CN117077116B - Digital ID security authentication method, device and system - Google Patents

Digital ID security authentication method, device and system Download PDF

Info

Publication number
CN117077116B
CN117077116B CN202311330572.1A CN202311330572A CN117077116B CN 117077116 B CN117077116 B CN 117077116B CN 202311330572 A CN202311330572 A CN 202311330572A CN 117077116 B CN117077116 B CN 117077116B
Authority
CN
China
Prior art keywords
digital
reading device
reading
virtual
elements
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311330572.1A
Other languages
Chinese (zh)
Other versions
CN117077116A (en
Inventor
杨超杰
刘能明
陈乐�
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qianhai Lianda Shenzhen Technology Co ltd
Original Assignee
Qianhai Lianda Shenzhen Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qianhai Lianda Shenzhen Technology Co ltd filed Critical Qianhai Lianda Shenzhen Technology Co ltd
Priority to CN202311330572.1A priority Critical patent/CN117077116B/en
Publication of CN117077116A publication Critical patent/CN117077116A/en
Application granted granted Critical
Publication of CN117077116B publication Critical patent/CN117077116B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Collating Specific Patterns (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the field of computers, in particular to a digital ID security authentication method, a device and a system, wherein the method comprises the steps of firstly generating a plurality of virtual digital IDs and sending the virtual digital IDs to a reading device when a digital ID authentication request sent by the reading device is received, and receiving corresponding feedback of the reading device, namely, before formally receiving the digital IDs sent by the reading device to authenticate the digital IDs, firstly generating a plurality of testable digital IDs to test the accuracy of information integration and circulation of the reading device, and introducing average coincidence rate to quantitatively evaluate the test result; the invention can verify the digital ID sent by the reader under the condition of ensuring that the reader has stronger reliability, thereby greatly reducing the verification error of the digital ID.

Description

Digital ID security authentication method, device and system
Technical Field
The present invention relates to the field of computers, and in particular, to a method, an apparatus, and a system for digital ID security authentication.
Background
A digital ID (Identity) refers to an Identity represented in digital form for uniquely identifying a person, organization or entity; in the era of digitization, digital IDs are widely used in a variety of scenarios, such as electronic payments, online accounts, social media accounts, and the like; with digital ID, individuals or organizations can perform authentication, interaction, and access control over the network.
The main flow of digital ID authentication is that an ID reading device reads and acquires a digital ID and then sends the digital ID to an authentication server for authentication, and the digital ID authentication method is mainly used for authenticating the digital ID itself, but as different reading devices possibly miss or tamper the ID information to different degrees and the like in the process of reading the digital ID and sending the digital ID to the authentication server, the digital ID of a user cannot be accurately authenticated;
therefore, the conventional digital ID security authentication method has a problem that it is difficult to evaluate the reliability of the ID reading device.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a digital ID security authentication method, apparatus and system.
The embodiment of the invention is realized in such a way that a digital ID security authentication method comprises the following steps:
s1: acquiring a verification request of reading equipment;
s2: generating a preset number of virtual digital IDs, wherein each virtual digital ID comprises a plurality of ID elements;
s3: taking a virtual digital ID as a first digital ID;
s4: the ID elements in the first digital ID are sent to the reading equipment one by one;
s5: acquiring a second digital ID returned by the reading device to be verified, wherein the second digital ID is a digital ID obtained by integrating the ID elements of the received first digital ID by the reading device;
s6: comparing the ID element of the first digital ID with the ID element of the second digital ID to obtain the coincidence rate of the ID element of the first digital ID and the ID element of the second digital ID;
s7: taking another virtual digital ID as a first digital ID, executing the steps S4 to S6 until the corresponding anastomosis rate of the virtual digital ID is obtained, and repeatedly executing the steps so as to obtain the corresponding anastomosis rate of each virtual digital ID;
s8: calculating the average coincidence rate of each coincidence rate, and judging whether the average coincidence rate is larger than a preset value or not;
s9: if the average coincidence rate is larger than the preset value, the user digital ID sent by the reading equipment is received through the verification request of the reading equipment so as to carry out digital ID verification;
s10: and sending the verification result to the reading device.
In one embodiment, the present invention provides a digital ID security authentication device comprising:
the first acquisition module is used for acquiring a verification request of the reading equipment;
the first processing module is used for generating a preset number of virtual digital IDs, and each virtual digital ID comprises a plurality of ID elements;
the second processing module is used for taking a virtual digital ID as a first digital ID;
the third processing module is used for sending the ID elements in the first digital ID to the reading device one by one;
the second acquisition module is used for acquiring a second digital ID returned by the reading device to be verified, wherein the second digital ID is a digital ID obtained by integrating the ID elements of the received first digital ID by the reading device;
the fourth processing module is used for comparing the ID element of the first digital ID with the ID element of the second digital ID to obtain the coincidence rate of the ID element of the first digital ID and the ID element of the second digital ID;
the repeated execution module is used for taking another virtual digital ID as a first digital ID, executing the steps S4 to S6 until the anastomosis rate corresponding to the virtual digital ID is obtained, and repeatedly executing the step, so that the anastomosis rate corresponding to each virtual digital ID is obtained;
the fifth processing module is used for calculating the average coincidence rate of each coincidence rate and judging whether the average coincidence rate is larger than a preset value or not;
the sixth processing module is used for receiving the user digital ID sent by the reading equipment through the verification request of the reading equipment if the average coincidence rate is larger than a preset value so as to perform digital ID verification;
and the seventh processing module is used for sending the verification result to the reading device.
In one embodiment, the present invention provides a digital ID security authentication system, the system comprising:
at least one reading device for reading the digital ID;
and the computer equipment is connected with each reading equipment and is used for executing the digital ID security authentication method.
The application provides a digital ID security authentication method, which comprises the steps of obtaining a verification request of reading equipment; generating a preset number of virtual digital IDs; taking a virtual digital ID as a first digital ID; the ID elements in the first digital ID are sent to the reading equipment one by one; acquiring a second digital ID returned by the reading device to be verified; comparing the ID element of the first digital ID with the ID element of the second digital ID to obtain the coincidence rate of the ID element of the first digital ID and the ID element of the second digital ID; repeating the steps to obtain the coincidence rate corresponding to each virtual digital ID; calculating the average coincidence rate of each coincidence rate, and judging whether the average coincidence rate is larger than a preset value or not; if the average coincidence rate is larger than the preset value, the user digital ID sent by the reading equipment is received through the verification request of the reading equipment so as to carry out digital ID verification; transmitting the verification result to the reading device; after receiving the digital ID verification request sent by the reading device, the invention firstly generates a plurality of virtual digital IDs and sends the virtual digital IDs to the reading device, and receives corresponding feedback of the reading device, namely, before formally receiving the digital IDs sent by the reading device to verify the digital IDs, firstly generates a plurality of testability digital IDs to test the information integration and circulation accuracy of the reading device, and introduces average coincidence rate to quantitatively evaluate the test result, thus being capable of verifying the sent digital IDs under the condition of ensuring that the reading device has stronger reliability, and greatly reducing the verification error of the digital IDs.
Drawings
FIG. 1 is a flow chart of a digital ID security authentication method provided in one embodiment;
FIG. 2 is a block diagram of a digital ID security authentication device provided in one embodiment;
FIG. 3 is a schematic diagram of the components of a digital ID security authentication system provided in one embodiment;
FIG. 4 is a block diagram of the internal architecture of a computer device in one embodiment.
Description of the embodiments
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
It will be understood that the terms "first," "second," and the like, as used herein, may be used to describe various elements, but these elements are not limited by these terms unless otherwise specified. These terms are only used to distinguish one element from another element. For example, a first xx script may be referred to as a second xx script, and similarly, a second xx script may be referred to as a first xx script, without departing from the scope of this disclosure.
As shown in fig. 1, in one embodiment, a digital ID security authentication method is provided, the method including:
s1: acquiring a verification request of reading equipment;
s2: generating a preset number of virtual digital IDs, wherein each virtual digital ID comprises a plurality of ID elements;
s3: taking a virtual digital ID as a first digital ID;
s4: the ID elements in the first digital ID are sent to the reading equipment one by one;
s5: acquiring a second digital ID returned by the reading device to be verified, wherein the second digital ID is a digital ID obtained by integrating the ID elements of the received first digital ID by the reading device;
s6: comparing the ID element of the first digital ID with the ID element of the second digital ID to obtain the coincidence rate of the ID element of the first digital ID and the ID element of the second digital ID;
s7: taking another virtual digital ID as a first digital ID, executing the steps S4 to S6 until the corresponding anastomosis rate of the virtual digital ID is obtained, and repeatedly executing the steps so as to obtain the corresponding anastomosis rate of each virtual digital ID;
s8: calculating the average coincidence rate of each coincidence rate, and judging whether the average coincidence rate is larger than a preset value or not;
s9: if the average coincidence rate is larger than the preset value, the user digital ID sent by the reading equipment is received through the verification request of the reading equipment so as to carry out digital ID verification;
s10: and sending the verification result to the reading device.
In this embodiment, the method is executed in a computer device, where the computer device may be an independent physical server or terminal, or may be a server cluster formed by multiple physical servers, or may be a cloud server that provides basic cloud computing services such as a cloud server, a cloud database, a cloud storage, a CDN, and the like; the ID element type of the digital ID may include a unique identification code, a random code, a time factor, a biometric feature (fingerprint, facial feature), etc.; the digital ID reading device refers to a device for reading and verifying digital ID information, and is widely applied to various scenes, including places such as airports, banks, hotels, government institutions and the like which need identity verification and security access control; the reading equipment can comprise an identity card reader, a fingerprint identifier, a visual identifier, an NFC reader, a two-dimensional code scanner and the like; the information is encrypted by an encryption algorithm before each information transmission between the computer device and the reading device, and the encryption algorithm can be a symmetric encryption algorithm or an asymmetric encryption algorithm, which is not limited herein; in addition, the computer equipment and the reading equipment are internally provided with corresponding decryption algorithms to decrypt the received encrypted information.
In the application, after reading the digital ID of the user, the reading device needs to send the digital ID to the computer device to verify the digital ID, and before sending the digital ID to the computer device, the reading device needs to send a verification request to the computer device, and the computer device receives the digital ID after the request passes; the computer equipment generates a plurality of virtual digital IDs after receiving the verification request and transmits the virtual digital IDs to corresponding reading equipment, the types and the number of ID elements contained in the virtual digital IDs are consistent with the actual digital IDs, one virtual digital ID is transmitted after the other virtual digital ID is transmitted when the digital IDs are transmitted, and the ID elements in the virtual digital IDs are respectively transmitted when each virtual digital ID is transmitted; after receiving each ID element, the reading device sorts the ID elements into a complete digital ID, namely a second digital ID, and sends the second digital ID to the computer device, wherein the process is consistent with the process of reading the digital ID by the reading device and integrating the digital ID and sending the digital ID to the computer device, namely the process of sending the first digital ID and receiving the second digital ID by the computer device each time is an analog process, the evaluation of the analog process is further realized by calculating the coincidence rate of the first digital ID and receiving the second digital ID, and finally, the result of multiple evaluations is averaged (average coincidence rate) to improve the accuracy of the evaluation; when the average coincidence rate is larger than a preset value (such as 80%), the verification request passes, the reading device sends the acquired actual digital ID to the computer device for verification, and the computer device sends a verification result to the reading device after the verification is completed; the invention can verify the digital ID sent by the reader under the condition of ensuring that the reader has stronger reliability, thereby greatly reducing the verification error of the digital ID.
In a preferred embodiment of the present invention, the step of generating any one virtual digital ID specifically includes:
s21: taking an element type as an element type to be sampled;
s22: screening out ID elements belonging to the type of the element to be sampled from each received historical digital ID;
s23: taking any one ID element from the screened ID elements as the ID element of which the virtual digital ID corresponds to the type of the element to be sampled;
s24: taking another element type as the element type to be sampled, executing the steps S21 to S23 to obtain the ID element of which the virtual digital ID corresponds to the element type, and repeatedly executing the steps until the ID element of which the virtual digital ID corresponds to each element type is obtained.
And sending the ID elements in the first digital ID to the reading device one by one, namely sending all the ID elements in the first digital ID to the reading device according to the reading sequence of the reading device, wherein the reading sequence is the sequence of reading the ID elements corresponding to the element types by the reading device.
In this embodiment, the computer device may store ID elements in each verified digital ID, so that a large number of ID elements of different element types are stored in the computer device, for each element type, one of the stored ID elements is arbitrarily selected, and then the selected ID elements corresponding to each element type are combined to obtain the virtual digital ID; the reading device has a sequence when identifying the ID elements of each digital ID, and the sending sequence of the first digital ID is set to be consistent with the identification sequence of the reading device, so that the simulation authenticity can be improved.
In a preferred embodiment of the present invention, the step of comparing the ID element of the first digital ID with the ID element of the second digital ID includes the steps of:
s61: taking any one first element as a comparison element;
s62: comparing the comparison element with each of the second elements;
s63: if one second element is the same as the comparison element, the comparison element is successfully compared, otherwise the comparison element fails to be compared;
s64: taking another first element as a comparison element, executing steps S61 to S63 to further determine whether the first elements are successfully compared, and repeatedly executing the steps until determining whether each first element is successfully compared.
The anastomosis rate is obtained by the following formula:
wherein,for the corresponding fitness of the ith first digital ID,/I>For the first number of elements in the ith first digital ID, <>The number of the first elements successfully compared in the ith first digital ID.
In this embodiment, for example, the generated first digital ID includes 5 first elements such as a user password, a random password, a timestamp, a fingerprint, a facial feature, etc., and only 3 second elements such as a user password, a fingerprint, a facial feature, etc. in the second digital ID can find the same first elements, the matching rate is 60%; if the total of 3 first digital IDs, the corresponding anastomosis rates of the first digital IDs are 60%, 70% and 80%, the average anastomosis rate is 70%.
In a preferred embodiment of the present invention, there are several reading devices, and for any reading device, each time a preset period of time passes, the number of times of sending the verification request and the number of times of passing the verification request of the reading device in the preset period of time are obtained, so as to obtain the passing rate of the verification request of the reading device, where the passing rate of the verification request is obtained by the following formula:
wherein U is the passing rate of the verification request of the reading device in the preset time length, R is the sending times of the verification request of the reading device in the preset time length, and A is the passing times of the verification request of the reading device in the preset time length.
Determining the preset number of the generated virtual digital ID of the next preset time according to the verification request passing rate, wherein the preset number is calculated by the following formula:
wherein,for the preset number corresponding to the preset duration, < ->For the preset number corresponding to the next preset duration, < > for the next preset duration>Is the preset standard passing rate.
In this embodiment, the preset duration may be 1 month, 2 months, or other durations, which are not limited herein; the standard pass rate may be set to 80% or other values, not limited herein; through the calculation formula of the embodiment, the preset number corresponding to the next preset duration is inversely proportional to the passing rate of the verification request in the preset duration, namely, when the passing rate is low, the reliability of the reading device is low, and further, simulation evaluation of more times is carried out on the reading device in each time in the next preset duration; the preset number obtained through calculation may be an integer or a decimal, and when the preset number is decimal, the preset number is rounded up.
As shown in fig. 2, in one embodiment, there is provided a digital ID security authentication device, the device comprising:
the first acquisition module is used for acquiring a verification request of the reading equipment;
the first processing module is used for generating a preset number of virtual digital IDs, and each virtual digital ID comprises a plurality of ID elements;
the second processing module is used for taking a virtual digital ID as a first digital ID;
the third processing module is used for sending the ID elements in the first digital ID to the reading device one by one;
the second acquisition module is used for acquiring a second digital ID returned by the reading device to be verified, wherein the second digital ID is a digital ID obtained by integrating the ID elements of the received first digital ID by the reading device;
the fourth processing module is used for comparing the ID element of the first digital ID with the ID element of the second digital ID to obtain the coincidence rate of the ID element of the first digital ID and the ID element of the second digital ID;
the repeated execution module is used for taking another virtual digital ID as a first digital ID, executing the steps S4 to S6 until the anastomosis rate corresponding to the virtual digital ID is obtained, and repeatedly executing the step, so that the anastomosis rate corresponding to each virtual digital ID is obtained;
the fifth processing module is used for calculating the average coincidence rate of each coincidence rate and judging whether the average coincidence rate is larger than a preset value or not;
the sixth processing module is used for receiving the user digital ID sent by the reading equipment through the verification request of the reading equipment if the average coincidence rate is larger than a preset value so as to perform digital ID verification;
and the seventh processing module is used for sending the verification result to the reading device.
The process of implementing respective functions by each module in the image saturation adjustment apparatus provided in this embodiment of the present application may refer to the foregoing description of the embodiment shown in fig. 1, which is not repeated herein.
As shown in fig. 3, the present application further provides a digital ID security authentication system, the system comprising:
at least one reading device for reading the digital ID;
and the computer equipment is connected with each reading equipment and is used for executing the digital ID security authentication method.
In this embodiment, when the computer device communicates with each reading device, specifically, when the computer device communicates with each reading device, after receiving a digital ID verification request sent by the reading device, the computer device generates a plurality of virtual digital IDs and sends the virtual digital IDs to the reading device, and receives corresponding feedback of the reading device, that is, before formally receiving the digital IDs sent by the reading device to verify the digital IDs, the computer device generates a plurality of testable digital IDs to test the accuracy of information integration and circulation of the reading device, and introduces an average matching rate to quantitatively evaluate the test result, so that the verification error of the digital IDs is greatly reduced when the reading device is ensured to have stronger reliability.
FIG. 4 illustrates an internal block diagram of a computer device in one embodiment. As shown in fig. 4, the computer device includes a processor, a memory, a network interface, an input device, and a display screen connected by a system bus. The memory includes a nonvolatile storage medium and an internal memory. The non-volatile storage medium of the computer device stores an operating system and may also store a computer program, which when executed by a processor, causes the processor to implement the digital ID security authentication method provided by the embodiment of the present invention. The internal memory may also store a computer program, which when executed by the processor, causes the processor to execute the digital ID security authentication method provided by the embodiment of the present invention. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, the input device of the computer equipment can be a touch layer covered on the display screen, can also be keys, a track ball or a touch pad arranged on the shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
It will be appreciated by persons skilled in the art that the architecture shown in fig. 4 is merely a block diagram of some of the architecture relevant to the present inventive arrangements and is not limiting as to the computer device to which the present inventive arrangements are applicable, and that a particular computer device may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
In one embodiment, the digital ID security authentication apparatus provided in the embodiments of the present invention may be implemented in the form of a computer program that can be run on a computer device as shown in fig. 4. The memory of the computer device may store various program modules constituting the digital ID security authentication device, such as a first acquisition module, a first processing module, a second processing module, a third processing module, a second acquisition module, a fourth processing module, a repetitive execution module, a fifth processing module, a sixth processing module, and a seventh processing module shown in fig. 2. The computer program constituted by the respective program modules causes the processor to execute the steps in the digital ID security authentication method of the respective embodiments of the present invention described in the present specification.
For example, the computer apparatus shown in fig. 4 may perform step S1 through the first acquisition module in the digital ID security authentication device shown in fig. 2; the computer equipment can execute the step S2 through the first processing module; the computer equipment can execute the step S3 through the second processing module; the computer equipment can execute the step S4 through the third processing module; the computer equipment can execute the step S5 through the second acquisition module; the computer equipment can execute the step S6 through a fourth processing module; the computer equipment can execute the step S7 through the repeated execution module; the computer equipment can execute the step S8 through a fifth processing module; the computer equipment can execute the step S9 through a sixth processing module; the computer device may perform step S10 through a seventh processing module.
In one embodiment, a computer device is presented, the computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
s1: acquiring a verification request of reading equipment;
s2: generating a preset number of virtual digital IDs;
s3: taking a virtual digital ID as a first digital ID;
s4: the ID elements in the first digital ID are sent to the reading equipment one by one;
s5: acquiring a second digital ID returned by the reading device to be verified;
s6: comparing the ID element of the first digital ID with the ID element of the second digital ID to obtain the coincidence rate of the ID element of the first digital ID and the ID element of the second digital ID;
s7: taking another virtual digital ID as a first digital ID, executing the steps S4 to S6 until the corresponding anastomosis rate of the virtual digital ID is obtained, and repeatedly executing the steps so as to obtain the corresponding anastomosis rate of each virtual digital ID;
s8: calculating the average coincidence rate of each coincidence rate, and judging whether the average coincidence rate is larger than a preset value or not;
s9: if the average coincidence rate is larger than the preset value, the user digital ID sent by the reading equipment is received through the verification request of the reading equipment so as to carry out digital ID verification;
s10: and sending the verification result to the reading device.
In one embodiment, a computer readable storage medium is provided, having a computer program stored thereon, which when executed by a processor causes the processor to perform the steps of:
s1: acquiring a verification request of reading equipment;
s2: generating a preset number of virtual digital IDs;
s3: taking a virtual digital ID as a first digital ID;
s4: the ID elements in the first digital ID are sent to the reading equipment one by one;
s5: acquiring a second digital ID returned by the reading device to be verified;
s6: comparing the ID element of the first digital ID with the ID element of the second digital ID to obtain the coincidence rate of the ID element of the first digital ID and the ID element of the second digital ID;
s7: taking another virtual digital ID as a first digital ID, executing the steps S4 to S6 until the corresponding anastomosis rate of the virtual digital ID is obtained, and repeatedly executing the steps so as to obtain the corresponding anastomosis rate of each virtual digital ID;
s8: calculating the average coincidence rate of each coincidence rate, and judging whether the average coincidence rate is larger than a preset value or not;
s9: if the average coincidence rate is larger than the preset value, the user digital ID sent by the reading equipment is received through the verification request of the reading equipment so as to carry out digital ID verification;
s10: and sending the verification result to the reading device.
It should be understood that, although the steps in the flowcharts of the embodiments of the present invention are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in various embodiments may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, nor do the order in which the sub-steps or stages are performed necessarily performed in sequence, but may be performed alternately or alternately with at least a portion of the sub-steps or stages of other steps or other steps.
Those skilled in the art will appreciate that all or part of the processes in the methods of the above embodiments may be implemented by a computer program for instructing relevant hardware, where the program may be stored in a non-volatile computer readable storage medium, and where the program, when executed, may include processes in the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
The technical features of the above-described embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above-described embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples illustrate only a few embodiments of the invention and are described in detail herein without thereby limiting the scope of the invention. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the invention, which are all within the scope of the invention. Accordingly, the scope of protection of the present invention is to be determined by the appended claims.

Claims (9)

1. A digital ID security authentication method, the method comprising:
s1: acquiring a verification request of reading equipment;
s2: generating a preset number of virtual digital IDs, wherein each virtual digital ID comprises a plurality of ID elements;
s3: taking a virtual digital ID as a first digital ID;
s4: the ID elements in the first digital ID are sent to the reading equipment one by one;
s5: acquiring a second digital ID returned by the reading device to be verified, wherein the second digital ID is a digital ID obtained by integrating the ID elements of the received first digital ID by the reading device;
s6: comparing the ID element of the first digital ID with the ID element of the second digital ID to obtain the coincidence rate of the ID element of the first digital ID and the ID element of the second digital ID;
s7: taking another virtual digital ID as a first digital ID, executing the steps S4 to S6 until the corresponding anastomosis rate of the virtual digital ID is obtained, and repeatedly executing the steps so as to obtain the corresponding anastomosis rate of each virtual digital ID;
s8: calculating the average coincidence rate of each coincidence rate, and judging whether the average coincidence rate is larger than a preset value or not;
s9: if the average coincidence rate is larger than the preset value, the user digital ID sent by the reading equipment is received through the verification request of the reading equipment so as to carry out digital ID verification;
s10: and sending the verification result to the reading device.
2. The method according to claim 1, wherein each ID element corresponds to an element type, and the step of generating any one virtual digital ID specifically comprises:
s21: taking an element type as an element type to be sampled;
s22: screening out ID elements belonging to the type of the element to be sampled from each received historical digital ID;
s23: taking any one ID element from the screened ID elements as the ID element of which the virtual digital ID corresponds to the type of the element to be sampled;
s24: taking another element type as the element type to be sampled, executing the steps S21 to S23 to obtain the ID element of which the virtual digital ID corresponds to the element type, and repeatedly executing the steps until the ID element of which the virtual digital ID corresponds to each element type is obtained.
3. The method of claim 2, wherein the sending the ID elements in the first digital ID to the reading device one by one is sending each ID element in the first digital ID to the reading device according to a reading order of the reading device, where the reading order is a sequence in which the reading device reads the ID elements corresponding to each element type.
4. The method of claim 1, wherein the first digital ID has an ID element of a first digital ID and the second digital ID has an ID element of a second digital ID, and wherein the comparing the first digital ID and the second digital ID comprises:
s61: taking any one first element as a comparison element;
s62: comparing the comparison element with each of the second elements;
s63: if one second element is the same as the comparison element, the comparison element is successfully compared, otherwise the comparison element fails to be compared;
s64: taking another first element as a comparison element, executing steps S61 to S63 to further determine whether the first elements are successfully compared, and repeatedly executing the steps until determining whether each first element is successfully compared.
5. The method of claim 4, wherein the anastomosis ratio is obtained by the following formula:
wherein,for the corresponding fitness of the ith first digital ID,/I>For the first number of elements in the ith first digital ID, <>The number of the first elements successfully compared in the ith first digital ID.
6. The method of claim 1, wherein the number of reading devices is several, and for any reading device, each time a preset period of time passes, the number of times of sending the verification request and the number of times of passing the verification request of the reading device in the preset period of time are obtained, so as to obtain the passing rate of the verification request of the reading device, where the passing rate of the verification request is obtained by the following formula:
wherein U is the passing rate of the verification request of the reading device in the preset time length, R is the sending times of the verification request of the reading device in the preset time length, and A is the passing times of the verification request of the reading device in the preset time length.
7. The method of claim 6, wherein determining the preset number of generated virtual digital IDs for the next preset duration according to the verification request passing rate is specifically calculated by the following formula:
wherein,for the preset number corresponding to the preset duration, < ->For the preset number corresponding to the next preset duration,is the preset standard passing rate.
8. A digital ID security authentication device, the device comprising:
the first acquisition module is used for acquiring a verification request of the reading equipment;
the first processing module is used for generating a preset number of virtual digital IDs, and each virtual digital ID comprises a plurality of ID elements;
the second processing module is used for taking a virtual digital ID as a first digital ID;
the third processing module is used for sending the ID elements in the first digital ID to the reading device one by one;
the second acquisition module is used for acquiring a second digital ID returned by the reading device to be verified, wherein the second digital ID is a digital ID obtained by integrating the ID elements of the received first digital ID by the reading device;
the fourth processing module is used for comparing the ID element of the first digital ID with the ID element of the second digital ID to obtain the coincidence rate of the ID element of the first digital ID and the ID element of the second digital ID;
the repeated execution module is used for taking another virtual digital ID as a first digital ID, executing the steps S4 to S6 until the anastomosis rate corresponding to the virtual digital ID is obtained, and repeatedly executing the step, so that the anastomosis rate corresponding to each virtual digital ID is obtained;
the fifth processing module is used for calculating the average coincidence rate of each coincidence rate and judging whether the average coincidence rate is larger than a preset value or not;
the sixth processing module is used for receiving the user digital ID sent by the reading equipment through the verification request of the reading equipment if the average coincidence rate is larger than a preset value so as to perform digital ID verification;
and the seventh processing module is used for sending the verification result to the reading device.
9. A digital ID security authentication system, the system comprising:
at least one reading device for reading the digital ID;
computer device, connected to each reading device, for performing the digital ID security authentication method according to any of claims 1-7.
CN202311330572.1A 2023-10-16 2023-10-16 Digital ID security authentication method, device and system Active CN117077116B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311330572.1A CN117077116B (en) 2023-10-16 2023-10-16 Digital ID security authentication method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311330572.1A CN117077116B (en) 2023-10-16 2023-10-16 Digital ID security authentication method, device and system

Publications (2)

Publication Number Publication Date
CN117077116A CN117077116A (en) 2023-11-17
CN117077116B true CN117077116B (en) 2023-12-19

Family

ID=88717523

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311330572.1A Active CN117077116B (en) 2023-10-16 2023-10-16 Digital ID security authentication method, device and system

Country Status (1)

Country Link
CN (1) CN117077116B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103051454A (en) * 2012-12-19 2013-04-17 天地融科技股份有限公司 Electronic equipment and password authentication method thereof
EP2996063A1 (en) * 2014-09-09 2016-03-16 IDscan Biometrics Limited Distributed identity validation method, system and computer program
KR20180072347A (en) * 2016-12-21 2018-06-29 주식회사 하나은행 User authentication method and server thereof
CN110717158A (en) * 2019-09-06 2020-01-21 平安普惠企业管理有限公司 Information verification method, device, equipment and computer readable storage medium
CN114677700A (en) * 2022-04-11 2022-06-28 腾讯科技(深圳)有限公司 Identification method and device of identity, storage medium and electronic equipment

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101626417A (en) * 2008-07-08 2010-01-13 鸿富锦精密工业(深圳)有限公司 Method for mobile terminal authentication

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103051454A (en) * 2012-12-19 2013-04-17 天地融科技股份有限公司 Electronic equipment and password authentication method thereof
EP2996063A1 (en) * 2014-09-09 2016-03-16 IDscan Biometrics Limited Distributed identity validation method, system and computer program
KR20180072347A (en) * 2016-12-21 2018-06-29 주식회사 하나은행 User authentication method and server thereof
CN110717158A (en) * 2019-09-06 2020-01-21 平安普惠企业管理有限公司 Information verification method, device, equipment and computer readable storage medium
CN114677700A (en) * 2022-04-11 2022-06-28 腾讯科技(深圳)有限公司 Identification method and device of identity, storage medium and electronic equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
利用基于身份的密码算法+短信验证码的移动安全支付方案;刘亚强 等;《计算机科学》;第299-307页 *

Also Published As

Publication number Publication date
CN117077116A (en) 2023-11-17

Similar Documents

Publication Publication Date Title
US20220052852A1 (en) Secure biometric authentication using electronic identity
US11936788B1 (en) Distributed ledger system for identity data storage and access control
RU2320009C2 (en) Systems and methods for protected biometric authentication
US9589399B2 (en) Credential quality assessment engine systems and methods
US7882363B2 (en) Biometric authentication system
CN109948320B (en) Block chain-based identity recognition management method, device, medium and electronic equipment
CN111897879B (en) Transaction record sharing method and device based on blockchain network and electronic equipment
CN111654468A (en) Secret-free login method, device, equipment and storage medium
CN114519360B (en) Data read-write method, login method and device of service system and computer equipment
CN111581661A (en) Terminal management method and device based on biological feature recognition and computer equipment
CN111901359B (en) Resource account authorization method, device, system, computer equipment and medium
CN117077116B (en) Digital ID security authentication method, device and system
CN116962021A (en) Method, device, equipment and medium for user real name authentication in financial cooperative institution
Olaniyi et al. A Secure Electronic Voting System Using Multifactor Authentication and Blockchain Technologies
TIWARI et al. Secure online voting system using visual cryptography
CN113328864B (en) Data transmission method and system based on function encryption, block chain and machine learning
JP4111960B2 (en) Personal authentication system, personal authentication method, and computer program
Ameh et al. Securing cardless automated teller machine transactions using bimodal authentication system
CN114238914A (en) Digital certificate application system, method, device, computer equipment and storage medium
JP2019102979A (en) Method related to transaction based on personal identification using biological information
CN110490005B (en) Method, device and computer readable storage medium for processing resource transfer request
JP4749017B2 (en) Pseudo biometric authentication system and pseudo biometric authentication method
Wang et al. Time evolving graphical password for securing mobile devices
CN111144895A (en) Data processing method, device and system
US20240013198A1 (en) Validate digital ownerships in immutable databases via physical devices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant