TWI859481B - Information processing method, device, electronic equipment, server and medium - Google Patents
Information processing method, device, electronic equipment, server and medium Download PDFInfo
- Publication number
- TWI859481B TWI859481B TW110142442A TW110142442A TWI859481B TW I859481 B TWI859481 B TW I859481B TW 110142442 A TW110142442 A TW 110142442A TW 110142442 A TW110142442 A TW 110142442A TW I859481 B TWI859481 B TW I859481B
- Authority
- TW
- Taiwan
- Prior art keywords
- user
- information
- identity
- electronic device
- image
- Prior art date
Links
- 230000010365 information processing Effects 0.000 title claims abstract description 91
- 238000003672 processing method Methods 0.000 title claims abstract description 47
- 230000006854 communication Effects 0.000 claims abstract description 93
- 238000004891 communication Methods 0.000 claims abstract description 89
- 238000000034 method Methods 0.000 claims description 93
- 230000001815 facial effect Effects 0.000 claims description 81
- 238000012545 processing Methods 0.000 claims description 39
- 230000003993 interaction Effects 0.000 claims description 36
- 238000013475 authorization Methods 0.000 claims description 30
- 238000010606 normalization Methods 0.000 claims description 21
- 238000004590 computer program Methods 0.000 claims description 16
- 238000003860 storage Methods 0.000 claims description 8
- 238000012549 training Methods 0.000 claims description 5
- 230000004044 response Effects 0.000 abstract description 23
- 230000008569 process Effects 0.000 description 43
- 238000010586 diagram Methods 0.000 description 23
- 230000000694 effects Effects 0.000 description 11
- 230000006870 function Effects 0.000 description 11
- 238000005520 cutting process Methods 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 8
- 238000002347 injection Methods 0.000 description 8
- 239000007924 injection Substances 0.000 description 8
- 230000005540 biological transmission Effects 0.000 description 6
- 238000010295 mobile communication Methods 0.000 description 6
- 230000008520 organization Effects 0.000 description 5
- 238000012795 verification Methods 0.000 description 5
- 238000001514 detection method Methods 0.000 description 4
- 238000005286 illumination Methods 0.000 description 4
- 101100233916 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) KAR5 gene Proteins 0.000 description 3
- 241000700605 Viruses Species 0.000 description 3
- 238000004422 calculation algorithm Methods 0.000 description 3
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000000926 separation method Methods 0.000 description 3
- 239000000243 solution Substances 0.000 description 3
- 101001121408 Homo sapiens L-amino-acid oxidase Proteins 0.000 description 2
- 101000827703 Homo sapiens Polyphosphoinositide phosphatase Proteins 0.000 description 2
- 102100026388 L-amino-acid oxidase Human genes 0.000 description 2
- 102100023591 Polyphosphoinositide phosphatase Human genes 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 238000009826 distribution Methods 0.000 description 2
- 238000005242 forging Methods 0.000 description 2
- 238000013507 mapping Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 101100012902 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) FIG2 gene Proteins 0.000 description 1
- 238000007792 addition Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 210000001061 forehead Anatomy 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 238000007781 pre-processing Methods 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 238000012216 screening Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 210000000216 zygoma Anatomy 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4097—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
- G06Q20/40975—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Collating Specific Patterns (AREA)
Abstract
本發明公開了一種資訊處理方法、裝置、電子設備、伺服器及介質。其中,一種資訊處理方法包括:首先,接收對用戶身份認證的第一輸入。接著,回應於第一輸入,在可信執行環境下,通過近場通信獲取用戶的待認證身份資訊。再者,根據用戶的待認證身份資訊,確定用於表徵用戶身份的目標資訊,目標資訊包括用戶的第一生物特徵資訊;以及,在預設時間段內獲取的用戶圖像,用戶圖像包括用戶的第二生物特徵資訊。然後,基於第一生物特徵資訊與第二生物特徵資訊的對比結果,確定待認證身份資訊的用戶身份認證結果。根據本發明實施例,能夠有效提高身份認證結果的準確性,防止用戶身份資訊被洩露和被篡改,提高網路資訊安全。 The present invention discloses an information processing method, device, electronic equipment, server and medium. Among them, an information processing method includes: first, receiving a first input for user identity authentication. Then, in response to the first input, the user's identity information to be authenticated is obtained through near field communication in a trusted execution environment. Furthermore, based on the user's identity information to be authenticated, target information used to represent the user's identity is determined, and the target information includes the user's first biometric information; and a user image obtained within a preset time period, and the user image includes the user's second biometric information. Then, based on the comparison result of the first biometric information and the second biometric information, the user identity authentication result of the identity information to be authenticated is determined. According to the embodiment of the present invention, the accuracy of identity authentication results can be effectively improved, user identity information can be prevented from being leaked and tampered with, and network information security can be improved.
Description
本發明屬於互聯網技術領域,尤其涉及一種資訊處理方法、裝置、電子設備、伺服器及介質。 The present invention belongs to the field of Internet technology, and in particular relates to an information processing method, device, electronic equipment, server and medium.
隨著電腦和互聯網的發展,需要用戶身份認證的場景也越來越多,如在帳戶登錄或者網路支付的場景中進行身份認證。 With the development of computers and the Internet, there are more and more scenarios that require user identity authentication, such as identity authentication in account login or online payment scenarios.
目前,可以通過對比用戶身份證件圖像和用戶圖像的方式,或者通過讀取用戶身份證件內晶片的身份資訊的方式進行身份認證。但是,前者的身份認證方式難以識別用戶身份證件的真偽,另外,用戶身份證件表面資訊磨損或者圖像拍攝效果不佳,也會降低身份認證結果的準確性。而後者的身份認證方式,也會因為讀取用戶身份證件的平臺自身安全性低,導致用戶身份資訊被惡意篡改和洩露。 Currently, identity authentication can be performed by comparing the user ID image with the user image, or by reading the identity information of the chip in the user ID. However, the former identity authentication method is difficult to identify the authenticity of the user ID. In addition, the surface information of the user ID is worn or the image is not well taken, which will reduce the accuracy of the identity authentication result. The latter identity authentication method will also cause the user's identity information to be maliciously tampered with and leaked due to the low security of the platform that reads the user's ID.
本發明實施例提供一種資訊處理方法、裝置、電子設備、伺服器及介質,能夠有效提高身份認證結果的準確性,防止用戶身份資訊被洩露和被篡改,提高網路資訊安全。 The embodiments of the present invention provide an information processing method, device, electronic equipment, server and medium, which can effectively improve the accuracy of identity authentication results, prevent user identity information from being leaked and tampered with, and improve network information security.
第一方面,本發明實施例提供了一種資訊處理方法,應用於電子設備,具體可以包括: In the first aspect, an embodiment of the present invention provides an information processing method, which is applied to electronic equipment and may specifically include:
接收對用戶身份認證的第一輸入; Receive first input for user authentication;
回應於第一輸入,在可信執行環境下,通過近場通信獲取用戶的待認證身份資訊; In response to the first input, in a trusted execution environment, the user's identity information to be authenticated is obtained through near field communication;
根據用戶的待認證身份資訊,確定用於表徵用戶身份的目標資訊,目標資訊包括用戶的第一生物特徵資訊;以及,在預設時間段內獲取的用戶圖像,用戶圖像包括用戶的第二生物特徵資訊; According to the user's identity information to be authenticated, target information used to characterize the user's identity is determined, the target information includes the user's first biometric information; and, a user image obtained within a preset time period, the user image includes the user's second biometric information;
基於第一生物特徵資訊與第二生物特徵資訊的對比結果,確定待 認證身份資訊的用戶身份認證結果。 Based on the comparison result of the first biometric information and the second biometric information, the user identity authentication result of the identity information to be authenticated is determined.
第二方面,本發明實施例提供了一種資訊處理方法,應用於電子設備,具體可以包括: In the second aspect, the embodiment of the present invention provides an information processing method, which is applied to electronic equipment and may specifically include:
接收對用戶身份認證的第一輸入; Receive first input for user authentication;
回應於第一輸入,在可信執行環境下,通過近場通信獲取用戶的待認證身份資訊; In response to the first input, in a trusted execution environment, the user's identity information to be authenticated is obtained through near field communication;
向伺服器發送用戶的待認證身份資訊,用戶的待認證身份資訊用於確定待認證身份資訊的用戶身份認證結果; Send the user's identity information to be authenticated to the server, and the user's identity information to be authenticated is used to determine the user identity authentication result of the identity information to be authenticated;
以及,在預設時間段內獲取用戶圖像,並向伺服器發送用戶圖像,用戶圖像用於與用戶的待認證身份進行對比,以確定用戶身份認證結果; And, obtaining the user image within a preset time period and sending the user image to the server, the user image is used to compare with the user's identity to be authenticated to determine the user identity authentication result;
接收伺服器發送的待認證身份資訊的用戶身份認證結果。 Receive the user identity authentication result of the identity information to be authenticated sent by the server.
第三方面,本發明實施例提供了一種資訊處理方法,應用於伺服器,具體可以包括: In the third aspect, the embodiment of the present invention provides an information processing method, which is applied to a server and may specifically include:
接收電子設備發送的用戶的待認證身份資訊; Receive the user's identity information to be authenticated sent by the electronic device;
在檢測到電子設備的設備類型為預設目標設備類型的情況下,獲取與用戶的待認證身份資訊對應的且用於表徵用戶身份的目標資訊,所述目標資訊包括用戶的第一生物特徵資訊; When it is detected that the device type of the electronic device is a preset target device type, target information corresponding to the user's identity information to be authenticated and used to characterize the user's identity is obtained, wherein the target information includes the user's first biometric information;
接收電子設備發送的用戶圖像; Receive user images sent by electronic devices;
基於第一生物特徵資訊與用戶圖像中的第二生物特徵資訊的對比結果,確定待認證身份資訊的用戶身份認證結果; Based on the comparison result of the first biometric information and the second biometric information in the user image, determine the user identity authentication result of the identity information to be authenticated;
向電子設備發送用戶身份認證結果。 Send user identity authentication results to electronic devices.
第四方面,本發明實施例提供了一種資訊處理裝置,應用於電子設備,具體可以包括: In the fourth aspect, the embodiment of the present invention provides an information processing device, which is applied to electronic equipment and may specifically include:
接收模組,用於接收對用戶身份認證的第一輸入; Receiving module, used to receive the first input for user identity authentication;
獲取模組,用於回應於第一輸入,在可信執行環境下,通過近場通信獲取用戶的待認證身份資訊; The acquisition module is used to respond to the first input and obtain the user's identity information to be authenticated through near field communication in a trusted execution environment;
處理模組,用於根據用戶的待認證身份資訊,確定用於表徵用戶身份的目標資訊,目標資訊包括用戶的第一生物特徵資訊;以及,在預設時間段內獲取的用戶圖像,用戶圖像包括用戶的第二生物特徵資訊; A processing module is used to determine target information used to characterize the user's identity based on the user's identity information to be authenticated, the target information including the user's first biometric information; and a user image obtained within a preset time period, the user image including the user's second biometric information;
確定模組,用於基於第一生物特徵資訊與第二生物特徵資訊的對比結果,確定待認證身份資訊的用戶身份認證結果。 The determination module is used to determine the user identity authentication result of the identity information to be authenticated based on the comparison result of the first biometric information and the second biometric information.
第五方面,本發明實施例提供了一種資訊處理裝置,應用於電子設備,具體可以包括: In the fifth aspect, the embodiment of the present invention provides an information processing device, which is applied to electronic equipment and may specifically include:
接收模組,用於接收對用戶身份認證的第一輸入; Receiving module, used to receive the first input for user identity authentication;
獲取模組,用於回應於第一輸入,在可信執行環境下,通過近場通信獲取用戶的待認證身份資訊; The acquisition module is used to respond to the first input and obtain the user's identity information to be authenticated through near field communication in a trusted execution environment;
發送模組,用於向伺服器發送用戶的待認證身份資訊,用戶的待認證身份資訊用於確定待認證身份資訊的用戶身份認證結果; The sending module is used to send the user's identity information to be authenticated to the server, and the user's identity information to be authenticated is used to determine the user identity authentication result of the identity information to be authenticated;
發送模組還用於,在預設時間段內獲取用戶圖像,並向伺服器發送用戶圖像,用戶圖像用於與用戶的待認證身份進行對比,以確定用戶身份認證結果; The sending module is also used to obtain the user image within a preset time period and send the user image to the server. The user image is used to compare with the user's identity to be authenticated to determine the user identity authentication result;
接收模組還用於,接收伺服器發送的待認證身份資訊的用戶身份認證結果。 The receiving module is also used to receive the user identity authentication result of the identity information to be authenticated sent by the server.
第六方面,本發明實施例提供了一種資訊處理裝置,應用於伺服器,具體可以包括: In the sixth aspect, the embodiment of the present invention provides an information processing device, which is applied to a server and may specifically include:
接收模組,用於接收電子設備發送的用戶的待認證身份資訊; Receiving module, used to receive the user's identity information to be authenticated sent by the electronic device;
獲取模組,用於在檢測到電子設備的設備類型為預設目標設備類型的情況下,獲取與用戶的待認證身份資訊對應的且用於表徵用戶身份的目標資訊,目標資訊包括用戶的第一生物特徵資訊; An acquisition module is used to acquire target information corresponding to the user's identity information to be authenticated and used to characterize the user's identity when the device type of the electronic device is detected to be a preset target device type, wherein the target information includes the user's first biometric information;
接收模組還用於,接收電子設備發送的用戶圖像; The receiving module is also used to receive user images sent by electronic devices;
確定模組,用於基於第一生物特徵資訊與用戶圖像中的第二生物特徵資訊的對比結果,確定待認證身份資訊的用戶身份認證結果; A determination module is used to determine the user identity authentication result of the identity information to be authenticated based on the comparison result of the first biometric information and the second biometric information in the user image;
發送模組,用於向電子設備發送用戶身份認證結果。 The sending module is used to send the user identity authentication result to the electronic device.
第七方面,本發明實施例提供了一種電子設備,該電子設備包括:處理器以及存儲有電腦程式指令的記憶體; In the seventh aspect, an embodiment of the present invention provides an electronic device, which includes: a processor and a memory storing computer program instructions;
處理器執行電腦程式指令時實現如第一方面或者第二方面所示的資訊處理方法。 When the processor executes computer program instructions, the information processing method shown in the first aspect or the second aspect is implemented.
第八方面,本發明實施例提供了一種伺服器,該伺服器包括:處 理器以及存儲有電腦程式指令的記憶體; In an eighth aspect, an embodiment of the present invention provides a server, the server comprising: a processor and a memory storing computer program instructions;
處理器執行電腦程式指令時實現如第三方面所示的資訊處理方法。 When the processor executes computer program instructions, the information processing method shown in the third aspect is implemented.
第九方面,本發明實施例提供了一種電腦可讀存儲介質,該電腦可讀存儲介質上存儲有電腦程式指令,電腦程式指令被處理器執行時實現如第一方面所示的資訊處理方法。 In the ninth aspect, an embodiment of the present invention provides a computer-readable storage medium, on which computer program instructions are stored, and when the computer program instructions are executed by a processor, the information processing method shown in the first aspect is implemented.
本發明實施例的資訊處理方法、裝置、設備及介質,通過在可信執行環境(trusted execution environment,TEE)以及近場通信(near field communication,NFC)獲取用戶的待認證身份資訊的方式,來獲取可信任的用於表徵用戶身份的目標資訊如身份證件資訊,以避免偽造身份證件的問題,同時也避免了因拍照效果不佳或者拍攝硬體不足造成獲取到的目標資訊不準確,從而導致用戶身份認證結果不正確的問題。 The information processing method, device, equipment and medium of the embodiment of the present invention obtains the user's identity information to be authenticated in a trusted execution environment (TEE) and near field communication (NFC) to obtain trusted target information such as identity certificate information used to represent the user's identity, thereby avoiding the problem of forged identity certificates and the problem of inaccurate target information obtained due to poor photography effects or insufficient shooting hardware, thereby causing incorrect user identity authentication results.
另外,通過在可信執行環境TEE中獲取目標資訊以及對比目標資訊中的第一生物特徵資訊和拍攝的用戶圖像中的第二生物特徵資訊,有效防止惡意軟體截獲身份證件資訊被替換和篡改的問題,同時,通過可信執行環境TEE安全訪問電子設備的攝影機,確保用於對比認證的用戶圖像的準確性,防止注入偽造人臉面部照片或影片的行為。 In addition, by obtaining target information in the trusted execution environment TEE and comparing the first biometric information in the target information with the second biometric information in the captured user image, the problem of identity document information being replaced and tampered with by malicious software can be effectively prevented. At the same time, the camera of the electronic device is securely accessed through the trusted execution environment TEE to ensure the accuracy of the user image used for comparison and authentication, and prevent the injection of forged facial photos or videos.
1,2,3,320,330,3301,33011,33012,3302,33021,33022,33023,3311,3312,3313,340,3401,3402,3403,4,5,510,520,530,540,6,7,8,801,802,803,804,805,806,807,808,809,810,811,812,813,901,902,903,904,905,906,907,908,909,910,911,912,913,914,915,916:步驟 1,2,3,320,330,3301,33011,33012,3302,33021,33022,33023,3311,3312,3313,340,3401,3402,3403,4,5,510,520,530,540,6,7,8,801,802,803,804,805,806,807,808,809,810,811,812,813,901,902,903,904,905,906,907,908,909,910,911,912,913,914,915,916: Steps
10:電子設備 10: Electronic equipment
100:資訊處理裝置 100: Information processing device
1001:接收模組 1001: receiving module
1002:獲取模組 1002: Get module
1003:處理模組 1003: Processing module
1004:確定模組 1004: Confirm module
101:電子設備應用程式 101: Electronic device applications
102:可信身份認證服務控制項 102: Trusted identity authentication service control items
1100:資訊處理裝置 1100: Information processing device
1110:接收模組 1110: receiving module
1120:獲取模組 1120: Get module
1130:發送模組 1130: Send module
1200:資訊處理裝置 1200: Information processing device
1210:接收模組 1210: receiving module
1220:獲取模組 1220: Get module
1230:確定模組 1230: Confirm module
1240:發送模組 1240: Send module
1300:資訊處理 1300: Information processing
1301:處理器 1301: Processor
1302:記憶體 1302: Memory
1303:通信介面 1303: Communication interface
1310:匯流排 1310:Bus
20:伺服器 20: Server
201:權威身份認證模組 201: Authoritative identity authentication module
202:可信身份認證後臺模組 202: Trusted identity authentication backend module
203:人臉認證對比模組 203: Face recognition comparison module
30:近場通信晶片 30: Near field communication chip
A:應用程式 A: Application
Context:交易要素 Context: Transaction elements
D,D’:距離 D,D’: distance
d,d’:距離 d,d’: distance
O,O’:中心點 O,O’: center point
SDK1011:可信身份認證服務 SDK1011: Trusted identity authentication service
TA103:可信身份認證服務 TA103: Trusted identity authentication service
x,y:軸 x,y:axis
為了更清楚地說明本發明實施例的技術方案,下面將對本發明實施例中所需要使用的圖式作簡單的介紹,對於本領域普通技術人員來講,在不付出創造性勞動的前提下,還可以根據這些圖式獲得其他的圖式。 In order to more clearly explain the technical solution of the embodiment of the present invention, the following will briefly introduce the diagrams required for use in the embodiment of the present invention. For ordinary technicians in this field, other diagrams can be obtained based on these diagrams without creative labor.
圖1是根據本發明提供的資訊處理系統的一個實施例的資訊處理架構示意圖; Figure 1 is a schematic diagram of the information processing architecture of an embodiment of the information processing system provided by the present invention;
圖2是根據本發明提供的資訊處理系統的一個實施例的電子設備和伺服器中結構示意圖; Figure 2 is a schematic diagram of the structure of the electronic device and server in an embodiment of the information processing system provided by the present invention;
圖3是根據本發明提供的資訊處理系統的一個實施例的應用場景的架構示意圖; Figure 3 is a schematic diagram of the application scenario of an embodiment of the information processing system provided by the present invention;
圖4是根據本發明提供的資訊處理系統的一個實施例的電子設備所屬類別對應的應用協定資料單元(Application Protocol Data Unit,APDU)指令執行 位置的示意圖; FIG4 is a schematic diagram of the execution position of the Application Protocol Data Unit (APDU) instruction corresponding to the category of the electronic device according to an embodiment of the information processing system provided by the present invention;
圖5是根據本發明提供的資訊處理的一個實施例的資訊處理方法的流程示意圖; Figure 5 is a schematic diagram of the process of an information processing method according to an embodiment of the information processing provided by the present invention;
圖6是根據本發明提供的資訊處理的一個實施例的資訊處理介面示意圖; Figure 6 is a schematic diagram of an information processing interface according to an embodiment of information processing provided by the present invention;
圖7是根據本發明提供的資訊處理的一個實施例的原圖像長條圖的示意圖; FIG7 is a schematic diagram of an original image bar graph according to an embodiment of information processing provided by the present invention;
圖8是根據本發明提供的資訊處理的一個實施例的可信身份認證初始化流程示意圖; Figure 8 is a schematic diagram of the trusted identity authentication initialization process according to an embodiment of the information processing provided by the present invention;
圖9是根據本發明提供的資訊處理的一個實施例的可信身份認證對比的流程示意圖; Figure 9 is a schematic diagram of the trusted identity authentication comparison process according to an embodiment of the information processing provided by the present invention;
圖10是根據本發明提供的基於電子設備的資訊處理裝置的一個實施例結構示意圖; Figure 10 is a schematic diagram of the structure of an embodiment of an information processing device based on electronic equipment provided by the present invention;
圖11是根據本發明提供的基於電子設備的資訊處理裝置的另一個實施例結構示意圖; Figure 11 is a schematic diagram of the structure of another embodiment of the information processing device based on electronic equipment provided by the present invention;
圖12是根據本發明提供的基於伺服器的資訊處理裝置的一個實施例結構示意圖; Figure 12 is a schematic diagram of the structure of an embodiment of the information processing device based on the server provided by the present invention;
圖13是根據本發明提供的資訊處理設備的一個實施例的硬體結構示意圖。 Figure 13 is a schematic diagram of the hardware structure of an embodiment of the information processing device provided by the present invention.
下面將詳細描述本發明的各個方面的特徵和示例性實施例,為了使本發明的目的、技術方案及優點更加清楚明白,以下結合圖式及具體實施例,對本發明進行進一步詳細描述。應理解,此處所描述的具體實施例僅被配置為解釋本發明,並不被配置為限定本發明。對於本領域技術人員來說,本發明可以在不需要這些具體細節中的一些細節的情況下實施。下面對實施例的描述僅僅是為了通過示出本發明的示例來提供對本發明更好的理解。 The features and exemplary embodiments of various aspects of the present invention will be described in detail below. In order to make the purpose, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below in combination with drawings and specific embodiments. It should be understood that the specific embodiments described herein are only configured to explain the present invention and are not configured to limit the present invention. For those skilled in the art, the present invention can be implemented without some of these specific details. The following description of the embodiments is only to provide a better understanding of the present invention by showing examples of the present invention.
需要說明的是,在本文中,諸如第一和第二等之類的關係術語僅僅用來將一個實體或者操作與另一個實體或操作區分開來,而不一定要求或者暗示這些實體或操作之間存在任何這種實際的關係或者順序。而且,術語“包括”、“包含”或者其任何其他變體意在涵蓋非排他性的包含,從而使得包括一系列要素的過程、方法、物品或者設備不僅包括那些要素,而且還包括沒有明確列出的其他要素,或者是還包括為這種過程、方法、物品或者設備所固有 的要素。在沒有更多限制的情況下,由語句“包括……”限定的要素,並不排除在包括要素的過程、方法、物品或者設備中還存在另外的相同要素。 It should be noted that, in this article, relational terms such as first and second, etc. are only used to distinguish one entity or operation from another entity or operation, and do not necessarily require or imply any such actual relationship or order between these entities or operations. Moreover, the terms "include", "comprises" or any other variations thereof are intended to cover non-exclusive inclusion, so that a process, method, article or apparatus including a series of elements includes not only those elements, but also other elements not explicitly listed, or elements inherent to such process, method, article or apparatus. In the absence of more restrictions, the elements defined by the phrase "includes..." do not exclude the existence of other identical elements in the process, method, article or apparatus including the elements.
目前身份認證方案所處的作業系統大多為安卓系統,這樣,身份認證的安全性高度依賴於安卓系統自身的安全性,一旦安卓系統的安全機制失效,那麼依賴於安卓系統的安全機制的身份認證方案也會出現漏洞。若身份認證的過程由某個應用程式發起並在安卓環境下執行、且安卓系統環境自身安全性較低時,一旦被攻擊者攻擊如攻擊者獲取root權限,通過植入木馬等手段,竊取並篡改用戶的身份認證過程中的資訊,偽造與實際不符的身份認證結果,有甚者還會利用偽造的身份資訊實施違法活動,造成用戶的身份資訊的洩露。 Currently, most of the operating systems for identity authentication schemes are Android systems. Therefore, the security of identity authentication is highly dependent on the security of the Android system itself. Once the security mechanism of the Android system fails, the identity authentication scheme that relies on the security mechanism of the Android system will also have vulnerabilities. If the identity authentication process is initiated by an application and executed in the Android environment, and the security of the Android system environment itself is relatively low, once it is attacked by an attacker, such as the attacker obtains root privileges, the attacker can steal and tamper with the user's identity authentication information by implanting Trojans, forging identity authentication results that are inconsistent with the actual situation, and even use the forged identity information to carry out illegal activities, resulting in the leakage of the user's identity information.
現有的身份認證方案,可以通過對比用戶身份證件中的用戶圖像和即時獲取用戶圖像的方式,或者通過讀取用戶身份證件內晶片的身份資訊的方式進行身份認證。但是,前者的身份認證方式難以識別用戶身份證件的真偽,以及因用戶身份證件表面資訊磨損或者電子設備拍攝圖像的效果不佳,都會導致身份認證結果不準確。而後者的身份認證方案,通常是授權給應用程式的運營機構進行讀取和身份認證,如果運營機構的人員有意洩露授權憑證給非授權機構,或者非授權機構通過反向工程、惡意調試等手段竊取授權憑證,那麼非授權機構就存在冒用該憑證取得不當收益的可能。另外,取用戶身份證件內晶片的身份資訊的方式中執行人臉比對的身份認證過程在安卓系統內的一個安卓控制項內,或者作為安卓應用的一部分來執行,這樣,也會因為安卓系統自身安全性低,導致用戶的身份資訊被惡意篡改和洩露。 Existing identity authentication schemes can perform identity authentication by comparing the user image in the user's identity document with the user image obtained in real time, or by reading the identity information of the chip in the user's identity document. However, the former identity authentication method is difficult to identify the authenticity of the user's identity document, and the identity authentication result is inaccurate due to the wear and tear of the surface information of the user's identity document or the poor effect of the electronic device taking the image. The latter identity authentication scheme is usually authorized to the operating organization of the application to read and authenticate the identity. If the personnel of the operating organization intentionally leak the authorization certificate to an unauthorized organization, or the unauthorized organization steals the authorization certificate through reverse engineering, malicious debugging, etc., then the unauthorized organization may use the certificate to obtain improper benefits. In addition, the identity authentication process of performing face matching in the way of obtaining the identity information of the chip in the user's identity document is performed in an Android control item in the Android system, or as part of an Android application. In this way, the user's identity information may be maliciously tampered with and leaked due to the low security of the Android system itself.
由此,本發明實施例提供了一種資訊處理方法、裝置、設備及存儲介質,通過在可信執行環境(trusted execution environment,TEE)以及近場通信(near field communication,NFC)獲取用戶的待認證身份資訊的方式,來獲取可信任的用於表徵用戶身份的目標資訊如身份證件資訊,以避免偽造身份證件的問題,同時也避免了因拍照效果不佳或者拍攝硬體不足造成獲取到的目標資訊不準確,從而導致用戶身份認證結果不正確的問題。 Therefore, the embodiments of the present invention provide an information processing method, device, equipment and storage medium, which obtains the user's identity information to be authenticated in a trusted execution environment (TEE) and near field communication (NFC) to obtain trusted target information such as identity certificate information used to represent the user's identity, so as to avoid the problem of forging identity certificates, and also avoid the problem of inaccurate target information obtained due to poor photography effect or insufficient shooting hardware, thereby causing incorrect user identity authentication results.
另外,通過在可信執行環境TEE中獲取目標資訊以及對比目標資訊中的第一生物特徵資訊和拍攝的用戶圖像中的第二生物特徵資訊,有效防止惡意軟體截獲身份證件資訊被替換和篡改的問題,同時,通過可信執行環境 TEE安全訪問電子設備的攝影機,確保用於對比認證的用戶圖像的準確性,防止注入偽造人臉面部照片或影片的行為。 In addition, by obtaining target information in the trusted execution environment TEE and comparing the first biometric information in the target information with the second biometric information in the captured user image, the problem of identity document information being replaced and tampered with by malicious software can be effectively prevented. At the same time, the trusted execution environment TEE securely accesses the camera of the electronic device to ensure the accuracy of the user image used for comparison and authentication, and prevents the injection of forged facial photos or videos.
為了更好的理解本發明,下面將結合圖式1至圖11,詳細描述根據本發明實施例的資訊處理方法、裝置、電子設備、伺服器及存儲介質,應注意,這些實施例並不是用來限制本發明公開的範圍。 In order to better understand the present invention, the information processing method, device, electronic equipment, server and storage medium according to the embodiments of the present invention will be described in detail below in conjunction with Figures 1 to 11. It should be noted that these embodiments are not intended to limit the scope of the disclosure of the present invention.
圖1是根據本發明提供的資訊處理系統的一個實施例的資訊處理架構示意圖。 Figure 1 is a schematic diagram of the information processing architecture of an embodiment of the information processing system provided by the present invention.
如圖1所示,該資訊處理系統包括電子設備10、伺服器20和近場通信晶片30如身份證件中的晶片、銀行卡證件中的晶片、儲值卡中的晶片等支援近場通訊的晶片。其中,在電子設備10與伺服器20建立通訊連結的情況下,接收對用戶身份認證的第一輸入。電子設備10回應於第一輸入,在可信執行環境下,通過近場通信獲取近場通信晶片30中用戶的待認證身份資訊。電子設備10根據用戶的待認證身份資訊,確定用於表徵用戶身份的目標資訊,目標資訊包括用戶的第一生物特徵資訊;以及,在預設時間段內獲取的用戶圖像,用戶圖像包括用戶的第二生物特徵資訊,以及,基於第一生物特徵資訊與第二生物特徵資訊的對比結果,確定待認證身份資訊的用戶身份認證結果。 As shown in FIG1 , the information processing system includes an electronic device 10, a server 20, and a near field communication chip 30, such as a chip in an identity card, a chip in a bank card, a chip in a prepaid card, etc., which supports near field communication. When the electronic device 10 establishes a communication link with the server 20, a first input for user identity authentication is received. In response to the first input, the electronic device 10 obtains the user's identity information to be authenticated in the near field communication chip 30 through near field communication in a trusted execution environment. The electronic device 10 determines the target information used to characterize the user's identity based on the user's identity information to be authenticated, the target information includes the user's first biometric information; and the user image obtained within a preset time period, the user image includes the user's second biometric information, and, based on the comparison result of the first biometric information and the second biometric information, determines the user identity authentication result of the identity information to be authenticated.
這裡,在電子設備10獲取到用戶的待認證身份資訊之後,也可以將用戶的待認證身份資訊發送到伺服器20,以使伺服器20根據用戶的待認證身份資訊,確定用於表徵用戶身份的目標資訊,並通過電子設備10拍攝的用戶圖像,確定待認證身份資訊的用戶身份認證結果,然後,將待認證身份資訊的用戶身份認證結果回饋到電子設備10,以便電子設備10向用戶顯示用戶身份認證結果。 Here, after the electronic device 10 obtains the user's identity information to be authenticated, the user's identity information to be authenticated can also be sent to the server 20, so that the server 20 determines the target information used to characterize the user's identity based on the user's identity information to be authenticated, and determines the user identity authentication result of the identity information to be authenticated through the user image taken by the electronic device 10, and then feeds back the user identity authentication result of the identity information to be authenticated to the electronic device 10, so that the electronic device 10 displays the user identity authentication result to the user.
基於上述架構,下面分別對電子設備10和伺服器20進行詳細說明。如圖2所示,本發明實施例中電子設備10可以包括電子設備應用程式101、可信身份認證服務控制項102和可信身份認證服務TA103。其中,電子設備應用程式101包括可信身份認證服務SDK1011即軟體開發套件(software development kit,SDK);可信身份認證服務TA103即可信應用程式(trusted application,TA)。 Based on the above architecture, the electronic device 10 and the server 20 are described in detail below. As shown in FIG2 , in the embodiment of the present invention, the electronic device 10 may include an electronic device application 101, a trusted identity authentication service control item 102, and a trusted identity authentication service TA 103. Among them, the electronic device application 101 includes a trusted identity authentication service SDK 1011, i.e., a software development kit (SDK); the trusted identity authentication service TA 103 is a trusted application (TA).
進一步地,電子設備10具備可信執行環境TEE,電子設備10通 過可信身份認證服務相關的第三方應用程式(Application,APP),由需要開展用戶認證服務平臺如購物類應用程式或者行業方提供,其通過集成可信身份認證服務SDK1011獲取可信身份認證服務能力;可信身份認證服務控制項102作為獨立應用程式運行在電子設備上;可信身份認證服務TA103運行在可信執行環境TEE中。 Furthermore, the electronic device 10 has a trusted execution environment TEE. The electronic device 10 obtains the trusted identity authentication service capability by integrating the trusted identity authentication service SDK 1011 through a third-party application (Application, APP) related to the trusted identity authentication service, which is provided by a user authentication service platform such as a shopping application or an industry party. The trusted identity authentication service control item 102 runs on the electronic device as an independent application; the trusted identity authentication service TA 103 runs in the trusted execution environment TEE.
本發明實施例中的伺服器20,可以運行可信身份服務平臺等支撐管理類的平臺。該運行可信身份服務平臺可以包括權威身份認證模組201、可信身份認證後臺模組202和人臉認證對比模組203。其中,權威身份認證模組201用於與身份鑒別平臺的身份鑒別伺服器進行交互,解析用戶的待認證的身份資訊的身份資訊明文資料。這裡,本發明實施例中的可信身份服務平臺,用於管理接入和使用可信身份服務平臺的第三方應用程式,可結合權威身份認證模組201和人臉認證對比模組203為可信身份認證服務控制項102提供業務功能處理流程。 The server 20 in the embodiment of the present invention can run a platform supporting management such as a trusted identity service platform. The trusted identity service platform can include an authoritative identity authentication module 201, a trusted identity authentication backend module 202, and a face authentication comparison module 203. The authoritative identity authentication module 201 is used to interact with the identity identification server of the identity identification platform to parse the identity information plaintext data of the user's identity information to be authenticated. Here, the trusted identity service platform in the embodiment of the present invention is used to manage third-party applications that access and use the trusted identity service platform, and can combine the authoritative identity authentication module 201 and the face authentication comparison module 203 to provide a business function processing flow for the trusted identity authentication service control item 102.
基於上述電子設備10和伺服器20所示的結構,對本發明實施例提供的資訊處理方法進行詳細說明,具體如下所示。 Based on the structures shown in the above-mentioned electronic device 10 and server 20, the information processing method provided by the embodiment of the present invention is described in detail as follows.
基於上述可知,現有的身份證件資訊如用戶身份證件圖像和身份證件號碼存在被濫用、盜用、惡意洩露的問題。因此,要想確保身份證件資訊安全、合規的使用,首先,要保證用戶所使用的身份證件是真實的且就在其身邊,這樣,通過NFC安全讀取和解析身份證件資訊是本發明實施例的技術基礎。而要實現通過NFC安全讀取和解析身份證有兩個前提條件:一是實現從電子設備10通過伺服器到身份鑒別伺服器安全的傳輸身份證件資訊,二是實現NFC安全讀取身份證件資訊。 Based on the above, it can be seen that existing identity information such as user identity images and identity numbers are subject to abuse, theft, and malicious leakage. Therefore, in order to ensure the safe and compliant use of identity information, first of all, it is necessary to ensure that the identity information used by the user is authentic and in his or her hands. In this way, secure reading and parsing of identity information through NFC is the technical basis of the embodiment of the present invention. There are two prerequisites for securely reading and parsing identity through NFC: one is to realize the secure transmission of identity information from the electronic device 10 through the server to the identity identification server, and the other is to realize the secure reading of identity information through NFC.
針對此,本發明實施例基於TEE安全保障機制提出從電子設備到伺服器的安全資訊交互方式。首先,本發明實施例將對接身份鑒別伺服器的功能授予權威身份認證模組201,並預先在伺服器中預身份鑒別伺服器授予的伺服器憑證,該伺服器憑證用於表示該伺服器有權限對用戶的待認證身份資訊進行鑒別。其次,進一步通過與電子設備對應的可信應用管理平臺(Trusted Application Management,TAM)將身份鑒別伺服器提供的目標資訊資料解密授權憑證安全地下載到可信身份認證服務中,實現從電子設備到可信身份服務平 臺再到身份鑒別平臺的安全通訊閉環。 In view of this, the embodiment of the present invention proposes a secure information interaction method from electronic devices to servers based on the TEE security mechanism. First, the embodiment of the present invention grants the function of connecting to the identity identification server to the authoritative identity authentication module 201, and pre-prepare the server certificate granted by the identity identification server in the server, which is used to indicate that the server has the authority to identify the user's identity information to be authenticated. Secondly, the target information data decryption authorization certificate provided by the identity identification server is further securely downloaded to the trusted identity authentication service through the trusted application management platform (TAM) corresponding to the electronic device, realizing a secure communication closed loop from the electronic device to the trusted identity service platform and then to the identity identification platform.
基於此,當電子設備接收到用戶對用戶身份認證的第一輸入時,可通過電子設備中安卓系統和/或ios系統中的可信身份認證服務SDK1011和可信身份認證服務控制項102實現對可信身份認證服務TA103的調用,以及發起對待認證身份資訊的採集和處理,再由其可信地連接到可信身份服務平臺與可信身份認證後臺模組202進行通訊。最後,通過權威身份認證模組201完成對待認證身份資訊的校驗和解析處理。 Based on this, when the electronic device receives the first input of the user for user identity authentication, the trusted identity authentication service TA103 can be called through the trusted identity authentication service SDK1011 and the trusted identity authentication service control item 102 in the Android system and/or iOS system in the electronic device, and the collection and processing of the identity information to be authenticated can be initiated, and then it can be trusted to connect to the trusted identity service platform and communicate with the trusted identity authentication backend module 202. Finally, the verification and analysis of the identity information to be authenticated is completed through the authoritative identity authentication module 201.
如此,一方面有效規避了電子設備中TEE空間較小能力受限的問題,降低了識讀待認證身份資訊對電子設備的硬體資源的要求。另一方面,通過可信身份認證服務TA基於電子設備數位憑證如根信任證書生成一對公私金鑰對。其中,公私金鑰對中的設備公開金鑰與用戶位址(UserId)及電子設備唯一標識會一併記錄在可信身份服務平臺,當發現某電子設備存在風險時,迅速定位到某台電子設備並終止其繼續訪問可信身份服務平臺,為可信身份服務平臺進行電子設備風險防控提供了有效的支援。另外,在確保了從電子設備到身份鑒別平臺的身份認證資訊傳輸的安全後,就已經具備了安全受理待認證身份資訊校驗和解析的能力,接下來就可以進一步解決NFC安全讀取身份證件資訊以及與可信身份服務平臺安全對接的過程,具體可以結合圖3進行詳細說明。 In this way, on the one hand, the problem of limited capacity of TEE space in electronic devices is effectively avoided, and the requirements for hardware resources of electronic devices to read identity information to be authenticated are reduced. On the other hand, the trusted identity authentication service TA generates a public-private key pair based on the digital certificate of the electronic device, such as the root trust certificate. Among them, the device public key and user address (UserId) in the public-private key pair and the unique identifier of the electronic device will be recorded together on the trusted identity service platform. When a risk is found in an electronic device, the electronic device is quickly located and its continued access to the trusted identity service platform is terminated, providing effective support for the trusted identity service platform to conduct risk prevention and control of electronic devices. In addition, after ensuring the security of identity authentication information transmission from electronic devices to the identity identification platform, the ability to securely accept the verification and analysis of identity information to be authenticated is already available. Next, the process of securely reading identity document information through NFC and securely connecting with the trusted identity service platform can be further solved. The specific process can be explained in detail in conjunction with Figure 3.
圖3是根據本發明提供的資訊處理系統的一個實施例的應用場景的架構示意圖。如圖3所示,近場通訊晶片為包括用戶的待認證身份資訊的晶片,該晶片支援NFC通訊,例如二代身份證件。電子設備10包括NFC模組和可信身份認證服務TA103,其中,NFC模組,用於讀取和傳輸二代身份證件中用戶的待認證身份資訊;可信身份認證服務TA103運行在TEE可信執行環境中,在二代身份證件與NFC進行應用協定資料單元(Application Protocol Data Unit,APDU)指令通訊時,判斷和比對當前物聯網電子設備,並確定NFC的訪問與二代身份證件之間通訊流程。如在一些資源嚴重受限的物聯網電子設備如可穿戴式設備、智慧門鎖等無法承載計算量較大的設備,還需在NFC通訊過程中對其流程做進一步定制,並對NFC的訪問和與二代身份證件之間的APDU指令交互放在設備TEE內執行;將二代身份證件訪問APDU指令的生成、組 裝和APDU回應的處理放在可信身份認證服務後臺上進行,具體內容可以具體參照圖4所示的內容。 FIG3 is a schematic diagram of the architecture of an application scenario of an embodiment of the information processing system provided by the present invention. As shown in FIG3, the near field communication chip is a chip including the user's identity information to be authenticated, and the chip supports NFC communication, such as a second-generation identity certificate. The electronic device 10 includes an NFC module and a trusted identity authentication service TA103, wherein the NFC module is used to read and transmit the user's identity information to be authenticated in the second-generation identity certificate; the trusted identity authentication service TA103 runs in the TEE trusted execution environment, and when the second-generation identity certificate communicates with NFC using the Application Protocol Data Unit (APDU) command, it judges and compares the current Internet of Things electronic device, and determines the communication process between the NFC access and the second-generation identity certificate. For example, in some IoT electronic devices with severely limited resources, such as wearable devices and smart door locks, which cannot carry large computing loads, it is necessary to further customize the process during NFC communication, and execute NFC access and APDU command interaction with the second-generation identity card in the device TEE; the generation, assembly and processing of APDU response of the second-generation identity card access APDU command are placed on the backend of the trusted identity authentication service. The specific content can be specifically referred to in Figure 4.
伺服器20運行可信身份服務平臺,該運行可信身份服務平臺用於基於可信身份認證服務的處理資訊方法的支撐管理平臺。另外,該運行可信身份服務平臺可以包括APDU指令操作模組和權威身份認證模組201,其中,APDU指令操作模組用於處理二代身份證件訪問APDU指令的生成、組裝和回應,主要與權威身份認證模組201進行交互。權威身份認證模組201用於與身份鑒別平臺進行安全交互確定用戶的待認證的身份資訊的身份資訊明文資料。 The server 20 runs a trusted identity service platform, which is used as a support management platform for a method of processing information based on a trusted identity authentication service. In addition, the trusted identity service platform may include an APDU instruction operation module and an authoritative identity authentication module 201, wherein the APDU instruction operation module is used to process the generation, assembly and response of the second-generation identity document access APDU instruction, and mainly interacts with the authoritative identity authentication module 201. The authoritative identity authentication module 201 is used to interact securely with the identity identification platform to determine the identity information plaintext data of the user's identity information to be authenticated.
基於圖3所示的系統架構,本發明實施例是通過TEE實現對NFC資訊的安全讀取,然後使可信身份認證服務TA103全面監聽設備外對NFC的讀取操作。待可信身份認證服務TA103收到刷身份證操作請求時,即安全調用電子設備的NFC模組,並按照二代身份證件卡規範執行APDU指令集,以及將執行指令回應的待認證的身份資訊進行回傳。接著,可信身份認證服務TA103通過電子設備和伺服器之間的安全連結把接收到的待認證的身份資訊的密文資訊發送到權威身份認證模組201中。權威身份認證模組201在收到待認證的身份資訊的密文資訊後即建立與身份鑒別伺服器的安全通信,並通過身份鑒別伺服器解析以及按身份證件屬性格式拼接組裝成用於表徵用戶身份的目標資訊的原文字串返回時,由可信身份服務服務平臺把目標資訊的原文字串響應回給可信身份認證服務TA103。此時,可信身份認證服務TA103就可以根據事先保存的權威身份鑒別機構的目標資訊資料解密授權憑證以及目標資訊的原文字串對待認證的身份資訊如身份證件號碼、身份證件圖像以及身份證件圖像中用戶面部圖像等進行解密,得到目標資訊如身份證件圖像中用戶面部圖像。在上述過程中,可信身份認證服務TA103通過NFC近場讀取到二代身份證件的待認證的身份資訊再交由權威身份認證模組201服務處理和解析出待認證的身份資訊的身份資訊明文資料。 Based on the system architecture shown in FIG3 , the embodiment of the present invention realizes the secure reading of NFC information through TEE, and then enables the trusted identity authentication service TA103 to fully monitor the NFC reading operation outside the device. When the trusted identity authentication service TA103 receives the identity card swipe operation request, it securely calls the NFC module of the electronic device, executes the APDU instruction set according to the second-generation identity card specification, and returns the identity information to be authenticated in response to the execution instruction. Then, the trusted identity authentication service TA103 sends the received encrypted information of the identity information to be authenticated to the authoritative identity authentication module 201 through the secure connection between the electronic device and the server. After receiving the ciphertext information of the identity information to be authenticated, the authoritative identity authentication module 201 establishes secure communication with the identity identification server, and after the identity identification server parses and assembles the original text string of the target information used to characterize the user's identity according to the identity certificate attribute format, the trusted identity service platform responds the original text string of the target information back to the trusted identity authentication service TA103. At this time, the trusted identity authentication service TA103 can decrypt the identity information to be authenticated, such as the identity certificate number, the identity certificate image, and the user's facial image in the identity certificate image, based on the target information data decryption authorization certificate of the authoritative identity identification agency stored in advance and the original text string of the target information, and obtain the target information, such as the user's facial image in the identity certificate image. In the above process, the trusted identity authentication service TA103 reads the identity information to be authenticated of the second-generation identity document through NFC near field and then passes it to the authoritative identity authentication module 201 service for processing and parsing the identity information plain text data of the identity information to be authenticated.
另外,需要說明的是,本發明實施例中的資訊處理方法可以在電子設備側執行,也可以在電子設備和伺服器上執行。由此,在一些可能的實施例中,如在一些資源嚴重受限的物聯網電子設備如可穿戴式設備、智慧門鎖等無法承載計算量較大的設備,還需在NFC通訊過程中對其流程做進一步定制。 具體可以結合圖4對這些物聯網電子設備進行說明。如圖4所示,針對本發明實施例提供的一些資源嚴重受限的物聯網電子設備(如可穿戴式設備、智慧門鎖等),還需在NFC通訊過程中對其流程做進一步定制,並對NFC的訪問和與身份證件之間的APDU指令交互放在設備TEE內執行;將身份證件訪問APDU指令的生成、組裝和APDU回應的處理放在可信身份服務平臺上進行。即本發明實施例通過TEE實現對NFC資訊的安全讀取,然後使可信身份認證服務TA103全面監聽設備外對NFC的讀取操作。待可信身份認證服務TA103收到刷身份證操作請求時,即安全調用電子設備的NFC模組,並按照二代身份證件卡規範執行APDU指令集中近場通訊的指令,以及將執行指令回應的待認證的身份資訊進行回傳,這裡,APDU指令集中的指令由伺服器確定。接著,可信身份認證服務TA103通過電子設備和伺服器之間的安全連結把接收到的待認證的身份資訊的密文資訊發送到權威身份認證模組201中。權威身份認證模組201在收到待認證的身份資訊的密文資訊後即建立與身份鑒別伺服器的安全通信,並通過身份鑒別伺服器解析以及按身份證件屬性格式拼接組裝成用於表徵用戶身份的目標資訊的原文字串返回至權威身份認證模組201。此時,權威身份認證模組201就可以根據事先保存的權威身份鑒別機構的目標資訊資料解密授權憑證以及目標資訊的原文字串對待認證的身份資訊如身份證件號碼、身份證件圖像以及身份證件圖像中用戶面部圖像等的解密,以得到目標資訊如身份證件圖像中用戶面部圖像。在上述過程中,可信身份認證服務TA103通過NFC近場讀取到二代身份證件的待認證的身份資訊再交由權威身份認證模組201服務處理和解析出待認證的身份資訊的身份資訊明文資料。 In addition, it should be noted that the information processing method in the embodiment of the present invention can be executed on the electronic device side, or on the electronic device and the server. Therefore, in some possible embodiments, such as some IoT electronic devices with severely limited resources such as wearable devices, smart door locks, etc. that cannot carry large computing loads, it is necessary to further customize the process during the NFC communication process. Specifically, these IoT electronic devices can be explained in conjunction with Figure 4. As shown in FIG4 , for some IoT electronic devices with severely limited resources (such as wearable devices, smart door locks, etc.) provided by the embodiment of the present invention, it is necessary to further customize the process in the NFC communication process, and execute the NFC access and APDU command interaction with the identity document in the device TEE; the generation, assembly and processing of the identity document access APDU command and APDU response are placed on the trusted identity service platform. That is, the embodiment of the present invention realizes the secure reading of NFC information through TEE, and then enables the trusted identity authentication service TA103 to fully monitor the NFC reading operation outside the device. When the trusted identity authentication service TA103 receives the identity card swiping operation request, it securely calls the NFC module of the electronic device, executes the near field communication instructions in the APDU instruction set according to the second-generation identity card specification, and returns the identity information to be authenticated in response to the execution instruction. Here, the instructions in the APDU instruction set are determined by the server. Then, the trusted identity authentication service TA103 sends the received ciphertext information of the identity information to be authenticated to the authoritative identity authentication module 201 through the secure connection between the electronic device and the server. After receiving the ciphertext information of the identity information to be authenticated, the authoritative identity authentication module 201 establishes secure communication with the identity identification server, and returns the original text string of the target information used to represent the user's identity, which is parsed by the identity identification server and assembled in the identity document attribute format, to the authoritative identity authentication module 201. At this time, the authoritative identity authentication module 201 can decrypt the authorization certificate and the original text string of the target information of the authoritative identity identification agency stored in advance to decrypt the identity information to be authenticated, such as the identity document number, the identity document image, and the user's facial image in the identity document image, so as to obtain the target information such as the user's facial image in the identity document image. In the above process, the trusted identity authentication service TA103 reads the identity information to be authenticated of the second-generation identity document through NFC near field and then hands it over to the authoritative identity authentication module 201 service for processing and parsing the identity information plaintext data of the identity information to be authenticated.
根據物聯網電子設備定制NFC的訪問與身份證件之間通訊流程時,根據物聯網電子設備性能、用途和類型選擇合適的處理流程,如智慧手機、手提/平板電腦、智慧POS機具、智慧汽車、自助售貨機以及自助閘機使用在TEE內調用NFC與二代身份證件之間進行APDU指令交互的方案;智慧手錶/手環、智慧門鎖/門禁使用在設備執行APDU指令,在可信身份服務平臺進行APDU指令的生成、組裝和處理。 When customizing the communication process between NFC access and identity documents according to the IoT electronic devices, select the appropriate processing process according to the performance, purpose and type of the IoT electronic devices. For example, smart phones, laptops/tablets, smart POS machines, smart cars, self-service vending machines and self-service gates use the solution of calling NFC in TEE to interact with the second-generation identity documents through APDU commands; smart watches/bracelets, smart door locks/access control use the device to execute APDU commands, and generate, assemble and process APDU commands on the trusted identity service platform.
基於此,當電子設備接收到用戶對用戶身份認證的第一輸入時,回應於第一輸入,在可信執行環境下,通過近場通信獲取用戶的待認證身份資 訊;向伺服器發送用戶的待認證身份資訊,用戶的待認證身份資訊用於確定待認證身份資訊的用戶身份認證結果。這樣,伺服器接收電子設備發送的用戶的待認證身份資訊,在檢測到電子設備的設備類型為預設目標設備類型即電子設備的設備類型符合可穿戴式設備、智慧門鎖等無法承載計算量較大的設備的情況下,獲取與用戶的待認證身份資訊對應的且用於表徵用戶身份的目標資訊,目標資訊包括用戶的第一生物特徵資訊。再者,電子設備在預設時間段內獲取用戶圖像,並向伺服器發送用戶圖像,用戶圖像用於與用戶的待認證身份進行對比,以確定用戶身份認證結果。然後,伺服器接收電子設備發送的用戶圖像,並確定用戶圖像中的用戶的第二生物特徵資訊;基於第一生物特徵資訊與第二生物特徵資訊的對比結果,確定待認證身份資訊的用戶身份認證結果;向電子設備發送待認證身份資訊的用戶身份認證結果。電子設備,接收伺服器發送的待認證身份資訊的用戶身份認證結果,以便向用戶提示待認證身份資訊的用戶身份認證結果。這裡,在確定用戶的第一生物特徵資訊時,伺服器可以向電子設備發送獲取用戶圖像指令,用戶圖像指令用於指示電子設備在預設時間段內獲取用戶圖像。電子設備在接收到伺服器發送的獲取用戶圖像指令時,獲取用戶圖像。或者,電子設備接收到用戶針對獲取用戶圖像指令,也可以使電子設備獲取用戶圖像。 Based on this, when the electronic device receives the first input of the user for user identity authentication, in response to the first input, the user's identity information to be authenticated is obtained through near field communication in a trusted execution environment; the user's identity information to be authenticated is sent to the server, and the user's identity information to be authenticated is used to determine the user identity authentication result of the identity information to be authenticated. In this way, the server receives the user's identity information to be authenticated sent by the electronic device, and when it is detected that the device type of the electronic device is a preset target device type, that is, the device type of the electronic device meets the requirements of wearable devices, smart door locks, and other devices that cannot carry a large amount of calculation, the target information corresponding to the user's identity information to be authenticated and used to characterize the user's identity is obtained, and the target information includes the user's first biometric information. Furthermore, the electronic device obtains the user image within a preset time period and sends the user image to the server, and the user image is used to compare with the user's identity to be authenticated to determine the user identity authentication result. Then, the server receives the user image sent by the electronic device and determines the second biometric information of the user in the user image; based on the comparison result of the first biometric information and the second biometric information, determines the user identity authentication result of the identity to be authenticated; and sends the user identity authentication result of the identity to be authenticated to the electronic device. The electronic device receives the user identity authentication result of the identity to be authenticated sent by the server, so as to prompt the user with the user identity authentication result of the identity to be authenticated. Here, when determining the user's first biometric information, the server may send a user image acquisition instruction to the electronic device, and the user image instruction is used to instruct the electronic device to acquire the user image within a preset time period. When the electronic device receives the user image acquisition instruction sent by the server, it acquires the user image. Alternatively, when the electronic device receives the user's user image acquisition instruction, the electronic device may also acquire the user image.
進一步地,電子設備可以在可信執行環境下,通過執行伺服器提供的協定資料指令集中近場通訊的指令,獲取用戶的待認證身份資訊。 Furthermore, electronic devices can obtain the user's identity information to be authenticated by executing the near field communication instructions in the protocol data instruction set provided by the server in a trusted execution environment.
伺服器在目標資訊時,可以具體通過如下步驟,即根據待認證身份資訊的密文資訊,確定按照身份證件屬性格式拼接組裝成的用於表徵用戶身份的目標資訊的原文字串;根據預存的目標資訊資料解密授權憑證以及目標資訊的原文字串,對待認證的身份資訊進行解密,得到目標資訊。 When the server obtains the target information, it can specifically go through the following steps: determine the original text string of the target information used to represent the user identity, which is assembled according to the identity document attribute format, based on the ciphertext information of the identity information to be authenticated; decrypt the authorization certificate and the original text string of the target information based on the pre-stored target information data, decrypt the identity information to be authenticated, and obtain the target information.
進一步地,在確定原文字串的過程中,伺服器向身份鑒別伺服器發送協定資料指令,協定資料指令用於指示身份鑒別伺服器按照身份證件屬性格式拼接組裝成的用於表徵用戶身份的目標資訊的原文字串;接收身份鑒別伺服器發送的目標資訊的原文字串。 Furthermore, in the process of determining the original text string, the server sends a protocol data instruction to the identity identification server, and the protocol data instruction is used to instruct the identity identification server to assemble the original text string of the target information used to represent the user's identity according to the identity document attribute format; and receive the original text string of the target information sent by the identity identification server.
由此,本發明實施例提出一種基於TEE和NFC的可信身份認證的資訊處理方法,可以通過TEE安全訪問NFC進行身份證件的待認證的身份 資訊識讀的方式以獲取可靠可信的用於表徵用戶身份的目標資訊,以及在一些實施例中可以在可信執行環境TEE中與伺服器中運行可信身份服務平臺進行交互,以避免偽造身份證的問題,同時也避免了因拍照效果不佳造成獲取到的目標資訊不準確,提高身份認證的準確性。通過將待認證的身份資訊對應的目標資訊資料解密授權憑證遷移至TEE中,杜絕了待認證的身份資訊在電子設備和伺服器交互過程中可能被木馬病毒竊取的問題。另外,通過從TEE內安全訪問攝影機,確保用於對比認證的用戶圖像即即時的用戶圖像的源頭可信,防止注入偽造人臉照片或影片的行為。 Therefore, the embodiment of the present invention proposes an information processing method for trusted identity authentication based on TEE and NFC, which can obtain reliable and credible target information used to represent the user's identity by securely accessing NFC through TEE to read the identity information to be authenticated of the identity certificate, and in some embodiments, can interact with the trusted identity service platform running in the server in the trusted execution environment TEE to avoid the problem of forged identity certificates, and also avoid the inaccurate target information obtained due to poor photography effect, thereby improving the accuracy of identity authentication. By migrating the target information data decryption authorization certificate corresponding to the identity information to be authenticated to the TEE, the problem that the identity information to be authenticated may be stolen by Trojan virus during the interaction between the electronic device and the server is eliminated. In addition, by securely accessing the camera from within the TEE, the source of the user image used for comparison and authentication, i.e., the real-time user image, is ensured to be credible, preventing the injection of forged facial photos or videos.
另外,針對一些支持TEE和NFC的物聯網電子設備硬體資源嚴重受限的問題,本發明實施例利用第四代行動通訊技術(the 4th generation mobile communication technology,4G)、第五代行動通訊技術(5th generation mobile networks,5G)傳輸速率更高時延更低的特性,將NFC與二代身份證交互的命令進行了拆分,其中,通過近場通信獲取用戶的待認證身份資訊的部分在電子設備實現,主要處理身份證件APDU請求回應和交互協定,後端部分移至伺服器運行,主要負責身份證件訪問APDU指令的生成、組裝和APDU回應的處理。通過上述前後端分離處理的方式,減少了電子設備的NFC交互協定的空間占比,對於可穿戴設備等資源比較有限的物聯網終端設備,具有更強的適用性。通過電子設備的類別,確定在電子設備和伺服器確定對比結果方式,保證了身份證識讀和人臉比對功能在電子設備TEE空間資源有限的情況下的可用性和適配性。 In addition, in response to the problem of severely limited hardware resources of some IoT electronic devices that support TEE and NFC, the embodiments of the present invention utilize the characteristics of higher transmission rate and lower latency of the 4th generation mobile communication technology (4G) and the 5th generation mobile communication technology (5G) to split the commands for interaction between NFC and the second-generation identity card. Among them, the part of obtaining the user's identity information to be authenticated through near-field communication is implemented in the electronic device, which mainly processes the identity card APDU request response and interaction protocol, and the back-end part is moved to the server to run, which is mainly responsible for the generation and assembly of identity card access APDU instructions and the processing of APDU responses. Through the above-mentioned front-end and back-end separation processing method, the space proportion of the NFC interaction protocol of electronic devices is reduced, and it has stronger applicability for IoT terminal devices with limited resources such as wearable devices. By classifying electronic devices, the method of determining the comparison results between electronic devices and servers is determined, ensuring the availability and adaptability of identity recognition and face comparison functions when the space resources of electronic devices TEE are limited.
以上,採用TEE安全訪問NFC識讀用戶的待認證身份資訊的方式確保獲取的身份證資訊的資料來源真實準確,起到防偽身份證效果,同時可信執行環境TEE防止惡意軟體截獲身份證資訊資料被替換和篡改。另外,本發明實施例是基於電子設備TEE和伺服器之間的安全閉環實現的,能夠確保資訊是密文上送可信身份認證後臺解密再以安全TEE安全通道傳送回來使用的,適用於更多的身份認證場景。 In the above, TEE is used to securely access NFC to read the user's identity information to be authenticated to ensure that the data source of the obtained identity information is true and accurate, which plays an anti-counterfeiting effect on the identity card. At the same time, the trusted execution environment TEE prevents malicious software from intercepting the identity information and replacing and tampering with it. In addition, the embodiment of the present invention is based on the secure closed loop between the electronic device TEE and the server, which can ensure that the information is sent to the trusted identity authentication background for decryption and then sent back through the secure TEE secure channel for use, which is applicable to more identity authentication scenarios.
基於上述資訊處理架構和應用場景,下面結合圖5對本發明實施例提供的異常節點識別方法進行詳細說明。 Based on the above information processing architecture and application scenarios, the abnormal node identification method provided by the embodiment of the present invention is described in detail below in conjunction with Figure 5.
圖5為本發明實施例提供的一種資訊處理方法的流程圖。 Figure 5 is a flow chart of an information processing method provided by an embodiment of the present invention.
如圖5所示,該資訊處理方法可以應用於如圖1所示的電子設備,該資訊處理方法具體可以包括如下步驟: As shown in FIG5, the information processing method can be applied to the electronic device shown in FIG1. The information processing method can specifically include the following steps:
首先,步驟510,接收對用戶身份認證的第一輸入;接著,步驟520,回應於第一輸入,在可信執行環境下,通過近場通信獲取用戶的待認證身份資訊;再者,步驟530,根據用戶的待認證身份資訊,確定用於表徵用戶身份的目標資訊,目標資訊包括用戶的第一生物特徵資訊;以及,在預設時間段內獲取拍攝的用戶圖像,用戶圖像包括用戶的第二生物特徵資訊;然後,步驟540,基於第一生物特徵資訊與第二生物特徵資訊的對比結果,確定待認證身份資訊的用戶身份認證結果。 First, in step 510, a first input for user identity authentication is received; then, in step 520, in response to the first input, the identity information of the user to be authenticated is obtained through near field communication in a trusted execution environment; further, in step 530, target information for representing the user's identity is determined based on the identity information of the user to be authenticated, the target information includes the first biometric information of the user; and, a user image taken within a preset time period is obtained, the user image includes the second biometric information of the user; then, in step 540, based on the comparison result of the first biometric information and the second biometric information, the user identity authentication result of the identity information to be authenticated is determined.
由此,通過在可信執行環境TEE以及近場通信NFC獲取用戶的待認證身份資訊的方式,來獲取可信任的用於表徵用戶身份的目標資訊如身份證件資訊,以避免偽造身份證件的問題,同時也避免了因拍照效果不佳或者拍攝硬體不足造成獲取到的目標資訊不準確,從而導致用戶身份認證結果不正確的問題。 Therefore, by obtaining the user's identity information to be authenticated in the trusted execution environment TEE and near field communication NFC, the trusted target information used to represent the user's identity, such as identity document information, is obtained to avoid the problem of forged identity documents. At the same time, it also avoids the problem of inaccurate target information obtained due to poor photography or insufficient shooting hardware, which leads to incorrect user identity authentication results.
另外,通過在可信執行環境TEE中獲取目標資訊以及對比目標資訊中的第一生物特徵資訊和拍攝的用戶圖像中的第二生物特徵資訊,有效防止惡意軟體截獲身份證件資訊被替換和篡改的問題,同時,通過可信執行環境TEE安全訪問電子設備的攝影機,確保用於對比認證的用戶圖像的準確性,防止注入偽造人臉面部圖像或影片的行為。 In addition, by obtaining target information in the trusted execution environment TEE and comparing the first biometric information in the target information with the second biometric information in the captured user image, the problem of identity document information being replaced and tampered with by malicious software can be effectively prevented. At the same time, the camera of the electronic device is securely accessed through the trusted execution environment TEE to ensure the accuracy of the user image used for comparison and authentication, and prevent the injection of forged facial images or videos.
基於此,下面對上述步驟進行詳細說明,具體如下所示: Based on this, the above steps are explained in detail below, as shown below:
首先,涉及步驟320,本發明實施例提供了以下至少兩種方式,獲取身份證件的用戶的待認證身份資訊,具體如下所示。 First, regarding step 320, the embodiment of the present invention provides at least two methods to obtain the identity information to be authenticated of the user with the identity certificate, as shown below.
在一些可能的實施例中,步驟320具體可以包括: In some possible implementations, step 320 may specifically include:
回應於第一輸入, In response to the first input,
在資料交互環境滿足預設交互環境、且在可信執行環境下,通過近場通信讀取近場通信晶片,獲取近場通信晶片的標籤內容以及用戶身份標識; When the data interaction environment satisfies the preset interaction environment and is in a trusted execution environment, the NFC chip is read through NFC to obtain the tag content of the NFC chip and the user identity;
基於標籤內容和用戶身份標識,生成用戶的待認證身份資訊。 Based on the tag content and user identity, generate the user's identity information to be authenticated.
進一步地,在通過近場通信讀取近場通信晶片,獲取近場通信晶片的標籤內容以及用戶身份標識的步驟之前,該資訊處理方法還包括: Furthermore, before the step of reading the NFC chip through NFC and obtaining the label content of the NFC chip and the user identity identification, the information processing method also includes:
檢測與近場通信晶片的資料交互環境,資料交互環境包括電子設備與近場通信晶片的距離值以及在預設距離內電子設備與近場通信晶片的接觸時長; Detect the data interaction environment with the near-field communication chip, which includes the distance between the electronic device and the near-field communication chip and the contact time between the electronic device and the near-field communication chip within the preset distance;
在距離值滿足預設距離值和/或接觸市場滿足預設接觸時長時,確定資料交互環境滿足預設交互環境。 When the distance value meets the preset distance value and/or the contact market meets the preset contact duration, it is determined that the data interaction environment meets the preset interaction environment.
在另一些可能的實施例中,回應於第一輸入,在可信執行環境下,確定目標近場通信晶片,近場通信晶片與電子設備的資料交互環境滿足預設近場通訊環境; In some other possible embodiments, in response to the first input, in a trusted execution environment, a target near-field communication chip is determined, and the data interaction environment between the near-field communication chip and the electronic device satisfies a preset near-field communication environment;
通過近場通信晶片與應用協定資料的預設對應關係,獲取與目標近場通信晶片對應的目標應用協定資料; Through the preset correspondence between the near field communication chip and the application protocol data, the target application protocol data corresponding to the target near field communication chip is obtained;
根據目標應用協定資料,獲取用戶的待認證身份資訊。 According to the target application protocol data, obtain the user's identity information to be authenticated.
這裡,為了保證用戶的資訊安全,本發明實施例提供了根據近場通信晶片與應用協定資料的預設對應關係,獲取與目標近場通信晶片對應的目標應用協定資料。例如,若近場通信晶片為身份證件,且預設對應關係中表示該電子設備可以訪問該身份證件圖像中用戶面部圖像,則電子設備可以獲取該身份證件圖像中用戶面部圖像。同理,若預設對應關係中表示該電子設備可以訪問身份證件號碼、身份證件圖像和身份證件用戶身份資訊,則電子設備可以獲取身份證件號碼、身份證件圖像和身份證件用戶身份資訊,由此,可以根據用戶的前期設定,獲取其資訊。 Here, in order to ensure the information security of the user, the embodiment of the present invention provides a method for obtaining the target application protocol data corresponding to the target near-field communication chip according to the preset correspondence between the near-field communication chip and the application protocol data. For example, if the near-field communication chip is an identity card, and the preset correspondence indicates that the electronic device can access the user's facial image in the identity card image, then the electronic device can obtain the user's facial image in the identity card image. Similarly, if the preset correspondence indicates that the electronic device can access the identity card number, the identity card image, and the identity information of the identity card user, then the electronic device can obtain the identity card number, the identity card image, and the identity information of the identity card user, thereby obtaining the user's information according to the user's preliminary settings.
另外,本發明實施例中的近場通信晶片與應用協定資料的預設對應關係,可以通過如下步驟確定,即在通過近場通信晶片與應用協定資料的預設對應關係,獲取與目標近場通信晶片對應的目標應用協定資料的步驟之前,本發明實施例提供的資訊處理方法還包括: In addition, the default correspondence between the near field communication chip and the application protocol data in the embodiment of the present invention can be determined by the following steps, that is, before the step of obtaining the target application protocol data corresponding to the target near field communication chip through the default correspondence between the near field communication chip and the application protocol data, the information processing method provided by the embodiment of the present invention also includes:
向伺服器發送權限請求,權限請求包括電子設備的身份資訊,權限請求用於獲取近場通信晶片的權限; Send a permission request to the server. The permission request includes the identity information of the electronic device. The permission request is used to obtain the permission of the near field communication chip;
接收伺服器發送的權限回饋資訊,該權限回饋資訊包括該電子設備與近場通信晶片進行通訊的權限; Receive permission feedback information sent by the server, which includes the permission for the electronic device to communicate with the near field communication chip;
根據權限回饋資訊和用戶的預先設定,得到近場通信晶片與應用協定資料的預設對應關係。 Based on the permission feedback information and the user's preset settings, the default correspondence between the near field communication chip and the application protocol data is obtained.
接著,涉及步驟330,該步驟可以分為兩個部分,即一部分為確定用於表徵用戶身份的目標資訊,另一部分為獲取拍攝的用戶圖像。基於此,分別對兩個部分進行說明。 Next, step 330 is involved. This step can be divided into two parts, one of which is to determine the target information used to characterize the user's identity, and the other is to obtain the captured user image. Based on this, the two parts are explained separately.
首先,本發明實施例中確定目標資訊的過程如下所示,即根據用戶的待認證身份資訊,確定用於表徵用戶身份的目標資訊,包括: First, the process of determining the target information in the embodiment of the present invention is as follows, that is, according to the user's identity information to be authenticated, the target information used to characterize the user's identity is determined, including:
步驟3301,根據待認證的身份資訊,確定待認證的身份資訊的身份資訊明文資料。 Step 3301, determine the identity information plaintext data of the identity information to be authenticated based on the identity information to be authenticated.
進一步地,該步驟3301具體可以包括: Furthermore, step 3301 may specifically include:
步驟33011,向伺服器發送身份認證請求,身份認證請求包括待認證的身份資訊,身份認證請求用於請求伺服器對待認證的身份資訊進行解析,以得到待認證的身份資訊的身份資訊明文資料; Step 33011, sending an identity authentication request to the server, the identity authentication request includes the identity information to be authenticated, and the identity authentication request is used to request the server to parse the identity information to be authenticated to obtain the identity information plain text data of the identity information to be authenticated;
步驟33012,接收伺服器發送的身份認證回饋資訊,身份認證回饋資訊包括待認證的身份資訊的身份資訊明文資料。 Step 33012, receiving the identity authentication feedback information sent by the server, the identity authentication feedback information includes the identity information plain text data of the identity information to be authenticated.
步驟3302,根據身份資訊明文資料和目標資訊資料解密授權憑證,確定第一生物特徵資訊。 Step 3302, decrypt the authorization certificate based on the identity information plaintext data and the target information data to determine the first biometric feature information.
這裡,可以根據下述步驟,確定目標資訊資料解密授權憑證,具體可以包括步驟33021-步驟33023。 Here, the target information data decryption authorization certificate can be determined according to the following steps, which may specifically include steps 33021-33023.
步驟33021,根據電子設備中的數位憑證,生成設備公私金鑰對。 Step 33021, generate a public and private key pair for the device based on the digital certificate in the electronic device.
步驟33022,通過可信身份認證初始化介面向伺服器發送用戶身份認證初始化請求,用戶身份認證初始化請求包括設備公私金鑰對,用戶身份認證初始化請求用於與伺服器建立安全通訊連結,並通過安全通訊連結進行金鑰交換。 Step 33022, send a user identity authentication initialization request to the server through the trusted identity authentication initialization interface. The user identity authentication initialization request includes the public and private key pair of the device. The user identity authentication initialization request is used to establish a secure communication link with the server and exchange keys through the secure communication link.
其中,可以基於預存的伺服器公開金鑰,獲取與伺服器對應的可信身份認證初始化介面。 Among them, based on the pre-stored server public key, the trusted identity authentication initialization interface corresponding to the server can be obtained.
步驟33023,接收伺服器的用戶身份認證初始化回饋資訊,用戶身份認證初始化回饋資訊包括目標資訊資料解密授權憑證。 Step 33023, receiving the user identity authentication initialization feedback information from the server, the user identity authentication initialization feedback information includes the target information data decryption authorization certificate.
需要說明的是,用戶身份認證初始化請求還包括應用程式資訊,應用程式資訊包括下述中的至少一種:應用程式標識、簽名證書資訊和證書指紋資訊,其中,應用程式資訊用於確定待認證身份資訊的用戶身份認證結果的 執行環境。 It should be noted that the user identity authentication initialization request also includes application information, which includes at least one of the following: application identification, signature certificate information, and certificate fingerprint information, wherein the application information is used to determine the execution environment of the user identity authentication result of the identity information to be authenticated.
由此,基於上述涉及的可能,本發明實施例中的步驟3302具體可以包括:向伺服器發送生物特徵資訊請求,生物特徵資訊請求包括身份資訊明文資料和目標資訊資料解密授權憑證,生物特徵資訊請求用於請求伺服器基於身份資訊明文資料和目標資訊資料解密授權憑證,確定第一生物特徵資訊; Therefore, based on the above possibilities, step 3302 in the embodiment of the present invention may specifically include: sending a biometric information request to the server, the biometric information request includes the identity information plaintext data and the target information data decryption authorization certificate, and the biometric information request is used to request the server to decrypt the authorization certificate based on the identity information plaintext data and the target information data to determine the first biometric information;
接收伺服器發送的生物特徵回饋資訊,生物特徵回饋資訊包括被設備公開金鑰加密的第一生物特徵資訊。 Receive biometric feedback information sent by the server, which includes the first biometric information encrypted by the device's public key.
需要說明的是,本發明實施例中考慮到有一些資源嚴重受限的物聯網電子設備無法進行確定目標資訊和對比結果。這樣,可以在執行向伺服器發送身份認證請求步驟之前,方法還包括: It should be noted that the embodiment of the present invention takes into account that some IoT electronic devices with severely limited resources are unable to determine target information and compare results. Thus, before executing the step of sending an identity authentication request to the server, the method also includes:
向伺服器發送電子設備的身份標識,電子設備的電子標識用於確定電子設備是否滿足身份認證的條件; Send the electronic device's identity to the server. The electronic device's electronic identity is used to determine whether the electronic device meets the conditions for identity authentication;
接收伺服器發送的身份標識回饋資訊; Receive identification feedback information sent by the server;
在身份標識回饋資訊表徵電子設備未滿足身份認證的條件下,向伺服器發送身份認證請求。 When the identity feedback information indicates that the electronic device does not meet the identity authentication conditions, an identity authentication request is sent to the server.
另外,本發明實施例除了上述基於用戶的待認證身份資訊讀取和解析外,還有一個關鍵就是要將所解析出來的第一生物特徵資訊如身份證件圖像中用戶面部圖像與身份證持有人的用戶圖像中的第二生物特徵資訊進行用戶圖像比對。在這一過程中,有一個關鍵問題亟待解決,那就是用戶當前的面部資訊與原先身份證件採集時的照片存在差異,這其中可能有時間因素也有當初人臉採集設備精度不高甚至是用戶面部受過傷害等各種問題。故此,需要對所解析身份證件圖像中用戶面部圖像及持有人的用戶圖像中的面部資訊進下優化。 In addition, in addition to the above-mentioned reading and parsing of the identity information to be authenticated based on the user, the embodiment of the present invention also has a key point, which is to compare the parsed first biometric information such as the user's facial image in the ID card image with the second biometric information in the user image of the ID card holder. In this process, there is a key problem that needs to be solved urgently, that is, there is a difference between the user's current facial information and the photo taken when the ID card was originally collected. This may be due to various problems such as time factors, the low accuracy of the original face collection equipment, or even the user's face being injured. Therefore, it is necessary to optimize the facial information of the user's facial image in the parsed ID card image and the user image of the holder.
針對於此,本發明實施例中除了按照圖像去模糊對比方法外,還提出了一種對圖片清晰度不敏感的特徵模型即目標身份證件人像特徵模型用於優化人臉對比的錯誤拒絕率(false reject rate,FRR)。 In view of this, in addition to the image deblurring comparison method, the embodiment of the present invention also proposes a feature model that is insensitive to image clarity, namely the target ID portrait feature model, which is used to optimize the false rejection rate (FRR) of face comparison.
基於此,涉及該步驟330中的另一部分即獲取用戶圖像的過程具體包括步驟3311-步驟3313。 Based on this, the other part of step 330, namely the process of obtaining the user image, specifically includes steps 3311 to 3313.
步驟3311,顯示固定人像位置區域,固定人像位置區域用於獲取用戶與固定人像位置區域對應的人體部位圖像。 Step 3311, displaying the fixed portrait position area, the fixed portrait position area is used to obtain the image of the user's body part corresponding to the fixed portrait position area.
舉例說明,如圖6所示,通過固定人像位置區域獲取人體部位圖像。這裡,傳統的人臉識別處理中,會選擇較多的人臉特徵點進行檢測,同時也消耗了較多的性能資源。由於TEE資源有限,本發明實施例提出在電子設備人像採集介面使用固定人像位置,在人像採集介面勾畫固定人像位置區域以匹配人臉最佳位置,同時捨棄一些人臉旋轉對齊的特殊處理,以便快速定位人臉在圖像中的位置,提高人臉特徵點的定位精度。截取到人臉區域後,選擇人臉特徵明顯的特徵點進行檢測,如雙眼、鼻子、顴骨、嘴巴、下巴、額頭特徵點進行檢測,以便降低人臉對比的FRR,使得TEE環境能夠滿足人臉旋轉對齊等方面處理的性能消耗。步驟3312,在接收到用戶拍攝圖像的第二輸入時,獲取待處理的人體部位圖像。 For example, as shown in FIG6 , a human body part image is obtained by fixing the portrait position area. Here, in the traditional face recognition process, more facial feature points are selected for detection, and more performance resources are consumed. Due to limited TEE resources, the embodiment of the present invention proposes to use a fixed portrait position in the portrait acquisition interface of the electronic device, and to outline a fixed portrait position area in the portrait acquisition interface to match the best position of the face, while abandoning some special processing of face rotation and alignment, so as to quickly locate the position of the face in the image and improve the positioning accuracy of the facial feature points. After capturing the face area, select the feature points with obvious facial features for detection, such as eyes, nose, cheekbones, mouth, chin, and forehead feature points for detection, so as to reduce the FRR of face contrast, so that the TEE environment can meet the performance consumption of face rotation and alignment. Step 3312, when receiving the second input of the image taken by the user, obtain the image of the human body part to be processed.
進一步地,通過固定位置區域,從人體部位中的多個特徵點篩選目標特徵點; Furthermore, the target feature point is filtered from multiple feature points in the human body through a fixed position area;
根據目標特徵點,獲取與目標特徵點對應的人體部位圖像。 According to the target feature points, the image of the human body part corresponding to the target feature points is obtained.
這樣,在人像採集介面勾畫固定人像位置區域以匹配人臉最佳位置時,可以捨棄一些人臉旋轉的特徵點,以便快速定位人臉在圖像中的位置,提高人臉特徵點的定位精度。 In this way, when the portrait acquisition interface outlines the fixed portrait position area to match the best face position, some facial rotation feature points can be discarded to quickly locate the face position in the image and improve the positioning accuracy of facial feature points.
步驟3313,對待處理的人體部位圖像進行灰度歸一化處理,得到用戶圖像。 Step 3313, perform grayscale normalization on the human body part image to be processed to obtain the user image.
進一步地,獲取待處理的人體部位圖像的第一灰度值,第一灰度值與第一灰度級對應; Furthermore, a first grayscale value of the human body part image to be processed is obtained, and the first grayscale value corresponds to the first grayscale level;
根據第一灰度級通過灰度拉伸,調整待處理的人體部位圖像,得到具有第一灰度級的用戶圖像。 According to the first grayscale, the human body part image to be processed is adjusted by grayscale stretching to obtain a user image with the first grayscale.
這裡,可以對拍攝的用戶圖像中的人臉照片做灰度歸一化處理。灰度歸一化處理就是對用戶圖像進行光照補償處理,以克服光照變化的影響,本發明實施例中可以利用灰度拉伸的方法將原圖像中的灰度分佈擴展到具有整個灰度級的圖像。例如,採集到的圖像是8位元的灰度圖像,應有256個灰度級,但往往由於採集時光照等因素的影響,圖像的灰度級集中在一個或者幾個灰度級區段,這時可以採用灰度拉伸的方法將圖像擴展到256個灰度級。由此,拍攝到的人臉照片完成光照補償處理、按色階映射後,照片變得更加明朗鮮明, 更有利於圖像對比。 Here, the face photo in the captured user image can be subjected to grayscale normalization. Grayscale normalization is to perform illumination compensation processing on the user image to overcome the influence of illumination changes. In the embodiment of the present invention, the grayscale distribution in the original image can be expanded to an image with a full grayscale using the grayscale stretching method. For example, the captured image is an 8-bit grayscale image, which should have 256 grayscale levels. However, due to the influence of factors such as illumination during acquisition, the grayscale of the image is often concentrated in one or several grayscale segments. In this case, the grayscale stretching method can be used to expand the image to 256 grayscale levels. Therefore, after the illumination compensation processing and color mapping of the face photos taken are completed, the photos become brighter and more vivid, which is more conducive to image contrast.
進一步地,在灰度歸一化操作時,根據用戶圖像的RGB色彩模式進行灰度歸一化處理,按照如下兩個公式: Furthermore, during the grayscale normalization operation, grayscale normalization is performed according to the RGB color mode of the user image, according to the following two formulas:
(1)亮度由公式(1)確定: (1) Brightness is determined by formula (1):
D=R*0.3086+G*0.6094+B*0.0820 (1) D=R*0.3086+G*0.6094+B*0.0820 (1)
其中,D為亮度,R為紅色red的色彩通道,G為綠色green的色彩通道,B為藍色blue的色彩通道。 Among them, D is brightness, R is the red color channel, G is the green color channel, and B is the blue color channel.
(2)色階映射由公式(2)確定: (2) The color level mapping is determined by formula (2):
D'=0+(D-255*LOW)/(255*HIGH-255*LOW)*255 (2) D'=0+(D-255*LOW)/(255*HIGH-255*LOW)*255 (2)
其中,D'為色階,255*LOW和255*HIGH分別是用戶圖像的原圖像長條圖中D的最低點和D的最高點。 Among them, D' is the color level, 255*LOW and 255*HIGH are the lowest point and the highest point of D in the original image bar graph of the user image respectively.
如圖7所示,根據原圖像長條圖做初步篩選,對像素點的分佈明顯不正常如主要分佈在x軸左邊、主要分佈在x軸右邊、主要分佈在一個很窄的區間的圖像,直接視為低品質照片,不做後續處理。圖像長條圖都是灰階影像,x軸是灰度值(一般是0~255),y軸式圖像中每一個灰度級對應的像素點的個數。 As shown in Figure 7, preliminary screening is performed based on the original image bar graph. Images with obviously abnormal pixel distribution, such as those mainly distributed on the left side of the x-axis, mainly distributed on the right side of the x-axis, and mainly distributed in a very narrow range, are directly regarded as low-quality photos and no subsequent processing is performed. Image bar graphs are all grayscale images, with the x-axis being the grayscale value (usually 0~255) and the y-axis being the number of pixels corresponding to each grayscale level in the image.
然後,涉及步驟340,基於步驟330中獲取的用戶圖像,在一些實施例中,在步驟340之前, Then, step 340 is involved. Based on the user image obtained in step 330, in some embodiments, before step 340,
在第一生物特徵資訊包括身份證件圖像的情況下,通過幾何歸一化對比身份證件圖像和用戶圖像,得到第一生物特徵資訊與第二生物特徵資訊的對比結果。 When the first biometric information includes an identity document image, the identity document image and the user image are compared by geometric normalization to obtain a comparison result between the first biometric information and the second biometric information.
這樣,針對身份證件上的第一生物特徵資訊如人像圖片像素較小識別度不高的問題,本提案通過採用幾何歸一化處理和灰度歸一化變換的方式對採集到的活體照片進行處理,提升了人臉照片與身份證上圖像照片比對的識別率,改善了人臉對比的錯誤拒絕率(False Reject Rate,FRR)。 In this way, in order to solve the problem that the first biometric information on the ID card, such as the portrait image, has small pixels and low recognition, this proposal uses geometric normalization and grayscale normalization transformation to process the collected live photos, thereby improving the recognition rate of the comparison between the face photo and the image photo on the ID card, and improving the false rejection rate (FRR) of the face comparison.
進一步地,該步驟具體可以包括步驟3401-步驟3403。 Furthermore, this step may specifically include step 3401-step 3403.
步驟3401,識別身份證件圖像中的用戶面部區域,得到與用戶面部區域對應的用戶面部圖像; Step 3401, identifying the user's facial area in the identity document image, and obtaining the user's facial image corresponding to the user's facial area;
步驟3402,對用戶面部圖像或者用戶圖像中的面部區域進行等 比放大或者縮小,並計算用戶圖像和用戶面部圖像的特徵值; Step 3402, enlarge or reduce the user's facial image or the facial area in the user's image by the same ratio, and calculate the feature values of the user's image and the user's facial image;
步驟3403,根據至少一個特徵值,得到第一生物特徵資訊與第二生物特徵資訊的對比結果。 Step 3403, based on at least one characteristic value, obtain the comparison result of the first biometric characteristic information and the second biometric characteristic information.
舉例說明,使用幾何歸一化演算法對比第一生物特徵資訊與第二生物特徵資訊。可信身份服務平臺中的人臉認證對比模組對身份證件圖像通過定位人臉特徵模型找到身份證件圖像中用戶面部區域,按照幾何歸一化演算法確定用戶圖像中面部位置,比較兩者的特徵值,在確定用戶圖像中面部位置的過程中,使用等比放大和縮小活體人臉照片中人臉的幾何圖形做對比。進一步地,幾何歸一化演算法就是指根據對比目標定位結果將身份證件圖像中用戶面部區域中的用戶圖像中面部位置變化到同一位置和大小。本發明實施例提供的對比步驟包括: For example, a geometric normalization algorithm is used to compare the first biometric information with the second biometric information. The face recognition comparison module in the trusted identity service platform locates the face feature model of the ID card image to find the user's face area in the ID card image, determines the face position in the user image according to the geometric normalization algorithm, compares the feature values of the two, and in the process of determining the face position in the user image, uses geometrically enlarged and reduced geometric figures of the face in the living face photo for comparison. Further, the geometric normalization algorithm refers to changing the face position in the user's face area in the ID card image to the same position and size according to the comparison target positioning result. The comparison step provided by the embodiment of the present invention includes:
步驟1,通過人臉模型匹配找出身份證件圖像中人物的兩眼和鼻子所在的區域; Step 1, find the area where the eyes and nose of the person in the ID card image are located through facial model matching;
步驟2,設定兩眼之間的距離為D,其中心點為O; Step 2, set the distance between the two eyes to D, and the center point to O;
步驟3,根據人臉面部特點和幾何模型確定矩形特徵區域,以O為中心原點,兩眼直線所在為x軸,兩邊各裁剪距離d,其中d=D/2,y軸鼻子方向裁剪1.5d,另一方向裁剪0.5d,最後裁剪出一個正方形區域; Step 3, determine the rectangular feature area based on the facial features and geometric model, with O as the center origin, the straight line between the two eyes as the x-axis, and the cutting distance d on both sides, where d=D/2, cutting 1.5d in the direction of the nose on the y-axis, and cutting 0.5d in the other direction, and finally cutting out a square area;
步驟4,通過同樣的人臉模型匹配找出用戶圖像中的兩眼和鼻子所在的區域;
步驟5,設定用戶圖像中兩眼的距離為D’,其中心點為O’; Step 5, set the distance between the two eyes in the user image to D’, and the center point to O’;
步驟6,根據人臉面部特點和幾何模型確定矩形特徵區域,以O’為中心原點,兩眼直線所在為x軸,兩邊各裁剪距離d’,其中d’=D’/2,y軸鼻子方向裁剪1.5d’,另一方向裁剪0.5d’,最後裁剪出一個正方形區域; Step 6, determine the rectangular feature area based on the facial features and geometric model, with O' as the center origin, the straight line between the two eyes as the x-axis, and the cutting distance d' on both sides, where d'=D'/2, cutting 1.5d' in the nose direction of the y-axis, and cutting 0.5d' in the other direction, and finally cutting out a square area;
步驟7,通過等比拉伸或縮放的方式如拉伸比例V=D’/D,縮放比例V’=D/D’,使裁剪的身份證件圖像和裁剪的用戶圖像大小一致。 Step 7, by stretching or scaling in equal proportions, such as stretching ratio V=D’/D, scaling ratio V’=D/D’, the cropped ID card image and the cropped user image are made to be the same size.
步驟8,提取兩張裁剪區域圖片的特徵值進行對比,根據兩者特徵值相等指數,轉換成相似度作為第一生物特徵資訊與第二生物特徵資訊的對比結果。 Step 8, extract the feature values of the two cropped area images for comparison, and convert them into similarity based on the equal index of the two feature values as the comparison result between the first biometric feature information and the second biometric feature information.
需要說明的是,本發明實施例中涉及的對比圖像的過程可以如上 述步驟1-步驟8所示,這裡,可以通過目標身份證件人像特徵模型確定兩者的對比結果,即進一步地,將至少一個特徵值輸入到目標身份證件人像特徵模型中,得到第一生物特徵資訊與第二生物特徵資訊的對比結果。另外,在一些可能的實施例中,可以確定上述涉及的目標身份證件人像特徵模型進行確定,具體過程如下所示,由於身份證件圖像照片較小、圖像解析度低,為了提高目標身份證件人像特徵模型的比對精度,重點選擇人臉特徵明顯的點,捨棄低解析度下容易誤檢的特徵點,同時輔以大量的身份證圖像樣本訓練,並在每一次人臉比對得到比對結果後,選擇相似度超過N%(N為正數,可以根據應用場景進行自訂配置)的身份證人像特徵值參與模型反覆運算訓練,進而確定新的目標身份證件人像特徵模型。 It should be noted that the process of comparing images involved in the embodiment of the present invention can be as shown in the above steps 1 to 8. Here, the comparison result of the two can be determined by the target identity document portrait feature model, that is, further, at least one feature value is input into the target identity document portrait feature model to obtain the comparison result of the first biometric feature information and the second biometric feature information. In addition, in some possible implementations, the target ID portrait feature model involved above can be determined. The specific process is as follows. Since the ID image is small and the image resolution is low, in order to improve the comparison accuracy of the target ID portrait feature model, the points with obvious facial features are selected, and the feature points that are easy to be misdetected under low resolution are discarded. At the same time, a large number of ID image samples are used for training. After each face comparison, the ID portrait feature values with a similarity of more than N% (N is a positive number and can be customized according to the application scenario) are selected to participate in the model repeated calculation training, and then the new target ID portrait feature model is determined.
基於此,本發明實施例中還提供了一種確定目標身份證件人像特徵模型的方式,具體如下所示: Based on this, the present invention also provides a method for determining the target identity document portrait feature model, as shown below:
根據目標身份證件中用戶面部圖像的訓練特徵值,對預設身份證件人像特徵模型進行簡化,得到目標身份證件人像特徵模型。 According to the training feature values of the user's facial image in the target ID card, the default ID card portrait feature model is simplified to obtain the target ID card portrait feature model.
基於步驟340中獲取的用戶圖像,本發明實施例提供了一種確定第一生物特徵資訊與第二生物特徵資訊的對比結果的過程,具體如下所示,即在步驟340之前,該資訊處理方法還包括: Based on the user image obtained in step 340, the embodiment of the present invention provides a process for determining the comparison result of the first biometric information and the second biometric information, as shown below, that is, before step 340, the information processing method also includes:
通過對稱金鑰對第一生物特徵資訊和第二生物特徵資訊進行加密,得到加密生物特徵資訊; Encrypt the first biometric information and the second biometric information using a symmetric key to obtain encrypted biometric information;
向伺服器發送身份認證結果請求,身份認證結果請求包括加密生物特徵資訊,身份認證結果請求用於請求伺服器根據第一生物特徵資訊和第二生物特徵資訊,計算第一生物特徵資訊和第二生物特徵資訊的生物特徵對比結果相似度; Send an identity authentication result request to the server, the identity authentication result request includes encrypted biometric information, and the identity authentication result request is used to request the server to calculate the similarity of the biometric comparison result of the first biometric information and the second biometric information based on the first biometric information and the second biometric information;
接收伺服器發送的身份認證結果回饋資訊,身份認證結果回饋資訊包括被設備公開金鑰加密的生物特徵對比結果相似度; Receive the identity authentication result feedback information sent by the server, which includes the similarity of the biometric comparison result encrypted by the device's public key;
通過設備私密金鑰加密對生物特徵對比結果相似度進行解密,得到生物特徵對比結果相似度,生物特徵對比結果相似度用於表徵第一生物特徵資訊與第二生物特徵資訊的對比結果。 The biometric comparison result similarity is decrypted by encrypting the device private key to obtain the biometric comparison result similarity, which is used to represent the comparison result between the first biometric information and the second biometric information.
基於此,該步驟340具體可以包括:在生物特徵對比結果相似度 滿足預設相似度的情況下,確定待認證身份資訊的用戶身份認證成功。 Based on this, step 340 may specifically include: when the similarity of the biometric feature comparison result meets the preset similarity, determining that the user identity authentication of the identity information to be authenticated is successful.
需要說明的是,本發明實施例中的目標資訊還包括下述中的至少一項:身份證件號碼、身份證件圖像、身份證件用戶身份資訊如身份證件中的用戶姓名、性別、民族、出生日期、住址;第一生物特徵資訊包括下述中的至少一項:身份證件圖像中用戶面部圖像、與身份證件對應的用戶的虹膜圖像。 It should be noted that the target information in the embodiment of the present invention also includes at least one of the following: ID number, ID image, ID user identity information such as user name, gender, ethnicity, date of birth, address in the ID; the first biometric information includes at least one of the following: user face image in the ID image, iris image of the user corresponding to the ID.
由此,本發明實施例提出一種基於TEE和NFC的可信身份認證的資訊處理方法,可以通過TEE安全訪問NFC進行身份證件的待認證的身份資訊識讀的方式以獲取可靠可信的用於表徵用戶身份的目標資訊,以及在一些實施例中可以在可信執行環境TEE中與伺服器中運行可信身份服務平臺進行交互,以避免偽造身份證的問題,同時也避免了因拍照效果不佳造成獲取到的目標資訊不準確,提高身份認證的準確性。通過將待認證的身份資訊對應的目標資訊資料解密授權憑證遷移至TEE中,杜絕了待認證的身份資訊在電子設備和伺服器交互過程中可能被木馬病毒竊取的問題。另外,通過從TEE內安全訪問攝影機,確保用於對比認證的用戶圖像即即時的用戶圖像的源頭可信,防止注入偽造人臉照片或影片的行為。 Therefore, the embodiment of the present invention proposes an information processing method for trusted identity authentication based on TEE and NFC, which can obtain reliable and credible target information used to characterize the user's identity by securely accessing NFC through TEE to read the identity information to be authenticated of the identity document, and in some embodiments, can interact with the trusted identity service platform running in the server in the trusted execution environment TEE to avoid the problem of forged identity documents, and at the same time avoid the inaccurate target information obtained due to poor photography effects, thereby improving the accuracy of identity authentication. By migrating the target information data decryption authorization certificate corresponding to the identity information to be authenticated to the TEE, the problem that the identity information to be authenticated may be stolen by Trojan viruses during the interaction between the electronic device and the server is eliminated. In addition, by securely accessing the camera from within the TEE, the source of the user image used for comparison and authentication, i.e., the real-time user image, is ensured to be credible, preventing the injection of forged facial photos or videos.
另外,針對一些支持TEE和NFC的物聯網電子設備硬體資源嚴重受限的問題,本發明實施例利用第四代行動通訊技術(the 4th generation mobile communication technology,4G)、第五代行動通訊技術(5th generation mobile networks,5G)傳輸速率更高時延更低的特性,將NFC與二代身份證交互的命令進行了拆分,其中,通過近場通信獲取用戶的待認證身份資訊的部分在電子設備實現,主要處理身份證件APDU請求回應和交互協定,後端部分移至伺服器運行,主要負責身份證件訪問APDU指令的生成、組裝和APDU回應的處理。通過上述前後端分離處理的方式,減少了電子設備的NFC交互協定的空間占比,對於可穿戴設備等資源比較有限的物聯網終端設備,具有更強的適用性。通過電子設備的類別,確定在電子設備和伺服器確定對比結果方式,保證了身份證識讀和人臉比對功能在電子設備TEE空間資源有限的情況下的可用性和適配性。 In addition, in response to the problem of severely limited hardware resources of some IoT electronic devices that support TEE and NFC, the embodiments of the present invention utilize the characteristics of higher transmission rate and lower latency of the 4th generation mobile communication technology (4G) and the 5th generation mobile communication technology (5G) to split the commands for interaction between NFC and the second-generation identity card. Among them, the part of obtaining the user's identity information to be authenticated through near-field communication is implemented in the electronic device, which mainly processes the identity card APDU request response and interaction protocol, and the back-end part is moved to the server to run, which is mainly responsible for the generation and assembly of identity card access APDU instructions and the processing of APDU responses. Through the above-mentioned front-end and back-end separation processing method, the space proportion of the NFC interaction protocol of electronic devices is reduced, and it has stronger applicability for IoT terminal devices with limited resources such as wearable devices. By classifying electronic devices, the method of determining the comparison results between electronic devices and servers is determined, ensuring the availability and adaptability of identity recognition and face comparison functions when the space resources of electronic devices TEE are limited.
以上,採用TEE安全訪問NFC識讀用戶的待認證身份資訊的方式確保獲取的身份證資訊的資料來源真實準確,起到防偽身份證效果,同時可 信執行環境TEE防止惡意軟體截獲身份證資訊資料被替換和篡改。另外,本發明實施例是基於電子設備TEE和伺服器之間的安全閉環實現的,能夠確保資訊是密文上送可信身份認證後臺解密再以安全TEE安全通道傳送回來使用的,適用於更多的身份認證場景。 In the above, the method of using TEE to securely access NFC to read the user's identity information to be authenticated ensures that the data source of the obtained identity information is true and accurate, and plays an anti-counterfeiting effect on the identity card. At the same time, the trusted execution environment TEE prevents malicious software from intercepting the identity information and replacing and tampering with it. In addition, the embodiment of the present invention is based on the secure closed loop between the electronic device TEE and the server, which can ensure that the information is sent to the trusted identity authentication background in ciphertext for decryption and then sent back through the secure TEE secure channel for use, and is applicable to more identity authentication scenarios.
為了更好的說明上述資訊處理方法,本發明實施例結合圖1和2所示的架構對資訊處理方法進行詳細說明。下述示例可以通過圖8和圖9兩個過程對資訊處理方法進行說明,其中,圖8為本發明實施例提供的可信身份認證初始化的過程,圖9為本發明實施例提供的可信身份認證對比的過程,具體如下所示。 In order to better illustrate the above information processing method, the embodiment of the present invention is combined with the architecture shown in Figures 1 and 2 to explain the information processing method in detail. The following example can explain the information processing method through the two processes of Figures 8 and 9, wherein Figure 8 is the trusted identity authentication initialization process provided by the embodiment of the present invention, and Figure 9 is the trusted identity authentication comparison process provided by the embodiment of the present invention, as shown below.
在第三方應用程式如消費類應用程式時,第三方應用程式需事先集成可信身份認證服務SDK,並在第三方應用程式運行的電子設備上安裝可信身份認證服務控制項,以及通過該電子設備對應的可信應用管理(Trusted Application Management,TAM)安裝可信身份認證服務TA到設備TEE可信執行環境中。隨後,還需在可信身份服務平臺錄入第三方應用程式的的應用程式標識(AppId)、簽章憑證資訊和證書指紋資訊。 For third-party applications such as consumer applications, the third-party application must first integrate the trusted identity authentication service SDK, install the trusted identity authentication service control item on the electronic device where the third-party application runs, and install the trusted identity authentication service TA in the device TEE trusted execution environment through the Trusted Application Management (TAM) corresponding to the electronic device. Subsequently, the application identity (AppId), signature certificate information, and certificate fingerprint information of the third-party application must be entered into the trusted identity service platform.
如圖8所示,該資源處理方法中可信身份認證初始化的過程可以包括步驟801-步驟813,具體如下所示。 As shown in Figure 8, the process of initializing trusted identity authentication in the resource processing method may include steps 801 to 813, as shown below.
步驟801,電子設備接收用戶針對應用程式A發起的可信身份認證初始化的操作。 Step 801, the electronic device receives the trusted identity authentication initialization operation initiated by the user for application A.
步驟802,應用程式A向集成的可信身份認證服務SDK發起可信身份認證初始化請求,傳入交易要素Context上下文。這裡,交易要素詳見表4。 In step 802, application A initiates a trusted identity authentication initialization request to the integrated trusted identity authentication service SDK and passes in the transaction element Context. Here, the transaction elements are detailed in Table 4.
步驟803,可信身份認證服務SDK通過Context上下文,獲取到應用程式A的AppId、簽章憑證資訊和證書指紋資訊,調用可信身份認證服務控制項的可信身份認證初始化介面,傳入交易要素應用程式A的AppId、簽章憑證資訊和證書指紋資訊。 Step 803, the trusted identity authentication service SDK obtains the AppId, signature certificate information and certificate fingerprint information of application A through the Context context, calls the trusted identity authentication initialization interface of the trusted identity authentication service control item, and passes in the AppId, signature certificate information and certificate fingerprint information of transaction element application A.
步驟804,可信身份認證服務控制項調用可信身份認證服務TA初始化介面,傳入交易要素AppId、簽章憑證資訊和證書指紋資訊。 Step 804, the trusted identity authentication service control item calls the trusted identity authentication service TA initialization interface and inputs the transaction element AppId, signature certificate information and certificate fingerprint information.
步驟805,可信身份認證服務TA根據設備根信任證書生成一對 設備公私金鑰對。 Step 805, the trusted identity authentication service TA generates a pair of device public and private keys based on the device root trust certificate.
步驟806,可信身份認證服務TA請求可信身份服務平臺,傳入應用程式A的AppId、簽章憑證資訊和證書指紋資訊。 Step 806, the trusted identity authentication service TA requests the trusted identity service platform and inputs the AppId, signature certificate information and certificate fingerprint information of application A.
步驟807,可信身份認證服務TA中預置了可信身份服務平臺的伺服器公開金鑰。可信身份認證服務TA通過伺服器公開金鑰與可信身份服務平臺建立安全連結,使用設備公開金鑰和信身份服務平臺的伺服器公開金鑰進行工作階段金鑰協商,後續使用協商的工作階段金鑰進行交互。 Step 807, the server public key of the trusted identity service platform is preset in the trusted identity authentication service TA. The trusted identity authentication service TA establishes a secure connection with the trusted identity service platform through the server public key, uses the device public key and the server public key of the trusted identity service platform to negotiate the working stage key, and then uses the negotiated working stage key for interaction.
可信身份認證服務TA把應用程式A的AppId、簽章憑證資訊和證書指紋資訊使用工作階段金鑰加密,傳輸到可信身份服務平臺。 The trusted identity authentication service TA encrypts the AppId, signature certificate information, and certificate fingerprint information of application A using the session key and transmits them to the trusted identity service platform.
步驟808,可信身份服務平臺使用工作階段金鑰解密,驗證應用程式A的AppId、簽章憑證資訊和證書指紋資訊與事先錄入在可信身份服務平臺中的是否一致,在驗證通過時,可以向可信身份認證服務TA返回使用設備公開金鑰加密的身份鑒別平臺如共公安部下屬機構身份認證服務的目標資訊資料解密授權憑證的密文。 In step 808, the trusted identity service platform uses the working session key to decrypt and verify whether the AppId, signature certificate information and certificate fingerprint information of application A are consistent with those previously entered in the trusted identity service platform. When the verification is passed, the ciphertext of the decryption authorization certificate of the target information data encrypted by the device public key of the identity authentication service of the Ministry of Public Security can be returned to the trusted identity authentication service TA.
步驟809,可信身份認證服務TA收到響應後,驗證接收到的目標資訊資料解密授權憑證的密文所在報文的有效性。在驗證有效的情況下,通過設備私密金鑰解密身份鑒別平臺的目標資訊資料解密授權憑證的密文,保存身份鑒別平臺的目標資訊資料解密授權憑證到可信身份認證服務TA中。 Step 809, after receiving the response, the trusted identity authentication service TA verifies the validity of the message containing the ciphertext of the received target information data decryption authorization certificate. If the verification is valid, the ciphertext of the target information data decryption authorization certificate of the identity identification platform is decrypted by the device private key, and the target information data decryption authorization certificate of the identity identification platform is saved in the trusted identity authentication service TA.
步驟810,可信身份認證服務TA向可信身份認證服務控制項返回與可信身份認證初始化的操作對應的操作結果。 Step 810, the trusted identity authentication service TA returns the operation result corresponding to the trusted identity authentication initialization operation to the trusted identity authentication service control item.
步驟811,可信身份認證服務控制項向可信身份認證服務SDK返回與可信身份認證初始化的操作對應的操作結果。 Step 811, the trusted identity authentication service control returns the operation result corresponding to the trusted identity authentication initialization operation to the trusted identity authentication service SDK.
步驟812,可信身份認證服務SDK向應用程式A返回可信身份認證初始化結果。 Step 812, the trusted identity authentication service SDK returns the trusted identity authentication initialization result to application A.
步驟813,應用程式A通過電子設備向用戶展示可信身份認證初始化結果。 Step 813, application A displays the trusted identity authentication initialization result to the user through the electronic device.
基於上述完成可信身份認證初始化或者註冊後,結合圖9,對本發明實施例提供的資源處理方法中可信身份認證對比的過程進行詳細說明。 After completing the trusted identity authentication initialization or registration as described above, combined with Figure 9, the trusted identity authentication comparison process in the resource processing method provided by the embodiment of the present invention is described in detail.
如圖9所示,該資源處理方法中可信身份認證對比的過程以包括 步驟901-步驟916,具體如下所示。 As shown in Figure 9, the process of trusted identity authentication comparison in the resource processing method includes steps 901 to 916, as shown below.
步驟901,電子設備接收用戶針對應用程式A發起的可信身份認證的對比操作。 Step 901, the electronic device receives a comparison operation of a trusted identity authentication initiated by the user for application A.
步驟902,應用程式A向集成的可信身份認證服務SDK發起可信身份認證對比請求,傳入交易要素待認證身份資訊UserId如交易要素詳見圖4。 In step 902, application A initiates a trusted identity authentication comparison request to the integrated trusted identity authentication service SDK, and inputs the transaction element to be authenticated identity information UserId, as shown in Figure 4 for transaction elements.
步驟903,可信身份認證服務SDK調用可信身份認證服務控制項認證對比介面,傳入交易要素待認證身份資訊UserId。 Step 903, the trusted identity authentication service SDK calls the trusted identity authentication service control item authentication comparison interface and passes in the transaction element identity information to be authenticated UserId.
步驟904,可信身份認證服務控制項調用可信身份認證服務TA認證對比介面。 Step 904, the trusted identity authentication service control item calls the trusted identity authentication service TA authentication comparison interface.
步驟905,可信身份認證服務TA訪問設備NFC模組,以使電子設備顯示刷身份證介面。 Step 905, the trusted identity authentication service TA accesses the device NFC module to enable the electronic device to display the ID card swiping interface.
步驟906,電子設備獲取近場通信晶片中的待認證身份資訊,NFC模組將待認證身份資訊回應給可信身份認證服務TA,可信身份認證服務TA把待認證身份資訊發送到權威身份認證模組如公安部下屬機構身份認證服務平臺。 Step 906, the electronic device obtains the identity information to be authenticated in the near field communication chip, and the NFC module responds the identity information to be authenticated to the trusted identity authentication service TA, and the trusted identity authentication service TA sends the identity information to be authenticated to the authoritative identity authentication module such as the identity authentication service platform of the Ministry of Public Security.
步驟907,權威身份認證模組處理接收到的待認證身份資訊,把處理後的待認證身份資訊明文資料返回給可信身份認證服務TA。 Step 907, the authoritative identity authentication module processes the received identity information to be authenticated, and returns the processed plain text data of the identity information to be authenticated to the trusted identity authentication service TA.
步驟908,可信身份認證服務TA把權威身份認證模組的目標資訊資料解密授權憑證以及待認證身份資訊的資訊明文發送到可信身份服務平臺。 Step 908, the trusted identity authentication service TA sends the target information data decryption authorization certificate of the authoritative identity authentication module and the identity information to be authenticated in plain text to the trusted identity service platform.
步驟909,可信身份服務平臺通過權威身份認證模組得到目標資訊,目標資訊包括身份證件圖像中用戶面部圖像,使用設備公開金鑰加密後,返回給可信身份認證服務TA。 Step 909, the trusted identity service platform obtains the target information through the authoritative identity authentication module. The target information includes the user's facial image in the identity document image, which is encrypted using the device public key and returned to the trusted identity authentication service TA.
步驟910,可信身份認證服務TA安全訪問電子設備的攝影機獲取用戶圖像。 Step 910, the trusted identity authentication service TA securely accesses the camera of the electronic device to obtain the user's image.
步驟911,可信身份認證服務TA將身份證件圖像中用戶面部圖像和使用設備私密金鑰解密的用戶圖像使用對稱式金鑰密碼編譯提交給可信身份服務平臺。 Step 911, the trusted identity authentication service TA compiles the user's facial image in the identity document image and the user image decrypted using the device's private key using a symmetric key password and submits it to the trusted identity service platform.
步驟912,可信身份服務平臺使用對稱金鑰解密得到用戶圖像中 的人臉圖像,按照用戶圖像中的人臉圖像和身份證件圖像中用戶面部圖像預處理過程對比兩張圖像,返回使用設備公開金鑰加密的生物特徵對比結果相似度。 In step 912, the trusted identity service platform uses the symmetric key to decrypt the face image in the user image, compares the face image in the user image and the face image in the ID card image according to the pre-processing process, and returns the similarity of the biometric comparison result encrypted with the device public key.
步驟913,可信身份認證服務TA使用設備私密金鑰解密出生物特徵對比結果相似度,返回給可信身份認證服務控制項。 Step 913, the trusted identity authentication service TA uses the device private key to decrypt the similarity of the biometric comparison result and returns it to the trusted identity authentication service control item.
步驟914,可信身份認證服務控制項向可信身份認證服務SDK返回生物特徵對比結果相似度。 Step 914, the trusted identity authentication service control returns the similarity of the biometric comparison result to the trusted identity authentication service SDK.
步驟915,可信身份認證服務SDK向應用程式A返回生物特徵對比結果相似度。 Step 915, the trusted identity authentication service SDK returns the similarity of the biometric comparison result to application A.
步驟916,應用程式A向用戶顯示與生物特徵對比結果相似度對應的待認證身份資訊的用戶身份認證結果。 Step 916, application A displays to the user the user's identity authentication result of the identity information to be authenticated corresponding to the similarity of the biometric comparison result.
需要說明的是,基於可信身份認證服務操作的生命週期可以包括可信身份認證服務初始化功能、可信身份認證服務註冊功能、可信身份認證功能、可信身份人證對比功能和可信身份認證服務登出功能。其中,可以先進行可信身份認證服務初始化,初始化驗證通過,則可以進行可信身份認證註冊、可信身份人證對比和可信身份認證註銷操作。 It should be noted that the life cycle based on the trusted identity authentication service operation can include the trusted identity authentication service initialization function, the trusted identity authentication service registration function, the trusted identity authentication function, the trusted identity person-certificate comparison function and the trusted identity authentication service logout function. Among them, the trusted identity authentication service can be initialized first, and if the initialization verification passes, the trusted identity authentication registration, trusted identity person-certificate comparison and trusted identity authentication deregistration operations can be performed.
由此,本發明實施例提出一種基於TEE和NFC的可信身份認證的資訊處理方法,可以通過TEE安全訪問NFC進行身份證件的待認證的身份資訊識讀的方式以獲取可靠可信的用於表徵用戶身份的目標資訊,以及在一些實施例中可以在可信執行環境TEE中與伺服器中運行可信身份服務平臺進行交互,以避免偽造身份證的問題,同時也避免了因拍照效果不佳造成獲取到的目標資訊不準確,提高身份認證的準確性。通過將待認證的身份資訊對應的目標資訊資料解密授權憑證遷移至TEE中,杜絕了待認證的身份資訊在電子設備和伺服器交互過程中可能被木馬病毒竊取的問題。另外,通過從TEE內安全訪問攝影機,確保用於對比認證的用戶圖像即即時的用戶圖像的源頭可信,防止注入偽造人臉照片或影片的行為。 Therefore, the embodiment of the present invention proposes an information processing method for trusted identity authentication based on TEE and NFC, which can obtain reliable and credible target information used to characterize the user's identity by securely accessing NFC through TEE to read the identity information to be authenticated of the identity certificate, and in some embodiments, can interact with the trusted identity service platform running in the server in the trusted execution environment TEE to avoid the problem of forged identity certificates, and at the same time avoid the inaccurate target information obtained due to poor photography effects, thereby improving the accuracy of identity authentication. By migrating the target information data decryption authorization certificate corresponding to the identity information to be authenticated to the TEE, the problem that the identity information to be authenticated may be stolen by Trojan viruses during the interaction between the electronic device and the server is eliminated. In addition, by securely accessing the camera from within the TEE, the source of the user image used for comparison and authentication, i.e., the real-time user image, is ensured to be credible, preventing the injection of forged facial photos or videos.
另外,針對一些支持TEE和NFC的物聯網電子設備硬體資源嚴重受限的問題,本發明實施例利用第四代行動通訊技術(the 4th generation mobile communication technology,4G)、第五代行動通訊技術(5th generation mobile networks,5G)傳輸速率更高時延更低的特性,將NFC與二代身份證交 互的命令進行了拆分,其中,通過近場通信獲取用戶的待認證身份資訊的部分在電子設備實現,主要處理身份證件APDU請求回應和交互協定,後端部分移至伺服器運行,主要負責身份證件訪問APDU指令的生成、組裝和APDU回應的處理。通過上述前後端分離處理的方式,減少了電子設備的NFC交互協定的空間占比,對於可穿戴設備等資源比較有限的物聯網終端設備,具有更強的適用性。通過電子設備的類別,確定在電子設備和伺服器確定對比結果方式,保證了身份證識讀和人臉比對功能在電子設備TEE空間資源有限的情況下的可用性和適配性。 In addition, in view of the problem that some IoT electronic devices supporting TEE and NFC have severely limited hardware resources, the embodiment of the present invention utilizes the characteristics of higher transmission rate and lower latency of the 4th generation mobile communication technology (4G) and the 5th generation mobile communication technology (5G), and splits the commands for interaction between NFC and the second generation ID card. Among them, the part of obtaining the user's identity information to be authenticated through near field communication is implemented in the electronic device, which mainly processes the identity card APDU request response and interaction protocol, and the back-end part is moved to the server for operation, which is mainly responsible for the generation and assembly of the identity card access APDU command and the processing of the APDU response. Through the above-mentioned front-end and back-end separation processing method, the space proportion of the NFC interaction protocol of electronic devices is reduced, and it has stronger applicability for IoT terminal devices with limited resources such as wearable devices. By classifying electronic devices, the method of determining the comparison results between electronic devices and servers is determined, ensuring the availability and adaptability of identity recognition and face comparison functions when the space resources of electronic devices TEE are limited.
以上,採用TEE安全訪問NFC識讀用戶的待認證身份資訊的方式確保獲取的身份證資訊的資料來源真實準確,起到防偽身份證效果,同時可信執行環境TEE防止惡意軟體截獲身份證資訊資料被替換和篡改。另外,本發明實施例是基於電子設備TEE和伺服器之間的安全閉環實現的,能夠確保資訊是密文上送可信身份認證後臺解密再以安全TEE安全通道傳送回來使用的,適用於更多的身份認證場景。 In the above, TEE is used to securely access NFC to read the user's identity information to be authenticated to ensure that the data source of the obtained identity information is true and accurate, which plays an anti-counterfeiting effect on the identity card. At the same time, the trusted execution environment TEE prevents malicious software from intercepting the identity information and replacing and tampering with it. In addition, the embodiment of the present invention is based on the secure closed loop between the electronic device TEE and the server, which can ensure that the information is sent to the trusted identity authentication background for decryption and then sent back through the secure TEE secure channel for use, which is applicable to more identity authentication scenarios.
基於相同的發明構思,本發明還提供了一種資訊處理裝置。具體結合圖10進行詳細說明。 Based on the same inventive concept, the present invention also provides an information processing device. A detailed description is given in conjunction with FIG. 10.
圖10是根據本發明提供的基於電子設備的資訊處理裝置的一個實施例結構示意圖。 Figure 10 is a schematic diagram of the structure of an embodiment of an information processing device based on electronic equipment provided by the present invention.
在本發明一些實施例中,圖10所示裝置可以設置於如圖1所示的電子設備中。 In some embodiments of the present invention, the device shown in FIG. 10 can be arranged in the electronic device shown in FIG. 1 .
其中,如圖10所示,該資訊處理裝置100具體可以包括:
As shown in FIG10 , the
接收模組1001,用於接收對用戶身份認證的第一輸入;
獲取模組1002,用於回應於第一輸入,在可信執行環境下,通過近場通信獲取用戶的待認證身份資訊;
The
處理模組1003,用於根據用戶的待認證身份資訊,確定用於表徵用戶身份的目標資訊,目標資訊包括用戶的第一生物特徵資訊;以及,在預設時間段內獲取拍攝的用戶圖像,用戶圖像包括用戶的第二生物特徵資訊;
確定模組1004,用於基於第一生物特徵資訊與第二生物特徵資訊的對比結果,確定待認證身份資訊的用戶身份認證結果。 The determination module 1004 is used to determine the user identity authentication result of the identity information to be authenticated based on the comparison result of the first biometric information and the second biometric information.
由此,通過在可信執行環境TEE以及近場通信NFC獲取用戶的待認證身份資訊的方式,來獲取可信任的用於表徵用戶身份的目標資訊如身份證件資訊,以避免偽造身份證件的問題,同時也避免了因拍照效果不佳或者拍攝硬體不足造成獲取到的目標資訊不準確,從而導致用戶身份認證結果不正確的問題。 Therefore, by obtaining the user's identity information to be authenticated in the trusted execution environment TEE and near field communication NFC, the trusted target information used to represent the user's identity, such as identity document information, is obtained to avoid the problem of forged identity documents. At the same time, it also avoids the problem of inaccurate target information obtained due to poor photography or insufficient shooting hardware, which leads to incorrect user identity authentication results.
另外,通過在可信執行環境TEE中獲取目標資訊以及對比目標資訊中的第一生物特徵資訊和拍攝的用戶圖像中的第二生物特徵資訊,有效防止惡意軟體截獲身份證件資訊被替換和篡改的問題,同時,通過可信執行環境TEE安全訪問電子設備的攝影機,確保用於對比認證的用戶圖像的準確性,防止注入偽造人臉面部照片或影片的行為。 In addition, by obtaining target information in the trusted execution environment TEE and comparing the first biometric information in the target information with the second biometric information in the captured user image, the problem of identity document information being replaced and tampered with by malicious software can be effectively prevented. At the same time, the camera of the electronic device is securely accessed through the trusted execution environment TEE to ensure the accuracy of the user image used for comparison and authentication, and prevent the injection of forged facial photos or videos.
下面分別對本發明實施例中資訊處理裝置100進行詳細說明。
The
在本發明一些實施例中,獲取模組1002具體可以用於,回應於第一輸入,
In some embodiments of the present invention, the
在資料交互環境滿足預設交互環境、且在可信執行環境下,通過近場通信讀取近場通信晶片,獲取近場通信晶片的標籤內容以及用戶身份標識; When the data interaction environment satisfies the preset interaction environment and is in a trusted execution environment, the NFC chip is read through NFC to obtain the tag content of the NFC chip and the user identity;
基於標籤內容和用戶身份標識,生成用戶的待認證身份資訊。 Generate the user's identity information to be authenticated based on the tag content and user identity.
進一步地,資訊處理裝置100還可以包括檢測模組,用於檢測與近場通信晶片的資料交互環境,資料交互環境包括電子設備與近場通信晶片的距離值和/或在預設距離內電子設備與近場通信晶片的接觸時長;
Furthermore, the
在距離值滿足預設距離值和/或接觸市場滿足預設接觸時長時,確定資料交互環境滿足預設交互環境。 When the distance value meets the preset distance value and/or the contact market meets the preset contact duration, it is determined that the data interaction environment meets the preset interaction environment.
另外,獲取模組1002具體可以用於,
In addition, the
回應於第一輸入,在可信執行環境下,確定目標近場通信晶片,近場通信晶片與電子設備的資料交互環境滿足預設近場通訊環境; In response to the first input, in a trusted execution environment, the target near-field communication chip is determined, and the data interaction environment between the near-field communication chip and the electronic device satisfies the preset near-field communication environment;
通過近場通信晶片與應用協定資料的預設對應關係,獲取與目標近場通信晶片對應的目標應用協定資料; Through the preset correspondence between the near field communication chip and the application protocol data, the target application protocol data corresponding to the target near field communication chip is obtained;
根據目標應用協定資料,獲取用戶的待認證身份資訊。 According to the target application protocol data, obtain the user's identity information to be authenticated.
在本發明一些實施例中,本發明實施例中的處理模組1003具體可以用於,根據待認證的身份資訊,確定待認證的身份資訊的身份資訊明文資
料;
In some embodiments of the present invention, the
根據身份資訊明文資料和目標資訊資料解密授權憑證,確定第一生物特徵資訊。 Decrypt the authorization certificate based on the plain text identity information and the target information to determine the first biometric information.
進一步地,本發明實施例中資訊處理裝置100還可以包括發送模組。基於此,發送模組,用於向伺服器發送身份認證請求,身份認證請求包括待認證的身份資訊,身份認證請求用於請求伺服器對待認證的身份資訊進行解析,以得到待認證的身份資訊的身份資訊明文資料;
Furthermore, in the embodiment of the present invention, the
本發明實施例中的接收模組1001,接收伺服器發送的身份認證回饋資訊,身份認證回饋資訊包括待認證的身份資訊的身份資訊明文資料。
The
在一些可能的實施例中,本發明實施例中的發送模組還可以用於,向伺服器發送電子設備的身份標識,電子設備的電子標識用於確定電子設備是否滿足身份認證的條件; In some possible embodiments, the sending module in the embodiments of the present invention can also be used to send the identity of the electronic device to the server, and the electronic identity of the electronic device is used to determine whether the electronic device meets the conditions for identity authentication;
本發明實施例中的接收模組1001還用於,接收伺服器發送的身份標識回饋資訊;
The
本發明實施例中的發送模組還可以用於,在身份標識回饋資訊表徵電子設備未滿足身份認證的條件下,向伺服器發送身份認證請求。 The sending module in the embodiment of the present invention can also be used to send an identity authentication request to the server when the identity feedback information indicates that the electronic device does not meet the identity authentication conditions.
在一些可能的實施例中,本發明實施例中資訊處理裝置100還可以包括生成模組,用於根據電子設備中的數位憑證,生成設備公私金鑰對;基於此,本發明實施例中的發送模組還可以用於,通過可信身份認證初始化介面向伺服器發送用戶身份認證初始化請求,用戶身份認證初始化請求包括設備公私金鑰對,用戶身份認證初始化請求用於與伺服器建立安全通訊連結,並通過安全通訊連結進行金鑰交換;本發明實施例中的接收模組1001還用於,接收伺服器的用戶身份認證初始化回饋資訊,用戶身份認證初始化回饋資訊包括目標資訊資料解密授權憑證。
In some possible embodiments, the
在一些可能的實施例中,本發明實施例中的獲取模組還可以用於,基於伺服器公開金鑰,獲取與伺服器對應的可信身份認證初始化介面。 In some possible embodiments, the acquisition module in the embodiment of the present invention can also be used to obtain a trusted identity authentication initialization interface corresponding to the server based on the server public key.
本發明實施例中的用戶身份認證初始化請求還包括應用程式資訊,應用程式資訊包括下述中的至少一種:應用程式標識、簽章憑證資訊和證書指紋資訊,其中,應用程式資訊用於確定待認證身份資訊的用戶身份認證結果的 執行環境。 The user identity authentication initialization request in the embodiment of the present invention also includes application information, and the application information includes at least one of the following: application identification, signature certificate information and certificate fingerprint information, wherein the application information is used to determine the execution environment of the user identity authentication result of the identity information to be authenticated.
在一些可能的實施例中,本發明實施例中的處理模組1003具體可以用於向伺服器發送生物特徵資訊請求,生物特徵資訊請求包括身份資訊明文資料和目標資訊資料解密授權憑證,生物特徵資訊請求用於請求伺服器基於身份資訊明文資料和目標資訊資料解密授權憑證,確定第一生物特徵資訊;
In some possible embodiments, the
接收伺服器發送的生物特徵回饋資訊,生物特徵回饋資訊包括被設備公開金鑰加密的第一生物特徵資訊。 Receive biometric feedback information sent by the server, which includes the first biometric information encrypted by the device's public key.
在一些可能的實施例中,本發明實施例中資訊處理裝置100還可以包括顯示模組,用於顯示固定人像位置區域,固定人像位置區域用於獲取用戶與固定人像位置區域對應的人體部位圖像。本發明實施例中的獲取模組1002具體可以用於,在接收到用戶拍攝圖像的第二輸入時,通過固定位置區域獲取待處理的人體部位圖像;本發明實施例中的處理模組1003具體可以用於,對待處理的人體部位圖像進行灰度歸一化處理,得到用戶圖像。
In some possible embodiments, the
其中,本發明實施例中的獲取模組1002具體可以用於,通過固定位置區域,從人體部位中的多個特徵點篩選目標特徵點;
Among them, the
根據目標特徵點,獲取與目標特徵點對應的人體部位圖像。 According to the target feature points, the image of the human body part corresponding to the target feature points is obtained.
本發明實施例中的處理模組1003具體可以用於,獲取待處理的人體部位圖像的第一灰度值,第一灰度值與第一灰度級對應;
The
根據第一灰度級通過灰度拉伸,調整待處理的人體部位圖像,得到具有第一灰度級的用戶圖像。 According to the first grayscale, the human body part image to be processed is adjusted by grayscale stretching to obtain a user image with the first grayscale.
在一些可能的實施例中,本發明實施例中的確定模組1004具體可以用於,在第一生物特徵資訊包括身份證件圖像的情況下,通過幾何歸一化對比身份證件圖像和用戶圖像,得到第一生物特徵資訊與第二生物特徵資訊的對比結果。 In some possible embodiments, the determination module 1004 in the embodiment of the present invention can be specifically used to obtain the comparison result of the first biometric information and the second biometric information by geometrically normalizing and comparing the identity document image and the user image when the first biometric information includes an identity document image.
其中,本發明實施例中的確定模組1004具體可以用於,識別身份證件圖像中的用戶面部區域,得到與用戶面部區域對應的用戶面部圖像; Among them, the determination module 1004 in the embodiment of the present invention can be specifically used to identify the user's facial area in the identity document image and obtain the user's facial image corresponding to the user's facial area;
對用戶面部圖像或者用戶圖像中的面部區域進行等比放大或者縮小,並計算用戶圖像和用戶面部圖像的特徵值; Enlarge or reduce the user's facial image or the facial area in the user's image in equal proportion, and calculate the feature values of the user's image and the user's facial image;
根據至少一個特徵值,得到第一生物特徵資訊與第二生物特徵資 訊的對比結果。 Based on at least one eigenvalue, a comparison result between the first biometric information and the second biometric information is obtained.
進一步地,本發明實施例中的確定模組1004具體可以用於,將至少一個特徵值輸入到目標身份證件人像特徵模型中,得到第一生物特徵資訊與第二生物特徵資訊的對比結果。 Furthermore, the determination module 1004 in the embodiment of the present invention can be specifically used to input at least one feature value into the target identity document portrait feature model to obtain the comparison result of the first biometric feature information and the second biometric feature information.
在一些可能的實施例中,本發明實施例中資訊處理裝置100還可以包括簡化模組,用於根據目標身份證件中用戶面部圖像的訓練特徵值,對預設身份證件人像特徵模型進行簡化,得到目標身份證件人像特徵模型。本發明實施例中資訊處理裝置100還可以包括加密模組,用於通過對稱金鑰對第一生物特徵資訊和第二生物特徵資訊進行加密,得到加密生物特徵資訊;
In some possible embodiments, the
本發明實施例中的發送模組還用於,向伺服器發送身份認證結果請求,身份認證結果請求包括加密生物特徵資訊,身份認證結果請求用於請求伺服器根據第一生物特徵資訊和第二生物特徵資訊,計算第一生物特徵資訊和第二生物特徵資訊的生物特徵對比結果相似度; The sending module in the embodiment of the present invention is also used to send an identity authentication result request to the server, the identity authentication result request includes encrypted biometric information, and the identity authentication result request is used to request the server to calculate the similarity of the biometric comparison result of the first biometric information and the second biometric information based on the first biometric information and the second biometric information;
本發明實施例中的接收模組1001還用於,接收伺服器發送的身份認證結果回饋資訊,身份認證結果回饋資訊包括被設備公開金鑰加密的生物特徵對比結果相似度;
The
本發明實施例中的處理模組1003還用於,通過設備私密金鑰加密對生物特徵對比結果相似度進行解密,得到生物特徵對比結果相似度,生物特徵對比結果相似度用於表徵第一生物特徵資訊與第二生物特徵資訊的對比結果。
The
在一些可能的實施例中,本發明實施例中的確定模組1004具體可以用於,在生物特徵對比結果相似度滿足預設相似度的情況下,確定待認證身份資訊的用戶身份認證成功。 In some possible embodiments, the determination module 1004 in the embodiment of the present invention can be specifically used to determine that the user identity authentication of the identity information to be authenticated is successful when the similarity of the biometric comparison result meets the preset similarity.
需要說明的是,上述涉及的目標資訊還包括下述中的至少一項:身份證件號碼、身份證件圖像;第一生物特徵資訊包括下述中的至少一項:身份證件圖像中用戶面部圖像、與身份證件對應的用戶的虹膜圖像。 It should be noted that the target information mentioned above also includes at least one of the following: ID number, ID image; the first biometric information includes at least one of the following: the user's facial image in the ID image, the user's iris image corresponding to the ID.
由此,通過在可信執行環境TEE以及近場通信NFC獲取用戶的待認證身份資訊的方式,來獲取可信任的用於表徵用戶身份的目標資訊如身份證件資訊,以避免偽造身份證件的問題,同時也避免了因拍照效果不佳或者拍 攝硬體不足造成獲取到的目標資訊不準確,從而導致用戶身份認證結果不正確的問題。 Therefore, by obtaining the user's identity information to be authenticated in the trusted execution environment TEE and near field communication NFC, the trusted target information used to represent the user's identity, such as identity document information, is obtained to avoid the problem of forged identity documents. At the same time, it also avoids the problem of inaccurate target information obtained due to poor photography or insufficient shooting hardware, which leads to incorrect user identity authentication results.
另外,通過在可信執行環境TEE中獲取目標資訊以及對比目標資訊中的第一生物特徵資訊和拍攝的用戶圖像中的第二生物特徵資訊,有效防止惡意軟體截獲身份證件資訊被替換和篡改的問題,同時,通過可信執行環境TEE安全訪問電子設備的攝影機,確保用於對比認證的用戶圖像的準確性,防止注入偽造人臉面部照片或影片的行為。 In addition, by obtaining target information in the trusted execution environment TEE and comparing the first biometric information in the target information with the second biometric information in the captured user image, the problem of identity document information being replaced and tampered with by malicious software can be effectively prevented. At the same time, the camera of the electronic device is securely accessed through the trusted execution environment TEE to ensure the accuracy of the user image used for comparison and authentication, and prevent the injection of forged facial photos or videos.
需要說明的是,圖10所示的資訊處理裝置100可以執行圖1-圖9所示的資訊處理方法實施例中的各個步驟,並且實現圖1-圖9所示的方法實施例中的各個過程和效果,在此不做贅述。
It should be noted that the
基於相同的發明構思,本發明還提供了一種基於電子設備如可穿戴式設備、智慧門鎖等無法承載計算量較大的資訊處理設備。具體結合圖11進行詳細說明。 Based on the same invention concept, the present invention also provides an information processing device based on electronic devices such as wearable devices and smart door locks that cannot bear large amounts of computing. Detailed description is given in conjunction with Figure 11.
圖11是根據本發明提供的基於電子設備的資訊處理裝置的另一個實施例結構示意圖。 Figure 11 is a schematic diagram of another embodiment of the information processing device based on electronic equipment provided by the present invention.
在本發明一些實施例中,圖11所示裝置可以設置於可穿戴式設備、智慧門鎖等無法承載計算量較大的資訊處理設備中。 In some embodiments of the present invention, the device shown in FIG. 11 can be installed in wearable devices, smart door locks, and other information processing devices that cannot bear large amounts of computation.
其中,如圖11所示,該資訊處理裝置1100具體可以包括:
As shown in FIG11 , the
接收模組1110,用於接收對用戶身份認證的第一輸入;
獲取模組1120,用於回應於第一輸入,在可信執行環境下,通過近場通信獲取用戶的待認證身份資訊;
The
發送模組1130,用於向伺服器發送用戶的待認證身份資訊,用戶的待認證身份資訊用於確定待認證身份資訊的用戶身份認證結果;
The sending
發送模組1130還用於,在預設時間段內獲取用戶圖像,並向伺服器發送用戶圖像,用戶圖像用於與用戶的待認證身份進行對比,以確定用戶身份認證結果;
The sending
接收模組1110還用於,接收伺服器發送的待認證身份資訊的用戶身份認證結果。
The
此外,本發明實施例提供的獲取模組1120具體用於,在可信執
行環境下,通過執行協定資料指令集中近場通訊的指令,獲取用戶的待認證身份資訊;其中,近場通訊的指令由伺服器確定。
In addition, the
基於相同的發明構思,本發明還提供了一種伺服器。具體結合圖12進行詳細說明。 Based on the same invention concept, the present invention also provides a server. It is specifically described in detail with reference to FIG. 12.
圖12是根據本發明提供的基於伺服器的資訊處理裝置的一個實施例結構示意圖。 Figure 12 is a schematic diagram of the structure of an embodiment of the information processing device based on the server provided by the present invention.
在本發明一些實施例中,如圖12所示,該資訊處理裝置1200具體可以包括:
In some embodiments of the present invention, as shown in FIG. 12 , the
接收模組1210,用於接收電子設備發送的用戶的待認證身份資訊;
獲取模組1220,用於在檢測到用戶的待認證身份資訊用於確定待認證身份資訊的用戶身份認證結果時,獲取與用戶的待認證身份資訊對應且用於表徵用戶身份的目標資訊,目標資訊包括用戶的第一生物特徵資訊;
The
接收模組1210還用於,接收電子設備發送的用戶圖像;
The
確定模組1230,用於基於第一生物特徵資訊與用戶圖像中的第二生物特徵資訊的對比結果,確定待認證身份資訊的用戶身份認證結果;
發送模組1240還用於,向電子設備發送用戶身份認證結果。
The sending
其中,本發明實施例中的獲取模組1220具體用於,根據待認證身份資訊的密文資訊,確定協定資料指令,協定資料指令用於指示按照身份證件屬性格式拼接組裝成的用於表徵用戶身份的目標資訊的原文字串;
Among them, the
根據預存的目標資訊資料解密授權憑證以及目標資訊的原文字串,對待認證的身份資訊進行解密,得到目標資訊。 According to the pre-stored target information data, the authorization certificate and the original text string of the target information are decrypted, and the identity information to be authenticated is decrypted to obtain the target information.
進一步地,發送模組1230還可以用於,向身份鑒別伺服器發送協定資料指令,協定資料指令用於指示身份鑒別伺服器按照身份證件屬性格式拼接組裝成的用於表徵用戶身份的目標資訊的原文字串;基於此,接收模組1210還可以用於,接收身份鑒別伺服器發送的目標資訊的原文字串。
Furthermore, the sending
基於相同的發明構思,本發明還提供了一種資訊處理設備。具體結合圖13進行詳細說明。 Based on the same inventive concept, the present invention also provides an information processing device. Detailed description is given in conjunction with FIG. 13.
圖13示出了本發明實施例提供的資訊處理設備的硬體結構示意 圖。 FIG13 shows a schematic diagram of the hardware structure of the information processing device provided by the embodiment of the present invention.
如圖13所示,該資訊處理1300可以包括本發明實施例中涉及的電子設備或者伺服器。其中,該資訊處理1300可以包括處理器1301以及存儲有電腦程式指令的記憶體1302。
As shown in FIG. 13 , the information processing 1300 may include an electronic device or server involved in an embodiment of the present invention. The information processing 1300 may include a
具體地,上述處理器1301可以包括中央處理器(Central Processing Unit,CPU),或者特定應用積體電路(Application Specific Integrated Circuit,ASIC),或者可以被配置成實施本發明實施例的一個或多個積體電路。
Specifically, the
記憶體1302可以包括用於資料或指令的大容量儲存器。舉例來說而非限制,記憶體1302可包括硬碟驅動器(Hard Disk Drive,HDD)、軟碟機、快閃記憶體、光碟、磁光碟、磁帶或通用序列匯流排(Universal Serial Bus,USB)驅動器或者兩個或更多個以上這些的組合。在合適的情況下,記憶體1302可包括可移除或不可移除(或固定)的介質。在合適的情況下,記憶體1302可在綜合閘道容災設備的內部或外部。在特定實施例中,記憶體1302是非易失性固態記憶體。在特定實施例中,記憶體1302包括唯讀記憶體(Read-Only Memory,ROM)。在合適的情況下,該ROM可以是掩模程式設計的ROM、可程式唯讀記憶體(Programmable Read-Only Memory,PROM)、可擦除可程式唯讀記憶體(Erasable Programmable Read-Only Memory,EPROM)、電可擦除可程式唯讀記憶體(Electrically Erasable Programmable Read Only Memory,EEPROM)、電可改寫唯讀記憶體(Electrically Alterable Read-Only Memory,EAROM)或快閃記憶體或者兩個或更多個以上這些的組合。
The
處理器1301通過讀取並執行記憶體1302中存儲的電腦程式指令,以實現上述實施例中的任意一種資訊處理方法。
The
在一個示例中,資料處理設備還可包括通信介面1303和匯流排1310。其中,如圖13所示,處理器1301、記憶體1302、通信介面1303通過匯流排1310連接並完成相互間的通信。
In one example, the data processing device may also include a
通信介面1303,主要用於實現本發明實施例中各模組、裝置、單元和/或設備之間的通信。
The
匯流排1310包括硬體、軟體或兩者,將流量控制設備的部件彼 此耦接在一起。舉例來說而非限制,匯流排可包括加速圖形連接埠(Accelerated Graphics Port,AGP)或其他圖形匯流排、增強工業標準架構(Enhanced Industry Standard Architecture,EISA)匯流排、前側匯流排(Front Side Bus,FSB)、超傳送標準(Hyper Transport,HT)互連、工業標準架構(Industry Standard Architecture,ISA)匯流排、無限頻寬互連、低引腳數(Low pin count,LPC)匯流排、記憶體匯流排、微通道架構(Micro Channel Architecture,MCA)匯流排、週邊組件互連(Peripheral Component Interconnect,PCI)匯流排、週邊組件互連延伸(Peripheral Component Interconnect Extended,PCI-E)匯流排、序列先進技術附件(Serial Advanced Technology Attachment,SATA)匯流排、視訊電子標準協會區域(Video Electronics Standards Association Local Bus,VLB)匯流排或其他合適的匯流排或者兩個或更多個以上這些的組合。在合適的情況下,匯流排1310可包括一個或多個匯流排。儘管本發明實施例描述和示出了特定的匯流排,但本發明考慮任何合適的匯流排或互連。 Bus 1310 includes hardware, software, or both, coupling components of the flow control device to each other. By way of example and not limitation, a bus may include an Accelerated Graphics Port (AGP) or other graphics bus, an Enhanced Industry Standard Architecture (EISA) bus, a Front Side Bus (FSB), a Hyper Transport (HT) interconnect, an Industry Standard Architecture (ISA) bus, an InfiniBand interconnect, a Low Pin Count (LPC) bus, a memory bus, a Micro Channel Architecture (MCA) bus, a Peripheral Component Interconnect (PCI) bus, a Peripheral Component Interconnect Extension (PCI) bus, and a 10-bit 4K (100-bit) bus. The bus 1310 may include a PCI-Extended (PCI-E) bus, a Serial Advanced Technology Attachment (SATA) bus, a Video Electronics Standards Association Local Bus (VLB) bus, or other suitable bus or a combination of two or more of the above. Where appropriate, bus 1310 may include one or more buses. Although the embodiments of the present invention describe and illustrate specific buses, the present invention contemplates any suitable bus or interconnect.
該資料處理設備可以執行本發明實施例中的資訊處理方法,從而實現結合圖1至圖10描述的資訊處理方法和裝置。 The data processing device can execute the information processing method in the embodiment of the present invention, thereby realizing the information processing method and device described in conjunction with Figures 1 to 10.
另外,結合上述實施例中的資訊處理方法,本發明實施例可提供一種電腦可讀存儲介質來實現。該電腦可讀存儲介質上存儲有電腦程式指令;該電腦程式指令被處理器執行時實現上述實施例中的任意一種資訊處理方法。 In addition, in combination with the information processing method in the above embodiments, the embodiments of the present invention can provide a computer-readable storage medium for implementation. The computer-readable storage medium stores computer program instructions; when the computer program instructions are executed by the processor, any one of the information processing methods in the above embodiments is implemented.
需要明確的是,本發明並不局限於上文所描述並在圖中示出的特定配置和處理。為了簡明起見,這裡省略了對已知方法的詳細描述。在上述實施例中,描述和示出了若干具體的步驟作為示例。但是,本發明的方法過程並不限於所描述和示出的具體步驟,本領域的技術人員可以在領會本發明的精神後,作出各種改變、修改和添加,或者改變步驟之間的順序。 It should be made clear that the present invention is not limited to the specific configuration and processing described above and shown in the figure. For the sake of simplicity, the detailed description of the known method is omitted here. In the above embodiments, several specific steps are described and shown as examples. However, the method process of the present invention is not limited to the specific steps described and shown, and technicians in this field can make various changes, modifications and additions, or change the order between the steps after understanding the spirit of the present invention.
以上的結構框圖中所示的功能塊可以實現為硬體、軟體、固件或者它們的組合。當以硬體方式實現時,其可以例如是電子電路、特定應用積體電路(ASIC)、適當的固件、外掛程式、功能卡等等。當以軟體方式實現時,本發明的元素是被用於執行所需任務的程式或者程式碼片段。程式或者程式碼片段可以存儲在機器可讀介質中,或者通過載波中攜帶的資料信號在傳輸介質 或者通信鏈路上傳送。“機器可讀介質”可以包括能夠存儲或傳輸資訊的任何介質。機器可讀介質的例子包括電子電路、半導體記憶體設備、ROM、快閃記憶體、可擦除唯讀記憶體(Erasable Read-Only Memory,EROM)、軟碟、光碟唯讀記憶體(Compact Disc Read-Only Memory,CD-ROM)、光碟、硬碟、光纖介質、射頻(Radio Frequency,RF)鏈路,等等。程式碼片段可以經由諸如網際網路、內聯網等的電腦網路被下載。 The functional blocks shown in the above structural block diagram can be implemented as hardware, software, firmware or a combination thereof. When implemented in hardware, it can be, for example, an electronic circuit, an application-specific integrated circuit (ASIC), appropriate firmware, a plug-in, a function card, etc. When implemented in software, the elements of the present invention are programs or program code snippets used to perform the required tasks. The program or program code snippet can be stored in a machine-readable medium, or transmitted on a transmission medium or a communication link through a data signal carried in a carrier. "Machine-readable medium" can include any medium that can store or transmit information. Examples of machine-readable media include electronic circuits, semiconductor memory devices, ROM, flash memory, erasable read-only memory (EROM), floppy disks, compact disc read-only memory (CD-ROM), optical disks, hard disks, optical fiber media, radio frequency (RF) links, etc. The code snippet can be downloaded via a computer network such as the Internet, an intranet, etc.
還需要說明的是,本發明中提及的示例性實施例,基於一系列的步驟或者裝置描述一些方法或系統。但是,本發明不局限於上述步驟的順序,也就是說,可以按照實施例中提及的循序執行步驟,也可以不同於實施例中的順序,或者若干步驟同時執行。 It should also be noted that the exemplary embodiments mentioned in the present invention describe some methods or systems based on a series of steps or devices. However, the present invention is not limited to the order of the above steps, that is, the steps can be executed in the order mentioned in the embodiments, or in a different order from the embodiments, or several steps can be executed simultaneously.
以上,僅為本發明的具體實施方式,所屬領域的技術人員可以清楚地瞭解到,為了描述的方便和簡潔,上述描述的系統、模組和單元的具體工作過程,可以參考前述方法實施例中的對應過程,在此不再贅述。應理解,本發明的保護範圍並不局限於此,任何熟悉本技術領域的技術人員在本發明揭露的技術範圍內,可輕易想到各種等效的修改或替換,這些修改或替換都應涵蓋在本發明的保護範圍之內。 The above is only a specific implementation of the present invention. The technical personnel in the relevant field can clearly understand that for the convenience and simplicity of description, the specific working process of the system, module and unit described above can refer to the corresponding process in the aforementioned method embodiment, and will not be repeated here. It should be understood that the protection scope of the present invention is not limited to this. Any technical personnel familiar with the technical field can easily think of various equivalent modifications or replacements within the technical scope disclosed by the present invention, and these modifications or replacements should be covered within the protection scope of the present invention.
510,520,530,540:步驟 510,520,530,540: Steps
Claims (26)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110179442.7 | 2021-02-09 | ||
CN202110179442.7A CN112819475B (en) | 2021-02-09 | 2021-02-09 | Information processing method, device, electronic device, server and medium |
Publications (2)
Publication Number | Publication Date |
---|---|
TW202232407A TW202232407A (en) | 2022-08-16 |
TWI859481B true TWI859481B (en) | 2024-10-21 |
Family
ID=75864920
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW110142442A TWI859481B (en) | 2021-02-09 | 2021-11-15 | Information processing method, device, electronic equipment, server and medium |
Country Status (3)
Country | Link |
---|---|
CN (1) | CN112819475B (en) |
TW (1) | TWI859481B (en) |
WO (1) | WO2022170759A1 (en) |
Families Citing this family (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP4221279A1 (en) | 2020-01-27 | 2023-08-02 | Apple Inc. | Mobile key enrollment and use |
US11206544B2 (en) | 2020-04-13 | 2021-12-21 | Apple Inc. | Checkpoint identity verification on validation using mobile identification credential |
US12311880B2 (en) | 2020-11-05 | 2025-05-27 | Apple Inc. | Mobile key user interfaces |
CN112819475B (en) * | 2021-02-09 | 2024-08-16 | 中国银联股份有限公司 | Information processing method, device, electronic device, server and medium |
CN118796327A (en) * | 2021-06-06 | 2024-10-18 | 苹果公司 | Digital ID Credentials User Interface |
CN113743930A (en) * | 2021-09-18 | 2021-12-03 | 中国银行股份有限公司 | Transaction processing method and device |
US12277205B2 (en) | 2021-09-20 | 2025-04-15 | Apple Inc. | User interfaces for digital identification |
CN113946812A (en) * | 2021-09-29 | 2022-01-18 | 北京达佳互联信息技术有限公司 | Identity authentication method and device, electronic equipment and storage medium |
CN113645045B (en) * | 2021-10-13 | 2022-01-04 | 北京创米智汇物联科技有限公司 | Security control method, device and equipment in TEE and storage medium |
CN114584970B (en) * | 2022-02-14 | 2025-07-08 | 青岛智芯半导体科技有限公司 | Communication authentication method, subscription verification method, and communication method |
CN115099814B (en) * | 2022-06-13 | 2024-08-02 | 马上消费金融股份有限公司 | Information processing method, device, equipment and storage medium |
CN115208704B (en) * | 2022-09-16 | 2023-01-13 | 欣诚信息技术有限公司 | Identity authentication system and political service application system |
CN115514549A (en) * | 2022-09-16 | 2022-12-23 | 国网信息通信产业集团有限公司 | Secure interaction method and system based on SSL (secure sockets layer) protocol |
CN115811403A (en) * | 2022-11-21 | 2023-03-17 | 航天信息股份有限公司 | Identity authentication method, system, electronic device and storage medium |
CN117915005B (en) * | 2023-10-19 | 2025-02-07 | 广州翼拍联盟网络技术有限公司 | Multifunctional acquisition device, data acquisition system, method and related equipment |
CN118194265B (en) * | 2024-05-13 | 2024-10-15 | 湖南三湘银行股份有限公司 | NFC-based method for rapidly identifying and collecting identity information |
CN119011274B (en) * | 2024-09-06 | 2025-05-13 | 乐研科技(苏州)有限公司 | Protection method for network security of micro-grid system and related equipment |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101447110A (en) * | 2004-04-09 | 2009-06-03 | 冲电气工业株式会社 | Identification system using face authentication |
CN105871867A (en) * | 2016-04-27 | 2016-08-17 | 腾讯科技(深圳)有限公司 | Identity authentication method, system and equipment |
CN109840405A (en) * | 2017-11-29 | 2019-06-04 | 上海荆虹电子科技有限公司 | A kind of identification authentication system and its application method |
TWI668986B (en) * | 2017-12-28 | 2019-08-11 | 李耀庭 | Private key processing method for electronic wallet |
CN110210855A (en) * | 2019-05-08 | 2019-09-06 | 北京大学 | Hardware wallet illegal method and system based on biological identification technology |
TW202038140A (en) * | 2019-02-28 | 2020-10-16 | 瑞士商西克帕控股有限公司 | Verifiable access credential |
CN111831995A (en) * | 2020-09-08 | 2020-10-27 | 杭州海宴科技有限公司 | Trusted identity authentication method and system based on eID and human body biological information |
TW202046202A (en) * | 2019-06-04 | 2020-12-16 | 墨攻網路科技股份有限公司 | Trusted ticket transaction management system for prepaid commodities and implementation method thereof can provide the management of prepaid commodities and the functions of transaction, verification, funding and refund of trusted notes corresponding to prepaid commodities |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103001773B (en) * | 2012-11-28 | 2015-07-01 | 鹤山世达光电科技有限公司 | Fingerprint authentication system and fingerprint authentication method based on near field communication (NFC) |
CN105187217A (en) * | 2015-09-16 | 2015-12-23 | 成都三零凯天通信实业有限公司 | Dual-factor identity authentication method and apparatus thereof |
CN107682545B (en) * | 2017-09-28 | 2023-04-21 | 山西特信环宇信息技术有限公司 | A mobile phone terminal system based on biometric technology |
CN108833359A (en) * | 2018-05-22 | 2018-11-16 | 深圳市商汤科技有限公司 | Auth method, device, equipment, storage medium and program |
CN108462725B (en) * | 2018-05-29 | 2023-08-01 | 北京华大智宝电子系统有限公司 | Electronic signature device, identity verification method and system |
CN109325332A (en) * | 2018-09-17 | 2019-02-12 | 北京旷视科技有限公司 | Testimony of a witness checking method, server, backstage and system |
CN112819475B (en) * | 2021-02-09 | 2024-08-16 | 中国银联股份有限公司 | Information processing method, device, electronic device, server and medium |
-
2021
- 2021-02-09 CN CN202110179442.7A patent/CN112819475B/en active Active
- 2021-09-08 WO PCT/CN2021/117232 patent/WO2022170759A1/en active Application Filing
- 2021-11-15 TW TW110142442A patent/TWI859481B/en active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101447110A (en) * | 2004-04-09 | 2009-06-03 | 冲电气工业株式会社 | Identification system using face authentication |
CN105871867A (en) * | 2016-04-27 | 2016-08-17 | 腾讯科技(深圳)有限公司 | Identity authentication method, system and equipment |
CN109840405A (en) * | 2017-11-29 | 2019-06-04 | 上海荆虹电子科技有限公司 | A kind of identification authentication system and its application method |
TWI668986B (en) * | 2017-12-28 | 2019-08-11 | 李耀庭 | Private key processing method for electronic wallet |
TW202038140A (en) * | 2019-02-28 | 2020-10-16 | 瑞士商西克帕控股有限公司 | Verifiable access credential |
CN110210855A (en) * | 2019-05-08 | 2019-09-06 | 北京大学 | Hardware wallet illegal method and system based on biological identification technology |
TW202046202A (en) * | 2019-06-04 | 2020-12-16 | 墨攻網路科技股份有限公司 | Trusted ticket transaction management system for prepaid commodities and implementation method thereof can provide the management of prepaid commodities and the functions of transaction, verification, funding and refund of trusted notes corresponding to prepaid commodities |
CN111831995A (en) * | 2020-09-08 | 2020-10-27 | 杭州海宴科技有限公司 | Trusted identity authentication method and system based on eID and human body biological information |
Also Published As
Publication number | Publication date |
---|---|
CN112819475A (en) | 2021-05-18 |
WO2022170759A1 (en) | 2022-08-18 |
CN112819475B (en) | 2024-08-16 |
TW202232407A (en) | 2022-08-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI859481B (en) | Information processing method, device, electronic equipment, server and medium | |
JP7603121B2 (en) | Secure Key Storage Extensions for Transaction Verification and Cryptocurrencies | |
US12022282B2 (en) | Anonymous authentication and remote wireless token access | |
JP7308180B2 (en) | Advanced authentication technology and its application | |
KR102720092B1 (en) | Systems and methods for binding verifiable claims | |
KR102450025B1 (en) | Encryption Methods and Systems | |
KR102431834B1 (en) | System and method for carrying strong authentication events over different channels | |
US8966268B2 (en) | Strong authentication token with visual output of PKI signatures | |
US20160314462A1 (en) | System and method for authentication using quick response code | |
KR20180016235A (en) | Authentication techniques including speech and/or lip movement analysis | |
JP2023139259A (en) | Image collection device, server, encryption method, and decryption method | |
EP3443501B1 (en) | Account access | |
TWI725443B (en) | Method of registration and access control of identity for third-party certification | |
KR101625065B1 (en) | User authentification method in mobile terminal | |
Zhou et al. | Beware of your screen: Anonymous fingerprinting of device screens for off-line payment protection | |
HK40050130A (en) | Information processing method and device, electronic equipment, server and medium | |
TW202134911A (en) | Certification Method | |
HK40033415A (en) | Extending a secure key storage for transaction confirmation and cryptocurrency | |
HK40033287A (en) | Advanced authentication techniques and applications | |
HK1219326B (en) | Advanced authentication techniques and applications |