CN110392029A - Identity identifying method and system based on biological identification - Google Patents
Identity identifying method and system based on biological identification Download PDFInfo
- Publication number
- CN110392029A CN110392029A CN201810362573.7A CN201810362573A CN110392029A CN 110392029 A CN110392029 A CN 110392029A CN 201810362573 A CN201810362573 A CN 201810362573A CN 110392029 A CN110392029 A CN 110392029A
- Authority
- CN
- China
- Prior art keywords
- user
- verified
- registration
- authentication
- biological identification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention discloses a kind of identity identifying methods based on biological identification, it is related to technical field of biometric identification, comprising steps of in user's registration, the biological information for acquiring user generates corresponding biological identification, and generates encryption key according to biological identification, preset plaintext is encrypted using encryption key, the registration ciphertext of user is obtained, and establishes the identity information of user and the linked list of registration ciphertext one-to-one relationship, and store into registration ciphertext database;When user to be verified carries out authentication, the biological information of user to be verified is acquired, generates the biological identification of user to be verified, and decruption key is generated according to the biological identification of user to be verified;The registration ciphertext in registration ciphertext database is decrypted using decruption key, successfully judges whether the authentication of user to be verified passes through according to whether there is registration ciphertext and be decrypted.The present invention is based on the identity identifying methods of biological identification, more securely and reliably.
Description
Technical field
The present invention relates to technical field of biometric identification, and in particular to a kind of identity identifying method based on biological identification and is
System.
Background technique
Currently, traditional biological identification method acquires the biological information of user, such as fingerprint, people in registration link
Face, iris refer to vein etc., and the characteristic sequence of user biological characteristic information is extracted using specific algorithm, as biological template
Characteristic sequence, storage in systems, are used for user identity authentication.
In certification link, the corresponding biological information of acquisition user, such as fingerprint, face, iris, refer to vein, and
The characteristic sequence that sample is extracted using algorithm same as registration link, by the template characteristic sequence in sample characteristics sequence and system
Column are compared, and obtain the result of authentication.Therefore, traditional bio-identification identity identifying technology needs in advance by user's
Template characteristic sequence stores in systems, for the use of subsequent certification link.
However, no matter user template characteristic sequence is stored in background server, it is still stored in terminal device, is all suffered from
The risk of user biological characteristic sequence leakage, the template characteristic sequence of user may be stolen, and be illegally used, to make
At the immeasurable consequence such as privacy leakage, property loss, security threat.
Summary of the invention
In view of the deficiencies in the prior art, the purpose of the present invention is to provide a kind of identity based on biological identification to recognize
Card method, this method is more safe and reliable, can thoroughly prevent user biological characteristic sequence from being leaked.
To achieve the above objectives, the technical solution adopted by the present invention is that:
A kind of identity identifying method based on biological identification, comprising steps of
S1: in user's registration, obtaining the identity information of user, acquires the biological information of user, generates corresponding
Biological identification, and encryption key is generated according to the biological identification, preset plaintext is encrypted using the encryption key,
The registration ciphertext of user is obtained, and establishes the identity information of user and the linked list of registration ciphertext one-to-one relationship, and deposit
It stores up in registration ciphertext database;
S2: when user to be verified carries out authentication, the biological information of user to be verified is acquired, is generated to be verified
The biological identification of user, and decruption key is generated according to the biological identification of the user to be verified;
S3: being decrypted the registration ciphertext in the registration ciphertext database using the decruption key, according to whether
It is decrypted in the presence of registration ciphertext and successfully judges whether the authentication of user to be verified passes through.
Based on the above technical solution, the specific steps of above-mentioned steps S3 include:
Judge whether to obtain the identity information of user to be verified;
If not obtaining the identity information of user to be verified, using the decruption key in the registration ciphertext database
All registration ciphertexts are decrypted, and register ciphertext if it exists and are decrypted successfully, then the authentication of the user to be verified passes through,
Subscriber identity information corresponding with successfully registration ciphertext is decrypted is the body of user to be verified in the linked list
Part information;Registration ciphertext is decrypted successfully if it does not exist, then the authentication of the user to be verified does not pass through;
If obtaining the identity information of user to be verified, search whether that there are to be verified in the registration ciphertext database
The identity information of user, if it does not exist, then the authentication of the user to be verified does not pass through;If it exists, then it extracts described to be tested
The corresponding registration ciphertext of identity information of user is demonstrate,proved, and is decrypted using registration ciphertext of the decruption key to extraction, if
Successful decryption, then the authentication of the user to be verified passes through, if decryption is unsuccessful, the authentication of the user to be verified is not
Pass through.
Based on the above technical solution, the detailed process of encryption key is generated in step S1 according to the biological identification
Are as follows: it is close to generate corresponding encryption using pseudorandom number generator using the biological identification as the seed of pseudorandom number generator
Key.
Based on the above technical solution, the biological information for acquiring user generates the side of corresponding biological identification
Method are as follows: the characteristic sequence for extracting the biological information is handled the characteristic sequence using special algorithm, generation pair
The biological identification answered.
Based on the above technical solution, the special algorithm can be Fuzzy extractor, fuzzy safety box or fuzzy
Promise to undertake algorithm.
Based on the above technical solution, the method for default plaintext is generated are as follows: the plaintext generator of preset algorithm is loaded,
The relevant information of user is input in the plaintext generator, the plaintext generator generates preset plaintext.
The present invention also provides a kind of identity authorization systems based on biological identification, including registration module and authentication module;
The registration module is used in user's registration, obtains the identity information of user, acquires the biological characteristic letter of user
Breath generates corresponding biological identification, and generates encryption key according to the biological identification, using the encryption key to preset
It is encrypted in plain text, obtains the registration ciphertext of user, and established the identity information of user and register ciphertext one-to-one relationship
Linked list, and store into registration ciphertext database;
The authentication module is used to acquire the biological characteristic letter of user to be verified when user to be verified carries out authentication
Breath generates the biological identification of user to be verified, and generates decruption key according to the user biological mark to be verified, using described
The registration ciphertext in the registration ciphertext database is decrypted in decruption key, is decrypted into according to whether there is registration ciphertext
Function, judges whether the authentication of user to be verified passes through.
Based on the above technical solution, the authentication module includes that judging unit, the first authentication unit and second are recognized
Demonstrate,prove unit;
The judging unit is for judging whether to obtain the identity information of user to be verified;
First authentication unit is used to make when judging unit judgement does not obtain the identity information of user to be verified
Registration ciphertext all in the registration ciphertext database is decrypted with the decruption key, and judges whether there is registration
Ciphertext is decrypted successfully, and if it exists, then the authentication of the user to be verified passes through, in the linked list be decrypted into
The corresponding subscriber identity information of registration ciphertext of function, the identity information of user as to be verified, if it does not exist, then this is to be verified
The authentication of user does not pass through;
Second authentication unit is used for when the judging unit judges to obtain the identity information of user to be verified, in the note
Search whether that there are the identity informations of user to be verified in volume ciphertext database, if it does not exist, then the identity of the user to be verified
Certification does not pass through;If it exists, then the corresponding registration ciphertext of identity information of the user to be verified is extracted, and uses the decryption
The registration ciphertext that key pair is extracted is decrypted, if successful decryption, the authentication of the user to be verified passes through, if decryption is not
Success, then the authentication of the user to be verified does not pass through.
Based on the above technical solution, the registration module and authentication module respectively include that a pseudo random number occurs
Device, and the two pseudorandom number generators are consistent;
The registration module is also used to utilize pseudorandom using the biological identification of user as the seed of pseudorandom number generator
Number generator generates corresponding encryption key;
The authentication module is also used to utilize using the biological identification of user to be verified as the seed of pseudorandom number generator
Pseudorandom number generator generates corresponding decruption key.
Compared with the prior art, the advantages of the present invention are as follows: the identity identifying method of the invention based on biological identification, In
After the biological information for collecting user, corresponding biological identification can be first generated, and generate according to the biological identification
Encryption key, using the encryption key to encrypting in plain text after, obtain registration ciphertext, then the registration ciphertext stored, at this
In the process, the information of storage is registration ciphertext, is not user biological characteristic information, more securely and reliably, user biological is not present
The risk that characteristic sequence is leaked.
Detailed description of the invention
Fig. 1 is the schematic diagram of register flow path in the identity identifying method based on biological identification in the embodiment of the present invention;
Fig. 2 is the schematic diagram of identifying procedure in the identity identifying method based on biological identification in the embodiment of the present invention.
Specific embodiment
Invention is further described in detail with reference to the accompanying drawings and embodiments.
Shown in Figure 1, the embodiment of the present invention provides a kind of identity identifying method based on biological identification, including registration flow
Journey and identifying procedure.
The register flow path of the embodiment of the present invention specifically includes that steps are as follows:
A1: in user's registration, obtaining the identity information of user, and acquires the biological information of user, the life of user
Object characteristic information can for fingerprint, face, iris, refer to vein, gait, vocal print, brain wave, sclera etc.;
A2: according to the biological information of user, the characteristic sequence of the biological information is extracted, and utilizes special algorithm
The characteristic sequence is handled, corresponding biological identification is generated, in embodiments of the present invention, the special algorithm used can be with
For Fuzzy extractor, fuzzy safety box or fuzzy promise scheduling algorithm;
A3: it is close to generate encryption using pseudorandom number generator using biological identification as the seed of pseudorandom number generator
Key;
A4: preset plaintext is encrypted using the encryption key, obtains the registration ciphertext of user;
A5: establishing subscriber identity information and registers the linked list of ciphertext one-to-one relationship, and the linked list is deposited
It stores up in registration ciphertext database, completes identity registration.
Further, there are many preset plaintext acquisition modes used in step A4, it is preferable that generate default plaintext
Method are as follows: the relevant information of user is input in the plaintext generator, is stated clearly by the plaintext generator for loading preset algorithm
Literary generator generates preset plaintext, and during this, it can be Hash that the algorithm that plaintext generator uses, which is not particularly limited,
Function, exclusive or, with or with or splicing, cascade and its form etc. arbitrarily is applied in combination, the relevant information of user, which is not also done, to be had
Body limitation can be true random number, address name, user identity card number, account name, mailbox number, cell-phone number, bank account, clothes
Account, passport No., the work trade mark, the biological identification etc. of business device distribution.
Specifically, when being encrypted using the encryption key to preset plaintext, the Encryption Algorithm that uses can be for
DES, 3DES, TDEA, Blowfish, RC2, RC4, RC5, IDEA, SKIPJACK, AES etc..
Shown in Figure 2, the identifying procedure of the embodiment of the present invention specifically includes that steps are as follows:
B1: when user to be verified carries out authentication, the biological information of user to be verified is acquired;
B2: according to the biological information of user to be verified, the characteristic sequence of the biological information is extracted, and utilizes spy
Determine algorithm to handle the characteristic sequence, generate corresponding biological identification, to the processing method of characteristic sequence in this step
It is identical as the processing method in register flow path step A2;
B3: using method identical with register flow path step A3, generates decryption according to the user biological mark to be verified
Key;
B4: judge whether to obtain the identity information of user to be verified, if not obtaining the identity information of user to be verified, jump
Step B5 is gone to, if obtaining the identity information of user to be verified, go to step B7;
B5: registration ciphertext all in the registration ciphertext database is decrypted using the decruption key;
B6: it judges whether there is registration ciphertext and is decrypted successfully, register ciphertext if it exists and be decrypted successfully, then this is to be verified
The authentication of user passes through, and searches in the linked list that step A5 is established corresponding with successfully registration ciphertext is decrypted
Subscriber identity information, the subscriber identity information found are the identity information of user to be verified;Ciphertext quilt is registered if it does not exist
Successful decryption, then the authentication of the user to be verified does not pass through;
B7: search whether that there are the identity informations of user to be verified in the registration ciphertext database, and if it exists, then hold
Row step B8, if it does not exist, then the authentication of the user to be verified does not pass through;
B8: extracting the corresponding registration ciphertext of identity information of the user to be verified, and using the decruption key to mentioning
The registration ciphertext taken is decrypted, if successful decryption, the authentication of the user to be verified passes through, if decryption is unsuccessful,
The authentication of the user to be verified does not pass through.
The identity identifying method based on biological identification of the embodiment of the present invention, the biological information for collecting user it
Afterwards, corresponding biological identification can be first generated, and encryption key is generated according to the biological identification, using the encryption key to bright
After text is encrypted, registration ciphertext is obtained, then store the registration ciphertext, in this course, the information of storage is registration ciphertext,
It is not user biological characteristic information, more securely and reliably, there is no the risks that user biological characteristic sequence is leaked.
The embodiment of the invention also provides a kind of identity authorization systems based on biological identification, including registration module and certification
Module;
The registration module is used in user's registration, acquires the biological information of user, generates corresponding biology mark
Know, and encryption key is generated according to the biological identification, preset plaintext is encrypted using the encryption key, is used
The registration ciphertext at family, and by the storage corresponding with registration ciphertext of the identity information of user into registration ciphertext database;
The authentication module is used to acquire the biological characteristic letter of user to be verified when user to be verified carries out authentication
Breath generates the biological identification of user to be verified, and generates decruption key according to the biological identification of the user to be verified, uses institute
It states decruption key the registration ciphertext in the registration ciphertext database is decrypted, be decrypted according to whether there is registration ciphertext
Success, judges whether the authentication of user to be verified passes through.
Further, the authentication module includes judging unit, the first authentication unit and the second authentication unit;
The judging unit is for judging whether to obtain the identity information of user to be verified;
First authentication unit is used to make when judging unit judgement does not obtain the identity information of user to be verified
Registration ciphertext all in the registration ciphertext database is decrypted with the decruption key, and judges whether there is registration
Ciphertext is decrypted successfully, and if it exists, then the authentication of the user to be verified passes through, and searches and be decrypted in linked list
The successfully corresponding subscriber identity information of registration ciphertext, the subscriber identity information found are the identity letter of user to be verified
Breath;If it does not exist, then the authentication of the user to be verified does not pass through;
Second authentication unit is used for when the judging unit judges to obtain the identity information of user to be verified, in the note
Search whether that there are the identity informations of user to be verified in volume ciphertext database, if it does not exist, then the identity of the user to be verified
Certification does not pass through;If it exists, then the corresponding registration ciphertext of identity information of the user to be verified is extracted, and uses the decryption
The registration ciphertext that key pair is extracted is decrypted, if successful decryption, the authentication of the user to be verified passes through, if decryption is not
Success, the authentication of the user to be verified do not pass through.
Specifically, the registration module and authentication module respectively include a pseudorandom number generator, and the two pseudorandoms
Number generator is consistent;
The registration module is also used to utilize pseudorandom using the biological identification of user as the seed of pseudorandom number generator
Number generator generates corresponding encryption key;The authentication module be also used to using the biological identification of user to be verified as it is pseudo- with
The seed of machine number generator generates corresponding decruption key using pseudorandom number generator.
The identity authorization system based on biological identification of the embodiment of the present invention, the biological information for collecting user it
Afterwards, corresponding biological identification can be first generated, and encryption key is generated according to the biological identification, using the encryption key to bright
After text is encrypted, registration ciphertext is obtained, then store the registration ciphertext, in this course, the information of storage is registration ciphertext,
It is not user biological characteristic information, more securely and reliably, there is no the risks that user biological characteristic sequence is leaked.
It should be understood that system provided by the above embodiment is when carrying out authentication operation, only with above-mentioned each function
The division progress of module, can be complete by different function module by above-mentioned function distribution as needed for example, in practical application
At the internal structure of system being divided into different functional modules, to complete all or part of the functions described above.
The present invention is not limited to the above-described embodiments, for those skilled in the art, is not departing from
Under the premise of the principle of the invention, several improvements and modifications can also be made, these improvements and modifications are also considered as protection of the invention
Within the scope of.The content being not described in detail in this specification belongs to the prior art well known to professional and technical personnel in the field.
Claims (9)
1. a kind of identity identifying method based on biological identification, which is characterized in that comprising steps of
S1: in user's registration, the identity information of user is obtained, acquires the biological information of user, generates corresponding biology
Mark, and encryption key is generated according to the biological identification, preset plaintext is encrypted using the encryption key, is obtained
The registration ciphertext of user, and the identity information of user and the linked list of registration ciphertext one-to-one relationship are established, and store and arrive
It registers in ciphertext database;
S2: when user to be verified carries out authentication, the biological information of user to be verified is acquired, user to be verified is generated
Biological identification, and according to the biological identification of the user to be verified generate decruption key;
S3: being decrypted the registration ciphertext in the registration ciphertext database using the decruption key, according to whether in the presence of
Registration ciphertext, which is decrypted, successfully judges whether the authentication of user to be verified passes through.
2. as described in claim 1 based on the identity identifying method of biological identification, which is characterized in that above-mentioned steps S3's is specific
Step includes:
Judge whether to obtain the identity information of user to be verified;
If not obtaining the identity information of user to be verified, owned using the decruption key in the registration ciphertext database
Registration ciphertext be decrypted, if it exists register ciphertext be decrypted successfully, then the authentication of the user to be verified passes through, in institute
Stating subscriber identity information corresponding with successfully registration ciphertext is decrypted in linked list is that the identity of user to be verified is believed
Breath;Registration ciphertext is decrypted successfully if it does not exist, then the authentication of the user to be verified does not pass through;
If obtaining the identity information of user to be verified, search whether that there are users to be verified in the registration ciphertext database
Identity information, if it does not exist, then the authentication of the user to be verified does not pass through;If it exists, then the use to be verified is extracted
The corresponding registration ciphertext of the identity information at family, and be decrypted using registration ciphertext of the decruption key to extraction, if decryption
Success, then the authentication of the user to be verified passes through, if decryption is unsuccessful, the authentication of the user to be verified is obstructed
It crosses.
3. as described in claim 1 based on the identity identifying method of biological identification, which is characterized in that in step S1 according to
The detailed process of biological identification generation encryption key are as follows: raw using pseudorandom number generator using the biological identification as seed
At corresponding encryption key.
4. as described in claim 1 based on the identity identifying method of biological identification, which is characterized in that the biology for acquiring user is special
Reference breath, the method for generating corresponding biological identification are as follows: the characteristic sequence for extracting the biological information utilizes special algorithm
The characteristic sequence is handled, corresponding biological identification is generated.
5. as claimed in claim 4 based on the identity identifying method of biological identification, it is characterised in that: the special algorithm can be with
For Fuzzy extractor, fuzzy safety box or fuzzy promise algorithm.
6. as described in claim 1 based on the identity identifying method of biological identification, which is characterized in that generate the side of default plaintext
Method are as follows: the relevant information of user is input in the plaintext generator, the plaintext by the plaintext generator for loading preset algorithm
Generator generates preset plaintext.
7. a kind of identity authorization system based on biological identification, it is characterised in that: including registration module and authentication module;
The registration module is used in user's registration, is obtained the identity information of user, is acquired the biological information of user, raw
Encryption key is generated at corresponding biological identification, and according to the biological identification, using the encryption key to preset plaintext
It is encrypted, obtains the registration ciphertext of user, and establish the identity information of user and being associated with for registration ciphertext one-to-one relationship
List, and store into registration ciphertext database;
The authentication module is used to acquire the biological information of user to be verified when user to be verified carries out authentication,
The biological identification of user to be verified is generated, and decruption key is generated according to the user biological mark to be verified, uses the solution
Registration ciphertext in registration ciphertext database described in close key pair is decrypted, and is decrypted into according to whether there is registration ciphertext
Function, judges whether the authentication of user to be verified passes through.
8. as claimed in claim 7 based on the identity authorization system of biological identification, it is characterised in that: the authentication module includes
Judging unit, the first authentication unit and the second authentication unit;
The judging unit is for judging whether to obtain the identity information of user to be verified;
First authentication unit is used to use institute when judging unit judgement does not obtain the identity information of user to be verified
It states decruption key registration ciphertext all in the registration ciphertext database is decrypted, and judges whether there is registration ciphertext
It is decrypted successfully, and if it exists, then the authentication of the user to be verified passes through, and in the linked list and is decrypted successful
Register the corresponding subscriber identity information of ciphertext, the identity information of user as to be verified, if it does not exist, then the user to be verified
Authentication do not pass through;
Second authentication unit is used for when the judging unit judges to obtain the identity information of user to be verified, close in the registration
Search whether that there are the identity informations of user to be verified in literary database, if it does not exist, then the authentication of the user to be verified
Do not pass through;If it exists, then the corresponding registration ciphertext of identity information of the user to be verified is extracted, and uses the decruption key
The registration ciphertext of extraction is decrypted, if successful decryption, the authentication of the user to be verified passes through, if decryption not at
Function, then the authentication of the user to be verified does not pass through.
9. as claimed in claim 7 based on the identity authorization system of biological identification, it is characterised in that: the registration module and recognize
Demonstrate,proving module respectively includes a pseudorandom number generator, and the two pseudorandom number generators are consistent;
The registration module is also used to send out using the biological identification of user as the seed of pseudorandom number generator using pseudo random number
Raw device, generates corresponding encryption key;
The authentication module is also used to using the biological identification of user to be verified as the seed of pseudorandom number generator, using puppet with
Machine number generator generates corresponding decruption key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810362573.7A CN110392029A (en) | 2018-04-20 | 2018-04-20 | Identity identifying method and system based on biological identification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810362573.7A CN110392029A (en) | 2018-04-20 | 2018-04-20 | Identity identifying method and system based on biological identification |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110392029A true CN110392029A (en) | 2019-10-29 |
Family
ID=68283519
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810362573.7A Pending CN110392029A (en) | 2018-04-20 | 2018-04-20 | Identity identifying method and system based on biological identification |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110392029A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111259946A (en) * | 2020-01-12 | 2020-06-09 | 杭州复杂美科技有限公司 | Mnemonic word generating method, mnemonic word recovering method, equipment and storage medium |
CN111555873A (en) * | 2020-05-07 | 2020-08-18 | 四川普思科创信息技术有限公司 | Remote authentication method, device and system |
CN111740958A (en) * | 2020-05-22 | 2020-10-02 | 卓望数码技术(深圳)有限公司 | Data encryption method, data decryption method, encryption and decryption transmission method and system |
CN112671782A (en) * | 2020-12-28 | 2021-04-16 | 福建网龙计算机网络信息技术有限公司 | File encryption method and terminal |
CN114553413A (en) * | 2022-02-28 | 2022-05-27 | 西安电子科技大学 | Access authentication and key derivation method and system for biological identification identity authentication |
CN114584314A (en) * | 2022-02-28 | 2022-06-03 | 天翼安全科技有限公司 | Registration method, device, equipment and medium |
CN114697043A (en) * | 2022-03-14 | 2022-07-01 | 国网山东省电力公司信息通信公司 | Identity authentication unified management platform based on block chain technology and authentication method thereof |
CN115913580A (en) * | 2023-02-21 | 2023-04-04 | 杭州天谷信息科技有限公司 | Homomorphic encryption-based biometric authentication method and system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130232542A1 (en) * | 2012-03-02 | 2013-09-05 | International Business Machines Corporation | System and method to provide server control for access to mobile client data |
CN106533697A (en) * | 2016-12-06 | 2017-03-22 | 上海交通大学 | Random number generating and extracting method and application thereof to identity authentication |
CN106846623A (en) * | 2017-02-10 | 2017-06-13 | 深圳怡化电脑股份有限公司 | A kind of bank card business dealing for self-service device processes method and self-service device |
CN107332659A (en) * | 2017-05-24 | 2017-11-07 | 舒翔 | A kind of identity identifying method based on biological characteristic, storage medium and system |
-
2018
- 2018-04-20 CN CN201810362573.7A patent/CN110392029A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130232542A1 (en) * | 2012-03-02 | 2013-09-05 | International Business Machines Corporation | System and method to provide server control for access to mobile client data |
CN106533697A (en) * | 2016-12-06 | 2017-03-22 | 上海交通大学 | Random number generating and extracting method and application thereof to identity authentication |
CN106846623A (en) * | 2017-02-10 | 2017-06-13 | 深圳怡化电脑股份有限公司 | A kind of bank card business dealing for self-service device processes method and self-service device |
CN107332659A (en) * | 2017-05-24 | 2017-11-07 | 舒翔 | A kind of identity identifying method based on biological characteristic, storage medium and system |
Non-Patent Citations (1)
Title |
---|
杨得新等: "基于生物特征和口令放大的远程认证协议", 《计算机工程与应》 * |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111259946A (en) * | 2020-01-12 | 2020-06-09 | 杭州复杂美科技有限公司 | Mnemonic word generating method, mnemonic word recovering method, equipment and storage medium |
CN111555873A (en) * | 2020-05-07 | 2020-08-18 | 四川普思科创信息技术有限公司 | Remote authentication method, device and system |
CN111740958A (en) * | 2020-05-22 | 2020-10-02 | 卓望数码技术(深圳)有限公司 | Data encryption method, data decryption method, encryption and decryption transmission method and system |
CN112671782A (en) * | 2020-12-28 | 2021-04-16 | 福建网龙计算机网络信息技术有限公司 | File encryption method and terminal |
CN112671782B (en) * | 2020-12-28 | 2023-03-14 | 福建网龙计算机网络信息技术有限公司 | File encryption method and terminal |
CN114553413A (en) * | 2022-02-28 | 2022-05-27 | 西安电子科技大学 | Access authentication and key derivation method and system for biological identification identity authentication |
CN114584314A (en) * | 2022-02-28 | 2022-06-03 | 天翼安全科技有限公司 | Registration method, device, equipment and medium |
CN114553413B (en) * | 2022-02-28 | 2023-10-13 | 西安电子科技大学 | Access authentication and key derivation method and system for biometric identity authentication |
CN114697043A (en) * | 2022-03-14 | 2022-07-01 | 国网山东省电力公司信息通信公司 | Identity authentication unified management platform based on block chain technology and authentication method thereof |
CN114697043B (en) * | 2022-03-14 | 2023-11-14 | 国网山东省电力公司信息通信公司 | Identity authentication unified management platform based on blockchain technology and authentication method thereof |
CN115913580A (en) * | 2023-02-21 | 2023-04-04 | 杭州天谷信息科技有限公司 | Homomorphic encryption-based biometric authentication method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110392029A (en) | Identity identifying method and system based on biological identification | |
CN107332659B (en) | Identity authentication method, storage medium and system based on biological characteristics | |
CN107819587B (en) | Authentication method based on fully homomorphic encryption, user equipment and authentication server | |
CN106101136B (en) | A kind of authentication method and system of biological characteristic comparison | |
CN104735065B (en) | A kind of data processing method, electronic equipment and server | |
CN104579649B (en) | Personal identification method and system | |
JPWO2003069489A1 (en) | Identification method | |
CN106603234A (en) | Method, device and system for device identity authentication | |
CN110290134B (en) | Identity authentication method, identity authentication device, storage medium and processor | |
CN105187389B (en) | A kind of Web access method and system for obscuring encryption based on number | |
CN109493058A (en) | A kind of personal identification method and relevant device based on block chain | |
CN101174953A (en) | Identity authentication method based on S/Key system | |
CN108830502A (en) | A kind of seal system | |
CN108540470A (en) | Verification System and method based on digital certificate label | |
CN107733636A (en) | Authentication method and Verification System | |
CN108959891A (en) | Brain electricity identity identifying method based on privacy sharing | |
CN106936775A (en) | A kind of authentication method and system based on fingerprint recognition | |
CN109981290A (en) | The communication system and method close based on no certificate label under a kind of intelligent medical environment | |
CN107180342A (en) | A kind of guard method of block chain private key, apparatus and system | |
CN114241560A (en) | Face recognition privacy protection system and method | |
CN108075894A (en) | A kind of authentication on-line processing method and system | |
CN104639528A (en) | DBA (database administrator) mobile client counterattack method and DBA mobile client counterattack device | |
CN108667801A (en) | A kind of Internet of Things access identity safety certifying method and system | |
CN109039643B (en) | A kind of sustainable method for authenticating user identity and system based on electromagnetic radiation | |
CN110392030A (en) | A kind of authentication based on biological characteristic, method for processing business and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191029 |