CN105260640B - A kind of evidence-obtaining system and method based on finger print identifying and GPS - Google Patents
A kind of evidence-obtaining system and method based on finger print identifying and GPS Download PDFInfo
- Publication number
- CN105260640B CN105260640B CN201510712583.5A CN201510712583A CN105260640B CN 105260640 B CN105260640 B CN 105260640B CN 201510712583 A CN201510712583 A CN 201510712583A CN 105260640 B CN105260640 B CN 105260640B
- Authority
- CN
- China
- Prior art keywords
- information
- evidence
- finger print
- module
- fingerprint
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Abstract
The invention discloses a kind of evidence-obtaining system and method based on finger print identifying and GPS, this method allows evidence obtaining personnel to combine by the Hash result generated to electronic evidence and generates time, operator's information, record fingerprint and GPS positioning information as authority, secondary fixation is carried out by electronic data of the Encryption Algorithm to evidence obtaining, realizes not revisable verification.Realize the secondary modification for preventing electronic data, the verification of master electronic data, the functions such as batch electronic data similitude matching.
Description
Technical field
The present invention relates to a kind of evidence-obtaining system and method based on finger print identifying and GPS, belongs to field of information security technology.
Technical background
With the continuous development of computer technology, the diversification and electronics crime case of current information means of crime are created
Several continuous risings.To successfully track down these Information Crimes, key is how effectively and accurately to collect electronic evidence.Evidence
Power, that is, evidence legitimacy, the science of the integrality of primitiveness, electronic evidence including evidence, means of collecting evidence, and evidence obtaining people
The characteristics such as reproducible of member's operation.During electronic data evidence obtaining, electronic data is possible to be distorted by intentional or unintentional,
This will destroy electronic data as the credibility of evidence.It needs to fix electronic evidence.Traditional method is to pass through number
Signature and eye-witness sign to guarantee the inspection of the scene of a crime and investigate the true integrality of obtained electronic evidence.Currently, the U.S. is
Detailed requirement is worked out for evidence canned software and hardware, to using forensic tools to propose very high standard and to taking
Stringent specification has all been worked out in the industry behavior of witness person.
There is comparable particularity in view of electronic evidence, when collecting electronic evidence, electricity need to be used by evidence obtaining personnel first
Brain is stored and is checked for electronic data.When finding data, evidence obtaining personnel should be carried out by every tool in computer
Observe and confirm the creation time of electronic data and the correctness of electronic data.Then evidence obtaining personnel open electronic data, confirmation
After the evidence to be collected of this electronic data, extracted and fixed generating electronic evidence using corresponding mode.It is searching
It, should be using profession in the collection of electronic evidence for the primitiveness, authenticity, legitimacy for ensuring electronic evidence during evidence
Data copy backup equipment by electronic evidence file copy backup, it is desirable that the equipment of electronic evidence copy need to have disposable reading
The abilities such as write.
Evidence obtaining personnel collect evidence according to regular survey on implementation in actual operation, guarantee the probative value of digital evidence.Electronics
The probative value of data includes::
1) primitiveness.The proof of primitiveness is completed by accepting as unavoidable mode, presumption mode and identification mode;
2) integrality.The important behaviour of electronic data proof, the integrality and computer system of electronic data itself
Integrality.
3) science for means of collecting evidence.The method that uses when implementing electronic evidence-collecting, check process meet the principles of science.It wants
It asks using regular software, detection of the software and hardware that when evidence obtaining uses Jing Guo scientific method is investigated on the spot, check process can be stood
Test.
4) reproducible characteristic is operated.The authenticity and integrity of electronic evidence require evidence obtaining operation should be it is reproducible,
Require what evidence obtaining personnel answered detailed taking of evidence to investigate treatment process on the spot.
During electronic data evidence obtaining, electronic data is possible to be distorted by intentional or unintentional, this will destroy electronics
Credibility of the data as evidence.The correlations such as time, place, fixed personnel when needing that electronic data is fixed, acquiring
Information carries out uniqueness determination and record, the legitimacy for the fixed electronic data of Late Stage Verification provide necessary foundation.By
Actually rare in the product that the country possesses independent research patent, more still to introduce by external, this is to national affairs safety
Also constitute certain threat.Excessively single plus current already present evidence obtaining software function, specific aim is not strong, takes to calculating
Card work brings certain limitation.Therefore, the research of Technology of Evidence Extract of Computer and exploration work will be particularly important.And
The present invention can well solve problem above.
Summary of the invention
It is an object of that present invention to provide a kind of evidence-obtaining system and method based on finger print identifying and GPS, in conjunction with fingerprint,
GPS information is consolidated by carrying out uniqueness determination and record to relevant informations such as acquisition time, place, personnel for Late Stage Verification
The legitimacy of fixed electronic data provides necessary foundation.The system overcomes forensic technologies that can not verify after evidence obtaining process
The problems such as primitiveness of evidence, integrality, it is a kind of intelligence that probative value is high that the verification once again for forensic information, which is realized anti-tamper,
It can evidence-obtaining system.To achieve the goals above, the present invention guarantees the probative value of electronic data in terms of four: evidence obtaining place takes
Demonstrate,prove time, evidence obtaining personage, notary third party.The specified place of evidence obtaining is precisely determined using GPS positioning;Using fingerprint module ratio
The unique identification code of each evidence obtaining personnel is returned to function and determines specific evidence obtaining personnel;The Green obtained using GPS
Prestige controls standard time of the time as evidence obtaining.Above three information is subjected to integration and generates hashed value, passes through notary third party
The information comparison after being used for is saved after the private key encryption held.
The technical scheme adopted by the invention to solve the technical problem is that: a kind of evidence obtaining system based on finger print identifying and GPS
System, the system include user's log-in module, fingerprint identification module, correction verification module, encrypting module, GPS module, communication module, deposit
Store up module, history module.
User's log-in module: user's login function, to verification system user;
Fingerprint identification module: fingerprint function is verified in typing, to verify collected people;
Correction verification module: electronic evidence and finger print information, time, GPS information etc. are generated to the school of evidence according to regulation format
Test code;
Encrypting module: by check code notarization side's private key encryption, passing through notarization side's public key decryptions for cryptographic check code, to
Verify notarization side;
GPS module: the time of record acquisition evidence, GPS information;
Communication module: hardware device and PC are connected by Wi-Fi;
Memory module: equipment user, third party's public key, fingerprint, evident information are saved;
History module: the operation note after user logs in memory module is recorded.
The present invention also provides a kind of implementation method of evidence-obtaining system based on finger print identifying and GPS, this method includes such as
Lower step:
Step 1: system confirms notarial USB disk insertion system, obtains the personal information and private key of notarization side;
Step 2: system is included in fingerprint by fingerprint module, is verified with existing fingerprint base, should as existed in fingerprint base
The fingerprint then existing finger print information of return system registers the finger print information and return system finger print information if not;
Step 3: system obtains current Greenwich Mean Time and longitude and latitude by GPS module;
Step 4: electronic evidence information and fingerprint characteristic value, time, longitude and latitude are generated into check code according to setting format, and
Ciphertext is sent to PC machine after being encrypted by notarization side's private key;
Check code ciphertext and electronic evidence information, fingerprint characteristic value, time, longitude and latitude are carried out unified guarantor by step 5:PC machine
It deposits;
Step 6: when verified evidence being needed whether to be tampered, the plaintext that system stores being generated into school according to regulation format once again
Code is tested, and is compared with the ciphertext after third party's public key decryptions.
The utility model has the advantages that
1, the present invention passes through evidence obtaining people 1 (fingerprint), evidence obtaining people 2 (system logs in), notary's third party (notarization side's private key)
Three kinds of evidence obtaining roles, ensure that the notarization of evidence obtaining personnel.
2, the present invention enhances card by being subject to timestamp to electronic evidence and geography information ensure that the integrality of evidence
According to lawful basis.
3, the present invention is realized anti-tamper by the private key encryption and public key decryptions of third party's notarization.
Detailed description of the invention
Fig. 1 is system architecture diagram of the invention.
Fig. 2 is flow chart of the method for the present invention.
Fig. 3 is the method flow diagram that the present invention generates forensic information function.
Fig. 4 is the method flow diagram of check code authentication function of the present invention.
Fig. 5 is the method flow diagram of fingerprint authentication function of the present invention.
Fig. 6 is the method flow diagram that the present invention deletes fingerprint function.
Specific embodiment
The invention is described in further detail with reference to the accompanying drawings of the specification.
Present system is the electronic evidence-collecting system based on fingerprint module and GPS information, includes equipment evidence obtaining end and storage
Control terminal, wherein evidence taking equipment end is embedded device external connection module composition.External connection module mainly by fingerprint module, GPS module,
Wireless Wi-Fi module and USB interface are constituted;Storage control terminal then uses PC machine to complete.Wherein fingerprint module and GPS module are distinguished
It is responsible for the collection of fingerprint and place temporal information, is connect by serial ports with embedded device ontology;The information of acquisition adds through verification
It is sent after close by WIFI.It is mutually indepedent between module, it does not interfere with each other, difference when needing to generate check code ciphertext
Passing sequentially through serial communication calls modules to obtain the information needed, to generate electronic data.
It stores control terminal to be realized by a software through pictures at the end PC, is responsible for typing and stores following information:
1) fingerprint characteristic value tables of data: for marking the corresponding relationship of fingerprint module internal feature value;
2) forensic information tables of data: the relevant information generated for storing forensic information, including when fingerprint characteristic value, evidence obtaining
Between, evidence obtaining place and generation MD5 hash function hashed value
3) historical record data table: for storing inquiry and deletion record of the PC end subscriber to forensic information, it is ensured that all
Operation has mark that can follow;
4) user information tables of data: for storing PC end subscriber information;
5) notary information's table: for storing notary information and corresponding public key.
The invention mainly comprises following functions:
(1) it generates forensic information: being recorded to reduce fingerprint base to the repetition of same fingerprint, a plurality of of the same fingerprint takes
Card information only corresponds to a data of fingerprint characteristic data table:
Evidence obtaining personnel fingerprint is acquired, is checked in fingerprint characteristic value tables of data with the presence or absence of the fingerprint of evidence obtaining people.As existed, then
Obtain finger print information in fingerprint base;It is such as not present, then by the fingerprint recording in fingerprint characteristic value tables of data, and obtains fingerprint letter
Breath;
The temporal information and GPS information when evidence collection are obtained, and presses three contents together with fingerprint characteristic value information
Fixed format integration, generates corresponding MD5 check code, after notarial private key encryption, issues the end PC deposit database.
(2) it checks finger print information: checking existing finger print information at the end PC, and finger print information can be screened according to conditional search
(3) it checks forensic information: checking existing forensic information at the end PC, and finger print information can be screened according to conditional search.
(4) it verifies forensic information: forensic information ciphertext is obtained into MD5 by being stored in the public key decryptions of notary information's table
Code, generates MD5 code according to existing clear data once again, and verification is compared in the two, verifies forensic information whether after evidence obtaining
It is modified.
(5) it checks lookup history: checking search, deletion record of the login user to forensic information.
Communications protocol
It needs to carry out information transmission by network between evidence obtaining end equipment and storage end PC, devise herein as shown in the table
Communications protocol.
PART | 1 | 2 | 3–len |
CMD | Cmd | Parameter | 0 |
ACK | Cmd | Result | Data |
Communication format is divided into three parts, and first part is to indicate the operation to be carried out, and accounts for a byte, equally returns
Returning result first character section is also the operation for indicating to carry out;The second part is parameter, this position is used for operational order
In storage parameter, such as required fingerprint ID when registration.This is for storing operating instruction for returning the result
As a result, 0 indicates successfully, 1 indicates failure;Third part is the data packet returned the result, for storing the MD5 code generated, is referred to
Line characteristic value.Space-separated is used between data block.
1) user logs in
Ensure that all data manipulation historical records have the system user logged in record.
2) forensic information is generated
Equipment end is inserted into notaryUSB disk, storage control terminal to equipment evidence obtaining end publication acquisition fingerprint order, equipment end into
Enter to obtain fingerprint state, such as obtains successfully, then inquire in fingerprint base whether have existed identical fingerprints, such as nothing, then establish this and refer to
Line data, the characteristic value of the fingerprint is whole by fixed format with electronic evidence, current time, GPS information and system user information
It closes, generates MD5 code, by the private key of notary's USB disk by MD5 code encryption.System believes fingerprint, login user, time, GPS
Breath is in plain text and MD5 code ciphertext sends the end PC, is stored in forensic information tables of data.
3) finger print information is checked
Fingerprint feature information is checked in storage control terminal, the fingerprint feature information that can be met according to conditional search, and can be right
Data information carries out deletion work.Whole search information of login user and delete information in historical record data table
Record.
4) forensic information is checked
Forensic information is checked in storage control terminal, the forensic information that can be met according to conditional search, and can be to forensic information
Carry out deletion work.The whole search information and deletion information of login user are recorded in historical record data table.
5) forensic information is verified
By storing notary's public key decryptions MD5 code in the database, given birth to once again according to the clear data of forensic information
At MD5 code, the two is compared, judges whether forensic information is tampered after reordering.
6) operation history is checked
Check search, deletion record of the user to forensic information, finger print information.
The present invention passes through the cleartext informations such as the electronic evidence information that will be saved, evidence obtaining user, fingerprint, GPS and generates check code
It is compared with the check code of forensic information, whether discovery forensic information is tampered;Pass through notarization side's private key encryption, public key decryptions
Check code has prevented the possibility that electronic evidence and check code are tampered together;As found the forensic information that is tampered, by checking
Historical operation table distorts user for lookup and provides reference information, ensure that the authenticity and integrity of entire electronic evidence.
Claims (2)
1. a kind of implementation method of the evidence-obtaining system based on finger print identifying and GPS, which is characterized in that the method includes walking as follows
It is rapid:
Step 1: system confirms notarial USB disk insertion system, obtains notarial personal information and private key;
Step 2: system is included in fingerprint by fingerprint identification module, is verified with existing fingerprint base, should as existed in fingerprint base
The finger print information then existing finger print information of return system registers the finger print information and the existing finger print information of return system if not;
Step 3: system obtains current Greenwich Mean Time and longitude and latitude by GPS module;
Step 4: electronic evidence information and finger print information, time, longitude and latitude being generated into check code according to setting format, and pass through public affairs
Ciphertext is sent to PC machine after encrypting by witness's private key;
Check code ciphertext and electronic evidence information, finger print information, time, longitude and latitude are carried out unified preservation by step 5:PC machine;
Step 6: when verified evidence being needed whether to be tampered, the plaintext that system stores being generated into inspection according to regulation format once again
Code, and compared with the ciphertext after notary's public key decryptions;
The implementation method is applied to a kind of evidence-obtaining system based on finger print identifying and GPS, and the system comprises users to log in
Module, fingerprint identification module, correction verification module, encrypting module, GPS module, communication module, memory module, history module;
User's log-in module: user's login function, to verification system user;
Fingerprint identification module: fingerprint function is verified in typing, to verify collected people;
Correction verification module: electronic evidence information and finger print information, time, longitude and latitude are generated to the inspection of evidence according to regulation format
Code;
Encrypting module: by check code notary's private key encryption, by encryption verification code by notary's public key decryptions, to verify
Notary;
GPS module: the time of record acquisition evidence, longitude and latitude;
Communication module: hardware device and PC are connected by Wi-Fi;
Memory module: system user, notary's public key, finger print information, electronic evidence information are saved;
History module: the operation note after user logs in memory module is recorded;
The system is the electronic evidence-collecting system based on fingerprint identification module and longitude and latitude, includes evidence taking equipment end and storage control
End, wherein evidence taking equipment end is made of embedded device external connection module, and external connection module is by fingerprint identification module, GPS module, communication
Module and USB interface are constituted;Storage control terminal then uses PC machine to complete, and wherein fingerprint identification module is each responsible for GPS module
The collection of finger print information and place temporal information is connect by serial ports with embedded device ontology;The information of acquisition adds through verification
It is sent after close by WIFI, it is mutually indepedent between module, it does not interfere with each other, difference when needing to generate check code ciphertext
Passing sequentially through serial communication calls modules to obtain the information needed, to generate electronic data;
The storage control terminal of the system is realized by a software through pictures at the end PC, is responsible for typing and is stored following information, comprising:
1) fingerprint information data table: for marking the corresponding relationship of fingerprint identification module internal feature value;
2) forensic information tables of data: for store forensic information generation relevant information, including finger print information, evidence obtaining the time, take
Demonstrate,prove the check code of the MD5 hash function of place and generation;
3) historical record data table: for storing inquiry and deletion record of the PC end subscriber to forensic information, it is ensured that all operations
There is mark that can follow;
4) user information tables of data: for storing PC end subscriber information;
5) notary information's table: for storing notary information and corresponding public key;
The system comprises:
(1) generate forensic information: being recorded to reduce fingerprint base to the repetition of same finger print information, the same finger print information it is more
Forensic information only corresponds to a data of fingerprint information data table, comprising:
Evidence obtaining personnel finger print information is acquired, is checked in fingerprint information data table with the presence or absence of the finger print information of evidence obtaining people;As existed,
Then obtain finger print information in fingerprint base;It is such as not present, then by the fingerprint recording in fingerprint information data table, and obtains fingerprint letter
Breath;
Temporal information and longitude and latitude when acquisition evidence collection, and three contents are pressed into fixed format together with finger print information information
Integration, generates corresponding check code, after notarial private key encryption, issues the end PC deposit database;
(2) it checks finger print information: checking existing finger print information at the end PC, and finger print information can be screened according to conditional search;
(3) it checks forensic information: checking existing forensic information at the end PC, and can check the fingerprint letter of search screening according to condition
Breath;
(4) it verifies forensic information: forensic information ciphertext is obtained into check code, root by being stored in the public key decryptions of notary information's table
Generate check code once again according to existing clear data, the two be compared verification, verification forensic information whether after evidence obtaining by more
Change;
(5) it checks lookup history: checking search, deletion record of the login user to forensic information.
2. a kind of implementation method of evidence-obtaining system based on finger print identifying and GPS according to claim 1, feature exist
In: the system guarantees the probative value of electronic data in terms of four, it may be assumed that evidence obtaining place, evidence obtaining time, evidence obtaining personage, notarization
People;The specified place of evidence obtaining is precisely determined using GPS positioning;Each evidence obtaining people is returned to using fingerprint identification module comparison function
The unique identification code of member determines specific evidence obtaining personnel;Standard of the Greenwich Mean Time obtained using GPS as evidence obtaining
Above three information is carried out integration and generates check code, saved after being used for after the private key encryption held by notary by the time
Information comparison.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510712583.5A CN105260640B (en) | 2015-10-28 | 2015-10-28 | A kind of evidence-obtaining system and method based on finger print identifying and GPS |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510712583.5A CN105260640B (en) | 2015-10-28 | 2015-10-28 | A kind of evidence-obtaining system and method based on finger print identifying and GPS |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105260640A CN105260640A (en) | 2016-01-20 |
CN105260640B true CN105260640B (en) | 2019-04-30 |
Family
ID=55100327
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510712583.5A Active CN105260640B (en) | 2015-10-28 | 2015-10-28 | A kind of evidence-obtaining system and method based on finger print identifying and GPS |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105260640B (en) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017124541A1 (en) * | 2016-01-24 | 2017-07-27 | 谢文 | Data acquisition method for technology related to confirmation of falling-down reason, and confirmation system |
CN105577531A (en) * | 2016-02-01 | 2016-05-11 | 万联电子商务股份有限公司 | Instant message unloading and anti-cheating method and system based on mobile terminal |
CN106559433B (en) * | 2016-12-07 | 2019-12-31 | 北京信任度科技有限公司 | Method and system for fixing electronic evidence and user identity by using digital certificate |
CN106657049B (en) * | 2016-12-15 | 2020-03-31 | 重庆法记云网络科技有限责任公司 | System and method for real-time collecting and fixing electronic evidence |
CN106960164A (en) * | 2017-03-10 | 2017-07-18 | 茂名市公安局 | A kind of method and system of the fixed electronic evidence in scene |
CN107273514A (en) * | 2017-06-21 | 2017-10-20 | 杭州云证网络科技有限公司 | A kind of inspection method and application its inspect subsystem and data deposit signed certificate administration chain-circuit system |
CN107276747A (en) * | 2017-08-11 | 2017-10-20 | 杭州铜米互联网金融服务有限公司 | A kind of method and system of the mobile device secure access based on protocol extension |
CN107463714A (en) * | 2017-08-24 | 2017-12-12 | 北京工业大学 | A kind of key evidence binary search method based on chain of evidence time series |
CN107994997A (en) * | 2017-12-19 | 2018-05-04 | 杭州安存网络科技有限公司 | Suitable for the evidence protection device of internet court |
CN109960948A (en) * | 2017-12-26 | 2019-07-02 | 湖北汽车工业学院 | For reinforcing the method and electronic evidence memory of electronic evidence safety |
CN110348269B (en) * | 2018-04-02 | 2021-07-20 | 杭州海康威视数字技术股份有限公司 | Fingerprint input method, device and system and electronic equipment |
CN110008728B (en) * | 2019-04-11 | 2021-08-24 | 苏州超擎图形软件科技发展有限公司 | Electronic evidence anti-counterfeiting method and device |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101017563A (en) * | 2006-11-21 | 2007-08-15 | 北京大学 | Method for fixing and saving evidence of computer crime and device therefor |
CN103593618A (en) * | 2013-10-28 | 2014-02-19 | 北京实数科技有限公司 | Verification method and system for adoptability of electronic data evidence |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5673952B2 (en) * | 2011-08-29 | 2015-02-18 | セイコーインスツル株式会社 | Data certification system, client device, public server, and data certification method |
-
2015
- 2015-10-28 CN CN201510712583.5A patent/CN105260640B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101017563A (en) * | 2006-11-21 | 2007-08-15 | 北京大学 | Method for fixing and saving evidence of computer crime and device therefor |
CN103593618A (en) * | 2013-10-28 | 2014-02-19 | 北京实数科技有限公司 | Verification method and system for adoptability of electronic data evidence |
Also Published As
Publication number | Publication date |
---|---|
CN105260640A (en) | 2016-01-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105260640B (en) | A kind of evidence-obtaining system and method based on finger print identifying and GPS | |
CN102722931B (en) | Voting system and voting method based on intelligent mobile communication devices | |
CN1860724B (en) | Method for identification | |
CN101442407B (en) | Method and system for identification authentication using biology characteristics | |
CN110086608A (en) | User authen method, device, computer equipment and computer readable storage medium | |
EP3435591A1 (en) | 1:n biometric authentication, encryption, signature system | |
CN106488452B (en) | Mobile terminal safety access authentication method combining fingerprint | |
CN107025397B (en) | Identity information acquisition method and device | |
CN105074721A (en) | Method for signing electronic documents with an analog-digital signature with additional verification | |
CN109753817A (en) | Medical information secure storage scheme based on block chain | |
CN111431916B (en) | Seal verification method based on asymmetric encryption, seal and computer storage medium | |
CN105164689A (en) | User authentication | |
EP2805298A1 (en) | Methods and apparatus for reliable and privacy protecting identification of parties' mutual friends and common interests | |
CN110474925A (en) | Judicial document delivery information sharing method, device and computer readable storage medium | |
US20230050280A1 (en) | Computer-implemented user identity verification method | |
JP4426030B2 (en) | Authentication apparatus and method using biometric information | |
CN109067702B (en) | Method for generating and protecting real-name system network identity | |
CN110213232A (en) | A kind of fingerprint characteristic and key double verification method and apparatus | |
CN110995661B (en) | Network card platform | |
CN110473131A (en) | Material evidence information saves trace to the source monitoring system and monitoring method from damage | |
CN213122985U (en) | PIS authentication system | |
CN108322311A (en) | The generation method and device of digital certificate | |
AnilKumar | Secure I-voting system using QR code and biometric authentication. | |
Mitchell et al. | Security of the Lin-Lai smart card based user authentication scheme | |
CN108737095B (en) | Method for carrying out credible operation by using digital current survey record credible model system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 210003 new model road 66, Gulou District, Nanjing, Jiangsu Applicant after: Nanjing Post & Telecommunication Univ. Address before: 210023 9 Wen Yuan Road, Qixia District, Nanjing, Jiangsu. Applicant before: Nanjing Post & Telecommunication Univ. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |