID and super SIM card according to the present application.
Fig. 3 is a hardware architecture diagram of the present application.
Detailed Description
The technical scheme in the embodiment of the application has the following overall thought: the personal information is sent to the CTID server through the mobile phone to check whether the personal information is consistent or not, the digital identity card sent by the CTID server is written into the super SIM card for verification, the digital identity card in the super SIM card is read by the access control through the second NFC, the color feature two-dimensional code and the action track two-dimensional code are obtained based on the digital identity card, and then the opening and closing of the electric control lock are automatically controlled, manual participation is not needed, and information verification efficiency is improved.
Referring to fig. 1 to 3, a preferred embodiment of an information verification method based on CTID and super SIM card of the present application includes the following steps:
step S10, the mobile phone acquires personal information of a user including a face picture and an identity card picture through a camera, and sends the personal information to a CTID server in real time;
step S20, the CTID server carries out verification on the received personal information in real time, and a digital identification Card (CTID) is returned to the mobile phone after the verification is passed;
step S30, the mobile phone writes the received digital identity card into the super SIM card through the first NFC, and a user holds the mobile phone close to a second NFC induction area of the entrance guard;
step S40, the access control reads the digital identity card from the super SIM card of the mobile phone through the second NFC, and obtains a color feature two-dimensional code and an action track two-dimensional code based on the digital identity card;
and S50, automatically controlling the opening and closing of the electric control lock by the access control based on the color characteristic two-dimensional code and the action track two-dimensional code, namely realizing unattended operation.
Namely, the application performs digital epidemic prevention by combining CTID, NFC and super SIM card.
The step S10 specifically includes:
the mobile phone obtains personal information comprising a face picture and an identity card picture through a camera, carries out hash calculation on the personal information to obtain a first hash value, packages the personal information and the first hash value into a first data packet, encrypts the first data packet through a first encryption algorithm, and then sends the first data packet to a CTID server through a first communication module. The first hash value obtained through calculation can quickly verify that the personal information is tampered in the transmission process, and the personal information is encrypted through the first encryption algorithm, so that the personal information is prevented from being stolen by plaintext.
The step S20 specifically includes:
s21, decrypting the received first data packet by using a first encryption algorithm by using a CTID server, and analyzing to obtain the personal information and a first hash value;
step S22, carrying out hash calculation on the personal information by the CTID server to obtain a second hash value, judging whether the second hash value is equal to the first hash value, and if so, entering step S23; if not, the feedback data of the mobile phone is destroyed;
step S23, checking whether the face picture and the identity card picture are the data of the same person or not by the CTID server, if yes, entering step S24; if not, the verification failure is fed back to the mobile phone;
step S24, the CTID server matches the digital identity card based on the identity card picture, carries out hash calculation on the digital identity card to obtain a third hash value, packages the digital identity card and the third hash value into a second data packet, encrypts the second data packet by utilizing a second encryption algorithm and then sends the second data packet to the mobile phone; the third hash value obtained through calculation can quickly verify that the digital identity card is tampered in the transmission process, and the second encryption algorithm is used for encrypting the digital identity card, so that the digital identity card is prevented from being stolen by plaintext.
The step S30 specifically includes:
s31, the mobile phone decrypts the received second data packet by using a second encryption algorithm, and analyzes the received second data packet to obtain the digital identity card and a third hash value;
step S32, carrying out hash calculation on the digital identity card of the mobile phone to obtain a fourth hash value, judging whether the fourth hash value is equal to the third hash value, and if so, entering step S33; if not, the data is fed back to the CTID server to be destroyed;
and step S33, after the mobile phone encrypts the digital identity card by using a third encryption algorithm, the encrypted digital identity card is written into the super SIM card by using the first NFC through APDU (ApplicationProtocolDataUnit) instructions. And the digital identity card is stored in the super SIM card after being encrypted by the third encryption algorithm, so that the digital identity card stored in the super SIM card is prevented from being stolen by plaintext.
The step S40 specifically includes:
step S41, after the entrance guard senses the super SIM card through the second NFC, circularly reading data stored in the super SIM card by taking 255 bytes as a unit through an APDU instruction, and splicing to obtain a digital identity card;
s42, decrypting the read digital identity card by the access control by using a third encryption algorithm;
and step S43, the entrance guard respectively acquires the color feature two-dimensional code and the action track two-dimensional code from the health big data server and the journey record server based on the digital identity card.
The step S50 specifically includes:
the entrance guard judges whether the color feature two-dimensional code is displayed in a preset color, whether the action track two-dimensional code is displayed in a preset place or not, and if yes, the electric control lock is not opened; if not, the electric control lock is started, binding record and storage are carried out on the passing time and the digital identity card, and the later tracing is facilitated. For example, when the color feature two-dimensional code is set to be green, no risk is indicated, when the color feature two-dimensional code is yellow, risks are indicated, and some places are preset to be high risk areas, the entrance guard recognizes that the color feature two-dimensional code is displayed to be yellow, or the action track two-dimensional code recognizes that a user goes to the high risk areas, and the user does not pass through the high risk areas.
The application relates to a preferred embodiment of an information verification system based on CTID and super SIM card, which comprises the following modules:
the personal information acquisition module is used for acquiring personal information of a user including a face picture and an identity card picture through a camera by the mobile phone and sending the personal information to the CTID server in real time;
the personal information verification module is used for verifying the received personal information in real time by the CTID server, and returning a digital identification Card (CTID) to the mobile phone after verification;
the super SIM card data writing module is used for writing the received digital identity card into the super SIM card through the first NFC, and a user holds the mobile phone close to a second NFC induction area of the access control;
the super SIM card data reading module is used for reading the digital identity card from the super SIM card of the mobile phone through the second NFC by the access control, and acquiring a color characteristic two-dimensional code and a movement track two-dimensional code based on the digital identity card;
and the automatic verification module is used for automatically controlling the opening and closing of the electric control lock by the door access based on the color characteristic two-dimensional code and the action track two-dimensional code, so that unattended operation is realized.
Namely, the application performs digital epidemic prevention by combining CTID, NFC and super SIM card.
The personal information acquisition module specifically comprises:
the mobile phone obtains personal information comprising a face picture and an identity card picture through a camera, carries out hash calculation on the personal information to obtain a first hash value, packages the personal information and the first hash value into a first data packet, encrypts the first data packet through a first encryption algorithm, and then sends the first data packet to a CTID server through a first communication module. The first hash value obtained through calculation can quickly verify that the personal information is tampered in the transmission process, and the personal information is encrypted through the first encryption algorithm, so that the personal information is prevented from being stolen by plaintext.
The human information verification module specifically comprises:
the first data packet decryption unit is used for decrypting the received first data packet by the CTID server through a first encryption algorithm and analyzing to obtain the personal information and a first hash value;
the personal information hash check unit is used for carrying out hash calculation on the personal information by the CTID server to obtain a second hash value, judging whether the second hash value is equal to the first hash value or not, and if yes, entering the personnel identity check unit; if not, the feedback data of the mobile phone is destroyed;
the personal identification card consistency verification unit is used for verifying whether the face picture and the identity card picture are the data of the same person or not by the CTID server, and if yes, entering the digital identity card sending unit; if not, the verification failure is fed back to the mobile phone;
the digital identity card sending unit is used for matching the digital identity card based on the identity card picture by the CTID server, carrying out hash calculation on the digital identity card to obtain a third hash value, packaging the digital identity card and the third hash value into a second data packet, encrypting the second data packet by utilizing a second encryption algorithm and then sending the second data packet to the mobile phone; the third hash value obtained through calculation can quickly verify that the digital identity card is tampered in the transmission process, and the second encryption algorithm is used for encrypting the digital identity card, so that the digital identity card is prevented from being stolen by plaintext.
The super SIM card data writing module specifically comprises:
the second data packet decryption unit is used for decrypting the received second data packet by the mobile phone through a second encryption algorithm and analyzing to obtain the digital identity card and a third hash value;
the digital identity card hash check unit is used for carrying out hash calculation on the digital identity card of the mobile phone to obtain a fourth hash value, judging whether the fourth hash value is equal to the third hash value, and entering the digital identity card writing unit if the fourth hash value is equal to the third hash value; if not, the data is fed back to the CTID server to be destroyed;
the digital identity card writing unit is used for writing the encrypted digital identity card into the super SIM card by using the first NFC through APDU (ApplicationProtocolDataUnit) instructions after the digital identity card is encrypted by using the third encryption algorithm by the mobile phone. And the digital identity card is stored in the super SIM card after being encrypted by the third encryption algorithm, so that the digital identity card stored in the super SIM card is prevented from being stolen by plaintext.
The super SIM card data reading module specifically comprises:
the digital identity card reading unit is used for circularly reading data stored in the super SIM card by taking 255 bytes as a unit through an APDU instruction after the access control senses the super SIM card through the second NFC, and splicing the data to obtain the digital identity card;
the digital identity card decryption unit is used for decrypting the read digital identity card by the access control through a third encryption algorithm;
the two-dimension code acquisition unit is used for acquiring the color feature two-dimension code and the action track two-dimension code from the health big data server and the journey record server based on the digital identity card.
The automatic verification module specifically comprises:
the entrance guard judges whether the color feature two-dimensional code is displayed in a preset color, whether the action track two-dimensional code is displayed in a preset place or not, and if yes, the electric control lock is not opened; if not, the electric control lock is started, binding record and storage are carried out on the passing time and the digital identity card, and the later tracing is facilitated. For example, when the color feature two-dimensional code is set to be green, no risk is indicated, when the color feature two-dimensional code is yellow, risks are indicated, and some places are preset to be high risk areas, the entrance guard recognizes that the color feature two-dimensional code is displayed to be yellow, or the action track two-dimensional code recognizes that a user goes to the high risk areas, and the user does not pass through the high risk areas.
In summary, the application has the advantages that:
1. the personal information comprising the face picture and the identity card picture is sent to the CTID server through the mobile phone to check whether the personal information is consistent or not, after the personal information passes the check, the mobile phone writes the digital identity card sent by the CTID server into the super SIM card through the first NFC, the digital identity card in the super SIM card is read by the entrance guard through the second NFC, the color feature two-dimensional code and the action track two-dimensional code are obtained based on the digital identity card, the entrance guard automatically controls the opening and closing of the electric control lock after checking the color feature two-dimensional code and the action track two-dimensional code, namely, a user only needs to carry the mobile phone in the whole process, after the super SIM card of the mobile phone stores the digital identity card, the follow-up data is automatically obtained by the entrance guard to check, manual participation is not needed, the unattended operation is realized, the inefficiency and the omission caused by the manual check are avoided, the information checking efficiency is finally greatly improved, and the passing efficiency is greatly improved.
2. By encrypting the transmission of personal information, the transmission of the digital identity card and the storage of the digital identity card, encrypting by adopting different encryption algorithms respectively, and adding hash check in the transmission process of the personal information and the digital identity card, whether damage or tampering occurs in the data transmission process can be rapidly judged, five security measures (a first encryption algorithm, a second encryption algorithm, a third encryption algorithm, primary hash check and secondary hash check) are adopted before and after, and the security is greatly improved.
While specific embodiments of the application have been described above, it will be appreciated by those skilled in the art that the specific embodiments described are illustrative only and not intended to limit the scope of the application, and that equivalent modifications and variations of the application in light of the spirit of the application will be covered by the claims of the present application.
Claims (2)
1. An information verification method based on CTID and super SIM card is characterized in that: the method comprises the following steps:
step S10, a mobile phone obtains personal information comprising a face picture and an identity card picture through a camera, carries out hash calculation on the personal information to obtain a first hash value, packages the personal information and the first hash value into a first data packet, encrypts the first data packet by utilizing a first encryption algorithm, and then sends the first data packet to a CTID server through a first communication module;
step S20, the CTID server carries out verification on the received personal information, and after the verification is passed, a digital identity card is returned to the mobile phone;
step S30, the mobile phone writes the received digital identity card into a super SIM card through a first NFC;
step S40, the access control reads the digital identity card from the super SIM card of the mobile phone through the second NFC, and obtains a color feature two-dimensional code and an action track two-dimensional code based on the digital identity card;
step S50, judging whether the color feature two-dimensional code is displayed in a preset color or not by the entrance guard, and whether the action track two-dimensional code is displayed in a preset place or not, if yes, not opening an electric control lock; if not, opening the electric control lock, and binding and recording the passing time and the digital identity card and storing the passing time and the digital identity card;
the step S20 specifically includes:
s21, decrypting the received first data packet by using a first encryption algorithm by using a CTID server, and analyzing to obtain the personal information and a first hash value;
step S22, carrying out hash calculation on the personal information by the CTID server to obtain a second hash value, judging whether the second hash value is equal to the first hash value, and if so, entering step S23; if not, the feedback data of the mobile phone is destroyed;
step S23, checking whether the face picture and the identity card picture are the data of the same person or not by the CTID server, if yes, entering step S24; if not, the verification failure is fed back to the mobile phone;
step S24, the CTID server matches the digital identity card based on the identity card picture, carries out hash calculation on the digital identity card to obtain a third hash value, packages the digital identity card and the third hash value into a second data packet, encrypts the second data packet by utilizing a second encryption algorithm and then sends the second data packet to the mobile phone;
the step S30 specifically includes:
s31, the mobile phone decrypts the received second data packet by using a second encryption algorithm, and analyzes the received second data packet to obtain the digital identity card and a third hash value;
step S32, carrying out hash calculation on the digital identity card of the mobile phone to obtain a fourth hash value, judging whether the fourth hash value is equal to the third hash value, and if so, entering step S33; if not, the data is fed back to the CTID server to be destroyed;
step S33, after the mobile phone encrypts the digital identity card by using a third encryption algorithm, the encrypted digital identity card is written into the super SIM card by using a first NFC through an APDU instruction;
the step S40 specifically includes:
step S41, after the entrance guard senses the super SIM card through the second NFC, circularly reading data stored in the super SIM card by taking 255 bytes as a unit through an APDU instruction, and splicing to obtain a digital identity card;
s42, decrypting the read digital identity card by the access control by using a third encryption algorithm;
and step S43, the entrance guard respectively acquires the color feature two-dimensional code and the action track two-dimensional code from the health big data server and the journey record server based on the digital identity card.
2. An information verification system based on CTID and super SIM card is characterized in that: the device comprises the following modules:
the personal information acquisition module is used for acquiring personal information comprising a face picture and an identity card picture through a camera, carrying out hash calculation on the personal information to obtain a first hash value, packaging the personal information and the first hash value into a first data packet, encrypting the first data packet by utilizing a first encryption algorithm, and then sending the first data packet to the CTID server through the first communication module;
the personal information verification module is used for verifying the received personal information by the CTID server, and returning a digital identity card to the mobile phone after verification;
the super SIM card data writing module is used for writing the received digital identity card into the super SIM card through the first NFC;
the super SIM card data reading module is used for reading the digital identity card from the super SIM card of the mobile phone through the second NFC by the access control, and acquiring a color characteristic two-dimensional code and a movement track two-dimensional code based on the digital identity card;
the automatic verification module is used for judging whether the color feature two-dimensional code is displayed in a preset color or not, and whether the action track two-dimensional code is displayed in a preset place or not is judged, if yes, the electric control lock is not opened; if not, opening the electric control lock, and binding and recording the passing time and the digital identity card and storing the passing time and the digital identity card;
the human information verification module specifically comprises:
the first data packet decryption unit is used for decrypting the received first data packet by the CTID server through a first encryption algorithm and analyzing to obtain the personal information and a first hash value;
the personal information hash check unit is used for carrying out hash calculation on the personal information by the CTID server to obtain a second hash value, judging whether the second hash value is equal to the first hash value or not, and if yes, entering the personnel identity check unit; if not, the feedback data of the mobile phone is destroyed;
the personal identification card consistency verification unit is used for verifying whether the face picture and the identity card picture are the data of the same person or not by the CTID server, and if yes, entering the digital identity card sending unit; if not, the verification failure is fed back to the mobile phone;
the digital identity card sending unit is used for matching the digital identity card based on the identity card picture by the CTID server, carrying out hash calculation on the digital identity card to obtain a third hash value, packaging the digital identity card and the third hash value into a second data packet, encrypting the second data packet by utilizing a second encryption algorithm and then sending the second data packet to the mobile phone;
the super SIM card data writing module specifically comprises:
the second data packet decryption unit is used for decrypting the received second data packet by the mobile phone through a second encryption algorithm and analyzing to obtain the digital identity card and a third hash value;
the digital identity card hash check unit is used for carrying out hash calculation on the digital identity card of the mobile phone to obtain a fourth hash value, judging whether the fourth hash value is equal to the third hash value, and entering the digital identity card writing unit if the fourth hash value is equal to the third hash value; if not, the data is fed back to the CTID server to be destroyed;
the digital identity card writing unit is used for writing the encrypted digital identity card into the super SIM card by using the first NFC through an APDU instruction after the digital identity card is encrypted by using a third encryption algorithm by the mobile phone;
the super SIM card data reading module specifically comprises:
the digital identity card reading unit is used for circularly reading data stored in the super SIM card by taking 255 bytes as a unit through an APDU instruction after the access control senses the super SIM card through the second NFC, and splicing the data to obtain the digital identity card;
the digital identity card decryption unit is used for decrypting the read digital identity card by the access control through a third encryption algorithm;
the two-dimension code acquisition unit is used for acquiring the color feature two-dimension code and the action track two-dimension code from the health big data server and the journey record server based on the digital identity card.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210619831.1A CN115147967B (en) | 2022-06-02 | 2022-06-02 | Information verification method and system based on CTID and super SIM card |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210619831.1A CN115147967B (en) | 2022-06-02 | 2022-06-02 | Information verification method and system based on CTID and super SIM card |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115147967A CN115147967A (en) | 2022-10-04 |
CN115147967B true CN115147967B (en) | 2023-12-15 |
Family
ID=83406503
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210619831.1A Active CN115147967B (en) | 2022-06-02 | 2022-06-02 | Information verification method and system based on CTID and super SIM card |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115147967B (en) |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201820283U (en) * | 2010-10-25 | 2011-05-04 | 湖南瑞尔安防设备有限公司 | Entrance-guard card reader for intelligent all-in-one card of handset |
CN102509047A (en) * | 2011-11-09 | 2012-06-20 | 北京赛科世纪数码科技有限公司 | Method and system for verifying program code in set-top box |
CN104506515A (en) * | 2014-12-17 | 2015-04-08 | 北京极科极客科技有限公司 | Firmware protection method and firmware protection device |
CN108235807A (en) * | 2018-01-15 | 2018-06-29 | 福建联迪商用设备有限公司 | Software cryptography terminal, payment terminal, software package encryption and decryption method and system |
CN110533806A (en) * | 2019-08-13 | 2019-12-03 | 中电智能技术南京有限公司 | A kind of method and system based on NB-Iot and CTID technology setting intelligent door lock |
CN111768522A (en) * | 2020-06-10 | 2020-10-13 | 福建新大陆通信科技股份有限公司 | CTID-based intelligent door lock unlocking method and system |
CN111835903A (en) * | 2019-03-26 | 2020-10-27 | 华为技术有限公司 | Method for rapidly distributing data in NFC label and electronic equipment |
CN112965762A (en) * | 2021-03-19 | 2021-06-15 | 福建新大陆通信科技股份有限公司 | Access control management method and system based on double APP architectures |
WO2021235728A1 (en) * | 2020-05-20 | 2021-11-25 | 강원도청 | Method for managing entry events and controlling spread of infectious disease, by using unique code assigned to vulnerable quarantine facility |
CN114005215A (en) * | 2021-09-26 | 2022-02-01 | 云知声(上海)智能科技有限公司 | Personnel information checking system and checking method thereof |
CN114360129A (en) * | 2022-01-17 | 2022-04-15 | 四川启睿克科技有限公司 | Access control management method, system and equipment, and storage medium |
-
2022
- 2022-06-02 CN CN202210619831.1A patent/CN115147967B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201820283U (en) * | 2010-10-25 | 2011-05-04 | 湖南瑞尔安防设备有限公司 | Entrance-guard card reader for intelligent all-in-one card of handset |
CN102509047A (en) * | 2011-11-09 | 2012-06-20 | 北京赛科世纪数码科技有限公司 | Method and system for verifying program code in set-top box |
CN104506515A (en) * | 2014-12-17 | 2015-04-08 | 北京极科极客科技有限公司 | Firmware protection method and firmware protection device |
CN108235807A (en) * | 2018-01-15 | 2018-06-29 | 福建联迪商用设备有限公司 | Software cryptography terminal, payment terminal, software package encryption and decryption method and system |
CN111835903A (en) * | 2019-03-26 | 2020-10-27 | 华为技术有限公司 | Method for rapidly distributing data in NFC label and electronic equipment |
CN110533806A (en) * | 2019-08-13 | 2019-12-03 | 中电智能技术南京有限公司 | A kind of method and system based on NB-Iot and CTID technology setting intelligent door lock |
WO2021235728A1 (en) * | 2020-05-20 | 2021-11-25 | 강원도청 | Method for managing entry events and controlling spread of infectious disease, by using unique code assigned to vulnerable quarantine facility |
CN111768522A (en) * | 2020-06-10 | 2020-10-13 | 福建新大陆通信科技股份有限公司 | CTID-based intelligent door lock unlocking method and system |
CN112965762A (en) * | 2021-03-19 | 2021-06-15 | 福建新大陆通信科技股份有限公司 | Access control management method and system based on double APP architectures |
CN114005215A (en) * | 2021-09-26 | 2022-02-01 | 云知声(上海)智能科技有限公司 | Personnel information checking system and checking method thereof |
CN114360129A (en) * | 2022-01-17 | 2022-04-15 | 四川启睿克科技有限公司 | Access control management method, system and equipment, and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN115147967A (en) | 2022-10-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7641114B2 (en) | Authentication system, authentication method, and entrance/exit management system | |
CN108540470B (en) | Authentication system and method based on electronic authentication mark | |
CN109002875B (en) | Two-dimensional code encryption method, two-dimensional code transmission system and storage medium | |
CN108763917A (en) | A kind of data encryption/decryption method and device | |
CN104424676A (en) | Identity information sending method, identity information sending device, access control card reader and access control system | |
KR20200132158A (en) | System for managing attendance using face recognition | |
KR101240231B1 (en) | A mobile phone id card security system | |
CN114495343B (en) | Entrance guard safety control management system and entrance guard safety control management method | |
CN110084021A (en) | Cabinet surface terminal, client, cabinet face data exchange method and system | |
US11562346B2 (en) | Contactless card with multiple rotating security keys | |
CN109447029A (en) | Electronic identity license generates system and method | |
CN110098925A (en) | Based on unsymmetrical key pond to and random number quantum communications service station cryptographic key negotiation method and system | |
CN115147967B (en) | Information verification method and system based on CTID and super SIM card | |
CN108322907B (en) | Card opening method and terminal | |
CN212649500U (en) | Identity card reading system based on card body information | |
CN112884958A (en) | Electronic certificate identification method and access control equipment | |
CN114666786A (en) | Identity authentication method and system based on telecommunication smart card | |
CN111540076A (en) | Attendance data recording method and system | |
CN111353790A (en) | Article traceability information acquisition system and method | |
CN113411321B (en) | Block chain-based electricity consumption data acquisition method and system | |
CN115690969A (en) | Non-contact fingerprint authentication method, terminal, access control equipment and storage medium | |
CN114945167A (en) | Method for realizing offline interaction between mobile phone and SIM card data and remote supervision control method | |
CN104580255B (en) | Authentication method and system of the identification equipment based on recognizable code stream to terminal device | |
KR100742778B1 (en) | Method for user certification using radio frequency identification signature, recording medium thereof and apparatus for user certification using radio frequency identification signature | |
CN108492214B (en) | Mobile terminal, server, management system and self-service check-in system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |