CN115147967B - Information verification method and system based on CTID and super SIM card - Google Patents

Information verification method and system based on CTID and super SIM card Download PDF

Info

Publication number
CN115147967B
CN115147967B CN202210619831.1A CN202210619831A CN115147967B CN 115147967 B CN115147967 B CN 115147967B CN 202210619831 A CN202210619831 A CN 202210619831A CN 115147967 B CN115147967 B CN 115147967B
Authority
CN
China
Prior art keywords
identity card
digital identity
hash value
mobile phone
ctid
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210619831.1A
Other languages
Chinese (zh)
Other versions
CN115147967A (en
Inventor
吴太亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Newland Communication Science Technologies Co ltd
Original Assignee
Fujian Newland Communication Science Technologies Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Newland Communication Science Technologies Co ltd filed Critical Fujian Newland Communication Science Technologies Co ltd
Priority to CN202210619831.1A priority Critical patent/CN115147967B/en
Publication of CN115147967A publication Critical patent/CN115147967A/en
Application granted granted Critical
Publication of CN115147967B publication Critical patent/CN115147967B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/257Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/48Security arrangements using identity modules using secure binding, e.g. securely binding identity modules to devices, services or applications

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application provides an information verification method and system based on CTID and super SIM card in the technical field of entrance guard, the method includes: step S10, the mobile phone obtains personal information comprising a face picture and an identity card picture through a camera, and sends the personal information to a CTID server; step S20, the CTID server carries out verification on the received personal information, and after the verification is passed, a digital identity card is returned to the mobile phone; step S30, the mobile phone writes the received digital identity card into a super SIM card through a first NFC; step S40, the access control reads the digital identity card from the super SIM card of the mobile phone through the second NFC, and obtains a color feature two-dimensional code and an action track two-dimensional code based on the digital identity card; and S50, controlling the opening and closing of the electric control lock by the entrance guard based on the color characteristic two-dimensional code and the action track two-dimensional code. The application has the advantages that: and the information verification efficiency is greatly improved.

Description

Information verification method and system based on CTID and super SIM card
Technical Field
The application relates to the technical field of access control, in particular to an information verification method and system based on CTID and super SIM card.
Background
In order to avoid expanding the spread range of epidemic situation, people in and out need to be managed in some public places, such as markets, stations, airports, communities, parks, office buildings and the like, and individual places need to avoid the entry and exit of irrelevant people.
For the management of business turn over personnel, not only need to carry out the authentication of punching the card on the entrance guard traditionally, still need artifical verification epidemic prevention to prove, for example colour characteristic two-dimensional code (health code) and action track two-dimensional code (journey code), because the people's flow in individual place is huge, artifical verification epidemic prevention proves that work load is big, causes the omission easily, and inefficiency, seriously influences passing efficiency, can't accomplish unmanned on duty.
Therefore, how to provide an information verification method and system based on CTID and super SIM card, to improve the information verification efficiency, is a technical problem to be solved urgently.
Disclosure of Invention
The application aims to solve the technical problem of providing an information verification method and an information verification system based on CTID and super SIM card, which can improve the information verification efficiency.
In a first aspect, the present application provides an information verification method based on CTID and super SIM card, comprising the following steps:
step S10, the mobile phone obtains personal information comprising a face picture and an identity card picture through a camera, and sends the personal information to a CTID server;
step S20, the CTID server carries out verification on the received personal information, and after the verification is passed, a digital identity card is returned to the mobile phone;
step S30, the mobile phone writes the received digital identity card into a super SIM card through a first NFC;
step S40, the access control reads the digital identity card from the super SIM card of the mobile phone through the second NFC, and obtains a color feature two-dimensional code and an action track two-dimensional code based on the digital identity card;
and S50, controlling the opening and closing of the electric control lock by the entrance guard based on the color characteristic two-dimensional code and the action track two-dimensional code.
Further, the step S10 specifically includes:
the mobile phone obtains personal information comprising a face picture and an identity card picture through a camera, carries out hash calculation on the personal information to obtain a first hash value, packages the personal information and the first hash value into a first data packet, encrypts the first data packet through a first encryption algorithm, and then sends the first data packet to a CTID server through a first communication module.
Further, the step S20 specifically includes:
s21, decrypting the received first data packet by using a first encryption algorithm by using a CTID server, and analyzing to obtain the personal information and a first hash value;
step S22, carrying out hash calculation on the personal information by the CTID server to obtain a second hash value, judging whether the second hash value is equal to the first hash value, and if so, entering step S23; if not, the feedback data of the mobile phone is destroyed;
step S23, checking whether the face picture and the identity card picture are the data of the same person or not by the CTID server, if yes, entering step S24; if not, the verification failure is fed back to the mobile phone;
step S24, the CTID server matches the digital identity card based on the identity card picture, carries out hash calculation on the digital identity card to obtain a third hash value, packages the digital identity card and the third hash value into a second data packet, encrypts the second data packet by utilizing a second encryption algorithm and then sends the second data packet to the mobile phone;
the step S30 specifically includes:
s31, the mobile phone decrypts the received second data packet by using a second encryption algorithm, and analyzes the received second data packet to obtain the digital identity card and a third hash value;
step S32, carrying out hash calculation on the digital identity card of the mobile phone to obtain a fourth hash value, judging whether the fourth hash value is equal to the third hash value, and if so, entering step S33; if not, the data is fed back to the CTID server to be destroyed;
and step S33, after the mobile phone encrypts the digital identity card by using a third encryption algorithm, the encrypted digital identity card is written into the super SIM card by using the first NFC through an APDU instruction.
Further, the step S40 specifically includes:
step S41, after the entrance guard senses the super SIM card through the second NFC, circularly reading data stored in the super SIM card by taking 255 bytes as a unit through an APDU instruction, and splicing to obtain a digital identity card;
s42, decrypting the read digital identity card by the access control by using a third encryption algorithm;
and step S43, the entrance guard respectively acquires the color feature two-dimensional code and the action track two-dimensional code from the health big data server and the journey record server based on the digital identity card.
Further, the step S50 specifically includes:
the entrance guard judges whether the color feature two-dimensional code is displayed in a preset color, whether the action track two-dimensional code is displayed in a preset place or not, and if yes, the electric control lock is not opened; if not, opening the electric control lock, and binding, recording and storing the passing time and the digital identity card.
In a second aspect, the application provides an information verification system based on CTID and super SIM card, comprising the following modules:
the personal information acquisition module is used for acquiring personal information comprising a face picture and an identity card picture through a camera of the mobile phone and sending the personal information to the CTID server;
the personal information verification module is used for verifying the received personal information by the CTID server, and returning a digital identity card to the mobile phone after verification;
the super SIM card data writing module is used for writing the received digital identity card into the super SIM card through the first NFC;
the super SIM card data reading module is used for reading the digital identity card from the super SIM card of the mobile phone through the second NFC by the access control, and acquiring a color characteristic two-dimensional code and a movement track two-dimensional code based on the digital identity card;
and the automatic verification module is used for controlling the opening and closing of the electric control lock by the door access based on the color characteristic two-dimensional code and the action track two-dimensional code.
Further, the personal information acquisition module specifically includes:
the mobile phone obtains personal information comprising a face picture and an identity card picture through a camera, carries out hash calculation on the personal information to obtain a first hash value, packages the personal information and the first hash value into a first data packet, encrypts the first data packet through a first encryption algorithm, and then sends the first data packet to a CTID server through a first communication module.
Further, the human information verification module specifically includes:
the first data packet decryption unit is used for decrypting the received first data packet by the CTID server through a first encryption algorithm and analyzing to obtain the personal information and a first hash value;
the personal information hash check unit is used for carrying out hash calculation on the personal information by the CTID server to obtain a second hash value, judging whether the second hash value is equal to the first hash value or not, and if yes, entering the personnel identity check unit; if not, the feedback data of the mobile phone is destroyed;
the personal identification card consistency verification unit is used for verifying whether the face picture and the identity card picture are the data of the same person or not by the CTID server, and if yes, entering the digital identity card sending unit; if not, the verification failure is fed back to the mobile phone;
the digital identity card sending unit is used for matching the digital identity card based on the identity card picture by the CTID server, carrying out hash calculation on the digital identity card to obtain a third hash value, packaging the digital identity card and the third hash value into a second data packet, encrypting the second data packet by utilizing a second encryption algorithm and then sending the second data packet to the mobile phone;
the super SIM card data writing module specifically comprises:
the second data packet decryption unit is used for decrypting the received second data packet by the mobile phone through a second encryption algorithm and analyzing to obtain the digital identity card and a third hash value;
the digital identity card hash check unit is used for carrying out hash calculation on the digital identity card of the mobile phone to obtain a fourth hash value, judging whether the fourth hash value is equal to the third hash value, and entering the digital identity card writing unit if the fourth hash value is equal to the third hash value; if not, the data is fed back to the CTID server to be destroyed;
the digital identity card writing unit is used for writing the encrypted digital identity card into the super SIM card by the first NFC through the APDU command after the digital identity card is encrypted by the mobile phone by the third encryption algorithm.
Further, the super SIM card data reading module specifically includes:
the digital identity card reading unit is used for circularly reading data stored in the super SIM card by taking 255 bytes as a unit through an APDU instruction after the access control senses the super SIM card through the second NFC, and splicing the data to obtain the digital identity card;
the digital identity card decryption unit is used for decrypting the read digital identity card by the access control through a third encryption algorithm;
the two-dimension code acquisition unit is used for acquiring the color feature two-dimension code and the action track two-dimension code from the health big data server and the journey record server based on the digital identity card.
Further, the automatic verification module specifically comprises:
the entrance guard judges whether the color feature two-dimensional code is displayed in a preset color, whether the action track two-dimensional code is displayed in a preset place or not, and if yes, the electric control lock is not opened; if not, opening the electric control lock, and binding, recording and storing the passing time and the digital identity card.
The application has the advantages that:
1. the personal information comprising the face picture and the identity card picture is sent to the CTID server through the mobile phone to check whether the personal information is consistent or not, after the personal information passes the check, the mobile phone writes the digital identity card sent by the CTID server into the super SIM card through the first NFC, the digital identity card in the super SIM card is read by the entrance guard through the second NFC, the color feature two-dimensional code and the action track two-dimensional code are obtained based on the digital identity card, the entrance guard automatically controls the opening and closing of the electric control lock after checking the color feature two-dimensional code and the action track two-dimensional code, namely, a user only needs to carry the mobile phone in the whole process, after the super SIM card of the mobile phone stores the digital identity card, the follow-up data is automatically obtained by the entrance guard to check, manual participation is not needed, the unattended operation is realized, the inefficiency and the omission caused by the manual check are avoided, the information checking efficiency is finally greatly improved, and the passing efficiency is greatly improved.
2. By encrypting the transmission of personal information, the transmission of the digital identity card and the storage of the digital identity card, encrypting by adopting different encryption algorithms respectively, and adding hash check in the transmission process of the personal information and the digital identity card, whether damage or tampering occurs in the data transmission process can be rapidly judged, five security measures (a first encryption algorithm, a second encryption algorithm, a third encryption algorithm, primary hash check and secondary hash check) are adopted before and after, and the security is greatly improved.
Drawings
The application will be further described with reference to examples of embodiments with reference to the accompanying drawings.
Fig. 1 is a flow chart of a method of information verification based on CTID and super SIM card of the present application.
Fig. 2 is a schematic structural diagram of an information verification system based on CTID and super SIM card according to the present application.
Fig. 3 is a hardware architecture diagram of the present application.
Detailed Description
The technical scheme in the embodiment of the application has the following overall thought: the personal information is sent to the CTID server through the mobile phone to check whether the personal information is consistent or not, the digital identity card sent by the CTID server is written into the super SIM card for verification, the digital identity card in the super SIM card is read by the access control through the second NFC, the color feature two-dimensional code and the action track two-dimensional code are obtained based on the digital identity card, and then the opening and closing of the electric control lock are automatically controlled, manual participation is not needed, and information verification efficiency is improved.
Referring to fig. 1 to 3, a preferred embodiment of an information verification method based on CTID and super SIM card of the present application includes the following steps:
step S10, the mobile phone acquires personal information of a user including a face picture and an identity card picture through a camera, and sends the personal information to a CTID server in real time;
step S20, the CTID server carries out verification on the received personal information in real time, and a digital identification Card (CTID) is returned to the mobile phone after the verification is passed;
step S30, the mobile phone writes the received digital identity card into the super SIM card through the first NFC, and a user holds the mobile phone close to a second NFC induction area of the entrance guard;
step S40, the access control reads the digital identity card from the super SIM card of the mobile phone through the second NFC, and obtains a color feature two-dimensional code and an action track two-dimensional code based on the digital identity card;
and S50, automatically controlling the opening and closing of the electric control lock by the access control based on the color characteristic two-dimensional code and the action track two-dimensional code, namely realizing unattended operation.
Namely, the application performs digital epidemic prevention by combining CTID, NFC and super SIM card.
The step S10 specifically includes:
the mobile phone obtains personal information comprising a face picture and an identity card picture through a camera, carries out hash calculation on the personal information to obtain a first hash value, packages the personal information and the first hash value into a first data packet, encrypts the first data packet through a first encryption algorithm, and then sends the first data packet to a CTID server through a first communication module. The first hash value obtained through calculation can quickly verify that the personal information is tampered in the transmission process, and the personal information is encrypted through the first encryption algorithm, so that the personal information is prevented from being stolen by plaintext.
The step S20 specifically includes:
s21, decrypting the received first data packet by using a first encryption algorithm by using a CTID server, and analyzing to obtain the personal information and a first hash value;
step S22, carrying out hash calculation on the personal information by the CTID server to obtain a second hash value, judging whether the second hash value is equal to the first hash value, and if so, entering step S23; if not, the feedback data of the mobile phone is destroyed;
step S23, checking whether the face picture and the identity card picture are the data of the same person or not by the CTID server, if yes, entering step S24; if not, the verification failure is fed back to the mobile phone;
step S24, the CTID server matches the digital identity card based on the identity card picture, carries out hash calculation on the digital identity card to obtain a third hash value, packages the digital identity card and the third hash value into a second data packet, encrypts the second data packet by utilizing a second encryption algorithm and then sends the second data packet to the mobile phone; the third hash value obtained through calculation can quickly verify that the digital identity card is tampered in the transmission process, and the second encryption algorithm is used for encrypting the digital identity card, so that the digital identity card is prevented from being stolen by plaintext.
The step S30 specifically includes:
s31, the mobile phone decrypts the received second data packet by using a second encryption algorithm, and analyzes the received second data packet to obtain the digital identity card and a third hash value;
step S32, carrying out hash calculation on the digital identity card of the mobile phone to obtain a fourth hash value, judging whether the fourth hash value is equal to the third hash value, and if so, entering step S33; if not, the data is fed back to the CTID server to be destroyed;
and step S33, after the mobile phone encrypts the digital identity card by using a third encryption algorithm, the encrypted digital identity card is written into the super SIM card by using the first NFC through APDU (ApplicationProtocolDataUnit) instructions. And the digital identity card is stored in the super SIM card after being encrypted by the third encryption algorithm, so that the digital identity card stored in the super SIM card is prevented from being stolen by plaintext.
The step S40 specifically includes:
step S41, after the entrance guard senses the super SIM card through the second NFC, circularly reading data stored in the super SIM card by taking 255 bytes as a unit through an APDU instruction, and splicing to obtain a digital identity card;
s42, decrypting the read digital identity card by the access control by using a third encryption algorithm;
and step S43, the entrance guard respectively acquires the color feature two-dimensional code and the action track two-dimensional code from the health big data server and the journey record server based on the digital identity card.
The step S50 specifically includes:
the entrance guard judges whether the color feature two-dimensional code is displayed in a preset color, whether the action track two-dimensional code is displayed in a preset place or not, and if yes, the electric control lock is not opened; if not, the electric control lock is started, binding record and storage are carried out on the passing time and the digital identity card, and the later tracing is facilitated. For example, when the color feature two-dimensional code is set to be green, no risk is indicated, when the color feature two-dimensional code is yellow, risks are indicated, and some places are preset to be high risk areas, the entrance guard recognizes that the color feature two-dimensional code is displayed to be yellow, or the action track two-dimensional code recognizes that a user goes to the high risk areas, and the user does not pass through the high risk areas.
The application relates to a preferred embodiment of an information verification system based on CTID and super SIM card, which comprises the following modules:
the personal information acquisition module is used for acquiring personal information of a user including a face picture and an identity card picture through a camera by the mobile phone and sending the personal information to the CTID server in real time;
the personal information verification module is used for verifying the received personal information in real time by the CTID server, and returning a digital identification Card (CTID) to the mobile phone after verification;
the super SIM card data writing module is used for writing the received digital identity card into the super SIM card through the first NFC, and a user holds the mobile phone close to a second NFC induction area of the access control;
the super SIM card data reading module is used for reading the digital identity card from the super SIM card of the mobile phone through the second NFC by the access control, and acquiring a color characteristic two-dimensional code and a movement track two-dimensional code based on the digital identity card;
and the automatic verification module is used for automatically controlling the opening and closing of the electric control lock by the door access based on the color characteristic two-dimensional code and the action track two-dimensional code, so that unattended operation is realized.
Namely, the application performs digital epidemic prevention by combining CTID, NFC and super SIM card.
The personal information acquisition module specifically comprises:
the mobile phone obtains personal information comprising a face picture and an identity card picture through a camera, carries out hash calculation on the personal information to obtain a first hash value, packages the personal information and the first hash value into a first data packet, encrypts the first data packet through a first encryption algorithm, and then sends the first data packet to a CTID server through a first communication module. The first hash value obtained through calculation can quickly verify that the personal information is tampered in the transmission process, and the personal information is encrypted through the first encryption algorithm, so that the personal information is prevented from being stolen by plaintext.
The human information verification module specifically comprises:
the first data packet decryption unit is used for decrypting the received first data packet by the CTID server through a first encryption algorithm and analyzing to obtain the personal information and a first hash value;
the personal information hash check unit is used for carrying out hash calculation on the personal information by the CTID server to obtain a second hash value, judging whether the second hash value is equal to the first hash value or not, and if yes, entering the personnel identity check unit; if not, the feedback data of the mobile phone is destroyed;
the personal identification card consistency verification unit is used for verifying whether the face picture and the identity card picture are the data of the same person or not by the CTID server, and if yes, entering the digital identity card sending unit; if not, the verification failure is fed back to the mobile phone;
the digital identity card sending unit is used for matching the digital identity card based on the identity card picture by the CTID server, carrying out hash calculation on the digital identity card to obtain a third hash value, packaging the digital identity card and the third hash value into a second data packet, encrypting the second data packet by utilizing a second encryption algorithm and then sending the second data packet to the mobile phone; the third hash value obtained through calculation can quickly verify that the digital identity card is tampered in the transmission process, and the second encryption algorithm is used for encrypting the digital identity card, so that the digital identity card is prevented from being stolen by plaintext.
The super SIM card data writing module specifically comprises:
the second data packet decryption unit is used for decrypting the received second data packet by the mobile phone through a second encryption algorithm and analyzing to obtain the digital identity card and a third hash value;
the digital identity card hash check unit is used for carrying out hash calculation on the digital identity card of the mobile phone to obtain a fourth hash value, judging whether the fourth hash value is equal to the third hash value, and entering the digital identity card writing unit if the fourth hash value is equal to the third hash value; if not, the data is fed back to the CTID server to be destroyed;
the digital identity card writing unit is used for writing the encrypted digital identity card into the super SIM card by using the first NFC through APDU (ApplicationProtocolDataUnit) instructions after the digital identity card is encrypted by using the third encryption algorithm by the mobile phone. And the digital identity card is stored in the super SIM card after being encrypted by the third encryption algorithm, so that the digital identity card stored in the super SIM card is prevented from being stolen by plaintext.
The super SIM card data reading module specifically comprises:
the digital identity card reading unit is used for circularly reading data stored in the super SIM card by taking 255 bytes as a unit through an APDU instruction after the access control senses the super SIM card through the second NFC, and splicing the data to obtain the digital identity card;
the digital identity card decryption unit is used for decrypting the read digital identity card by the access control through a third encryption algorithm;
the two-dimension code acquisition unit is used for acquiring the color feature two-dimension code and the action track two-dimension code from the health big data server and the journey record server based on the digital identity card.
The automatic verification module specifically comprises:
the entrance guard judges whether the color feature two-dimensional code is displayed in a preset color, whether the action track two-dimensional code is displayed in a preset place or not, and if yes, the electric control lock is not opened; if not, the electric control lock is started, binding record and storage are carried out on the passing time and the digital identity card, and the later tracing is facilitated. For example, when the color feature two-dimensional code is set to be green, no risk is indicated, when the color feature two-dimensional code is yellow, risks are indicated, and some places are preset to be high risk areas, the entrance guard recognizes that the color feature two-dimensional code is displayed to be yellow, or the action track two-dimensional code recognizes that a user goes to the high risk areas, and the user does not pass through the high risk areas.
In summary, the application has the advantages that:
1. the personal information comprising the face picture and the identity card picture is sent to the CTID server through the mobile phone to check whether the personal information is consistent or not, after the personal information passes the check, the mobile phone writes the digital identity card sent by the CTID server into the super SIM card through the first NFC, the digital identity card in the super SIM card is read by the entrance guard through the second NFC, the color feature two-dimensional code and the action track two-dimensional code are obtained based on the digital identity card, the entrance guard automatically controls the opening and closing of the electric control lock after checking the color feature two-dimensional code and the action track two-dimensional code, namely, a user only needs to carry the mobile phone in the whole process, after the super SIM card of the mobile phone stores the digital identity card, the follow-up data is automatically obtained by the entrance guard to check, manual participation is not needed, the unattended operation is realized, the inefficiency and the omission caused by the manual check are avoided, the information checking efficiency is finally greatly improved, and the passing efficiency is greatly improved.
2. By encrypting the transmission of personal information, the transmission of the digital identity card and the storage of the digital identity card, encrypting by adopting different encryption algorithms respectively, and adding hash check in the transmission process of the personal information and the digital identity card, whether damage or tampering occurs in the data transmission process can be rapidly judged, five security measures (a first encryption algorithm, a second encryption algorithm, a third encryption algorithm, primary hash check and secondary hash check) are adopted before and after, and the security is greatly improved.
While specific embodiments of the application have been described above, it will be appreciated by those skilled in the art that the specific embodiments described are illustrative only and not intended to limit the scope of the application, and that equivalent modifications and variations of the application in light of the spirit of the application will be covered by the claims of the present application.

Claims (2)

1. An information verification method based on CTID and super SIM card is characterized in that: the method comprises the following steps:
step S10, a mobile phone obtains personal information comprising a face picture and an identity card picture through a camera, carries out hash calculation on the personal information to obtain a first hash value, packages the personal information and the first hash value into a first data packet, encrypts the first data packet by utilizing a first encryption algorithm, and then sends the first data packet to a CTID server through a first communication module;
step S20, the CTID server carries out verification on the received personal information, and after the verification is passed, a digital identity card is returned to the mobile phone;
step S30, the mobile phone writes the received digital identity card into a super SIM card through a first NFC;
step S40, the access control reads the digital identity card from the super SIM card of the mobile phone through the second NFC, and obtains a color feature two-dimensional code and an action track two-dimensional code based on the digital identity card;
step S50, judging whether the color feature two-dimensional code is displayed in a preset color or not by the entrance guard, and whether the action track two-dimensional code is displayed in a preset place or not, if yes, not opening an electric control lock; if not, opening the electric control lock, and binding and recording the passing time and the digital identity card and storing the passing time and the digital identity card;
the step S20 specifically includes:
s21, decrypting the received first data packet by using a first encryption algorithm by using a CTID server, and analyzing to obtain the personal information and a first hash value;
step S22, carrying out hash calculation on the personal information by the CTID server to obtain a second hash value, judging whether the second hash value is equal to the first hash value, and if so, entering step S23; if not, the feedback data of the mobile phone is destroyed;
step S23, checking whether the face picture and the identity card picture are the data of the same person or not by the CTID server, if yes, entering step S24; if not, the verification failure is fed back to the mobile phone;
step S24, the CTID server matches the digital identity card based on the identity card picture, carries out hash calculation on the digital identity card to obtain a third hash value, packages the digital identity card and the third hash value into a second data packet, encrypts the second data packet by utilizing a second encryption algorithm and then sends the second data packet to the mobile phone;
the step S30 specifically includes:
s31, the mobile phone decrypts the received second data packet by using a second encryption algorithm, and analyzes the received second data packet to obtain the digital identity card and a third hash value;
step S32, carrying out hash calculation on the digital identity card of the mobile phone to obtain a fourth hash value, judging whether the fourth hash value is equal to the third hash value, and if so, entering step S33; if not, the data is fed back to the CTID server to be destroyed;
step S33, after the mobile phone encrypts the digital identity card by using a third encryption algorithm, the encrypted digital identity card is written into the super SIM card by using a first NFC through an APDU instruction;
the step S40 specifically includes:
step S41, after the entrance guard senses the super SIM card through the second NFC, circularly reading data stored in the super SIM card by taking 255 bytes as a unit through an APDU instruction, and splicing to obtain a digital identity card;
s42, decrypting the read digital identity card by the access control by using a third encryption algorithm;
and step S43, the entrance guard respectively acquires the color feature two-dimensional code and the action track two-dimensional code from the health big data server and the journey record server based on the digital identity card.
2. An information verification system based on CTID and super SIM card is characterized in that: the device comprises the following modules:
the personal information acquisition module is used for acquiring personal information comprising a face picture and an identity card picture through a camera, carrying out hash calculation on the personal information to obtain a first hash value, packaging the personal information and the first hash value into a first data packet, encrypting the first data packet by utilizing a first encryption algorithm, and then sending the first data packet to the CTID server through the first communication module;
the personal information verification module is used for verifying the received personal information by the CTID server, and returning a digital identity card to the mobile phone after verification;
the super SIM card data writing module is used for writing the received digital identity card into the super SIM card through the first NFC;
the super SIM card data reading module is used for reading the digital identity card from the super SIM card of the mobile phone through the second NFC by the access control, and acquiring a color characteristic two-dimensional code and a movement track two-dimensional code based on the digital identity card;
the automatic verification module is used for judging whether the color feature two-dimensional code is displayed in a preset color or not, and whether the action track two-dimensional code is displayed in a preset place or not is judged, if yes, the electric control lock is not opened; if not, opening the electric control lock, and binding and recording the passing time and the digital identity card and storing the passing time and the digital identity card;
the human information verification module specifically comprises:
the first data packet decryption unit is used for decrypting the received first data packet by the CTID server through a first encryption algorithm and analyzing to obtain the personal information and a first hash value;
the personal information hash check unit is used for carrying out hash calculation on the personal information by the CTID server to obtain a second hash value, judging whether the second hash value is equal to the first hash value or not, and if yes, entering the personnel identity check unit; if not, the feedback data of the mobile phone is destroyed;
the personal identification card consistency verification unit is used for verifying whether the face picture and the identity card picture are the data of the same person or not by the CTID server, and if yes, entering the digital identity card sending unit; if not, the verification failure is fed back to the mobile phone;
the digital identity card sending unit is used for matching the digital identity card based on the identity card picture by the CTID server, carrying out hash calculation on the digital identity card to obtain a third hash value, packaging the digital identity card and the third hash value into a second data packet, encrypting the second data packet by utilizing a second encryption algorithm and then sending the second data packet to the mobile phone;
the super SIM card data writing module specifically comprises:
the second data packet decryption unit is used for decrypting the received second data packet by the mobile phone through a second encryption algorithm and analyzing to obtain the digital identity card and a third hash value;
the digital identity card hash check unit is used for carrying out hash calculation on the digital identity card of the mobile phone to obtain a fourth hash value, judging whether the fourth hash value is equal to the third hash value, and entering the digital identity card writing unit if the fourth hash value is equal to the third hash value; if not, the data is fed back to the CTID server to be destroyed;
the digital identity card writing unit is used for writing the encrypted digital identity card into the super SIM card by using the first NFC through an APDU instruction after the digital identity card is encrypted by using a third encryption algorithm by the mobile phone;
the super SIM card data reading module specifically comprises:
the digital identity card reading unit is used for circularly reading data stored in the super SIM card by taking 255 bytes as a unit through an APDU instruction after the access control senses the super SIM card through the second NFC, and splicing the data to obtain the digital identity card;
the digital identity card decryption unit is used for decrypting the read digital identity card by the access control through a third encryption algorithm;
the two-dimension code acquisition unit is used for acquiring the color feature two-dimension code and the action track two-dimension code from the health big data server and the journey record server based on the digital identity card.
CN202210619831.1A 2022-06-02 2022-06-02 Information verification method and system based on CTID and super SIM card Active CN115147967B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210619831.1A CN115147967B (en) 2022-06-02 2022-06-02 Information verification method and system based on CTID and super SIM card

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210619831.1A CN115147967B (en) 2022-06-02 2022-06-02 Information verification method and system based on CTID and super SIM card

Publications (2)

Publication Number Publication Date
CN115147967A CN115147967A (en) 2022-10-04
CN115147967B true CN115147967B (en) 2023-12-15

Family

ID=83406503

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210619831.1A Active CN115147967B (en) 2022-06-02 2022-06-02 Information verification method and system based on CTID and super SIM card

Country Status (1)

Country Link
CN (1) CN115147967B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201820283U (en) * 2010-10-25 2011-05-04 湖南瑞尔安防设备有限公司 Entrance-guard card reader for intelligent all-in-one card of handset
CN102509047A (en) * 2011-11-09 2012-06-20 北京赛科世纪数码科技有限公司 Method and system for verifying program code in set-top box
CN104506515A (en) * 2014-12-17 2015-04-08 北京极科极客科技有限公司 Firmware protection method and firmware protection device
CN108235807A (en) * 2018-01-15 2018-06-29 福建联迪商用设备有限公司 Software cryptography terminal, payment terminal, software package encryption and decryption method and system
CN110533806A (en) * 2019-08-13 2019-12-03 中电智能技术南京有限公司 A kind of method and system based on NB-Iot and CTID technology setting intelligent door lock
CN111768522A (en) * 2020-06-10 2020-10-13 福建新大陆通信科技股份有限公司 CTID-based intelligent door lock unlocking method and system
CN111835903A (en) * 2019-03-26 2020-10-27 华为技术有限公司 Method for rapidly distributing data in NFC label and electronic equipment
CN112965762A (en) * 2021-03-19 2021-06-15 福建新大陆通信科技股份有限公司 Access control management method and system based on double APP architectures
WO2021235728A1 (en) * 2020-05-20 2021-11-25 강원도청 Method for managing entry events and controlling spread of infectious disease, by using unique code assigned to vulnerable quarantine facility
CN114005215A (en) * 2021-09-26 2022-02-01 云知声(上海)智能科技有限公司 Personnel information checking system and checking method thereof
CN114360129A (en) * 2022-01-17 2022-04-15 四川启睿克科技有限公司 Access control management method, system and equipment, and storage medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201820283U (en) * 2010-10-25 2011-05-04 湖南瑞尔安防设备有限公司 Entrance-guard card reader for intelligent all-in-one card of handset
CN102509047A (en) * 2011-11-09 2012-06-20 北京赛科世纪数码科技有限公司 Method and system for verifying program code in set-top box
CN104506515A (en) * 2014-12-17 2015-04-08 北京极科极客科技有限公司 Firmware protection method and firmware protection device
CN108235807A (en) * 2018-01-15 2018-06-29 福建联迪商用设备有限公司 Software cryptography terminal, payment terminal, software package encryption and decryption method and system
CN111835903A (en) * 2019-03-26 2020-10-27 华为技术有限公司 Method for rapidly distributing data in NFC label and electronic equipment
CN110533806A (en) * 2019-08-13 2019-12-03 中电智能技术南京有限公司 A kind of method and system based on NB-Iot and CTID technology setting intelligent door lock
WO2021235728A1 (en) * 2020-05-20 2021-11-25 강원도청 Method for managing entry events and controlling spread of infectious disease, by using unique code assigned to vulnerable quarantine facility
CN111768522A (en) * 2020-06-10 2020-10-13 福建新大陆通信科技股份有限公司 CTID-based intelligent door lock unlocking method and system
CN112965762A (en) * 2021-03-19 2021-06-15 福建新大陆通信科技股份有限公司 Access control management method and system based on double APP architectures
CN114005215A (en) * 2021-09-26 2022-02-01 云知声(上海)智能科技有限公司 Personnel information checking system and checking method thereof
CN114360129A (en) * 2022-01-17 2022-04-15 四川启睿克科技有限公司 Access control management method, system and equipment, and storage medium

Also Published As

Publication number Publication date
CN115147967A (en) 2022-10-04

Similar Documents

Publication Publication Date Title
US7641114B2 (en) Authentication system, authentication method, and entrance/exit management system
CN108540470B (en) Authentication system and method based on electronic authentication mark
CN109002875B (en) Two-dimensional code encryption method, two-dimensional code transmission system and storage medium
CN108763917A (en) A kind of data encryption/decryption method and device
CN104424676A (en) Identity information sending method, identity information sending device, access control card reader and access control system
KR20200132158A (en) System for managing attendance using face recognition
KR101240231B1 (en) A mobile phone id card security system
CN114495343B (en) Entrance guard safety control management system and entrance guard safety control management method
CN110084021A (en) Cabinet surface terminal, client, cabinet face data exchange method and system
US11562346B2 (en) Contactless card with multiple rotating security keys
CN109447029A (en) Electronic identity license generates system and method
CN110098925A (en) Based on unsymmetrical key pond to and random number quantum communications service station cryptographic key negotiation method and system
CN115147967B (en) Information verification method and system based on CTID and super SIM card
CN108322907B (en) Card opening method and terminal
CN212649500U (en) Identity card reading system based on card body information
CN112884958A (en) Electronic certificate identification method and access control equipment
CN114666786A (en) Identity authentication method and system based on telecommunication smart card
CN111540076A (en) Attendance data recording method and system
CN111353790A (en) Article traceability information acquisition system and method
CN113411321B (en) Block chain-based electricity consumption data acquisition method and system
CN115690969A (en) Non-contact fingerprint authentication method, terminal, access control equipment and storage medium
CN114945167A (en) Method for realizing offline interaction between mobile phone and SIM card data and remote supervision control method
CN104580255B (en) Authentication method and system of the identification equipment based on recognizable code stream to terminal device
KR100742778B1 (en) Method for user certification using radio frequency identification signature, recording medium thereof and apparatus for user certification using radio frequency identification signature
CN108492214B (en) Mobile terminal, server, management system and self-service check-in system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant