CN110392029A - Identity identifying method and system based on biological identification - Google Patents

Identity identifying method and system based on biological identification Download PDF

Info

Publication number
CN110392029A
CN110392029A CN201810362573.7A CN201810362573A CN110392029A CN 110392029 A CN110392029 A CN 110392029A CN 201810362573 A CN201810362573 A CN 201810362573A CN 110392029 A CN110392029 A CN 110392029A
Authority
CN
China
Prior art keywords
user
verified
registration
authentication
biological identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810362573.7A
Other languages
Chinese (zh)
Inventor
魏长伟
钦培
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Zhen Yuan Biological Data Co Ltd
Original Assignee
Wuhan Zhen Yuan Biological Data Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Zhen Yuan Biological Data Co Ltd filed Critical Wuhan Zhen Yuan Biological Data Co Ltd
Priority to CN201810362573.7A priority Critical patent/CN110392029A/en
Publication of CN110392029A publication Critical patent/CN110392029A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a kind of identity identifying methods based on biological identification, it is related to technical field of biometric identification, comprising steps of in user's registration, the biological information for acquiring user generates corresponding biological identification, and generates encryption key according to biological identification, preset plaintext is encrypted using encryption key, the registration ciphertext of user is obtained, and establishes the identity information of user and the linked list of registration ciphertext one-to-one relationship, and store into registration ciphertext database;When user to be verified carries out authentication, the biological information of user to be verified is acquired, generates the biological identification of user to be verified, and decruption key is generated according to the biological identification of user to be verified;The registration ciphertext in registration ciphertext database is decrypted using decruption key, successfully judges whether the authentication of user to be verified passes through according to whether there is registration ciphertext and be decrypted.The present invention is based on the identity identifying methods of biological identification, more securely and reliably.

Description

Identity identifying method and system based on biological identification
Technical field
The present invention relates to technical field of biometric identification, and in particular to a kind of identity identifying method based on biological identification and is System.
Background technique
Currently, traditional biological identification method acquires the biological information of user, such as fingerprint, people in registration link Face, iris refer to vein etc., and the characteristic sequence of user biological characteristic information is extracted using specific algorithm, as biological template Characteristic sequence, storage in systems, are used for user identity authentication.
In certification link, the corresponding biological information of acquisition user, such as fingerprint, face, iris, refer to vein, and The characteristic sequence that sample is extracted using algorithm same as registration link, by the template characteristic sequence in sample characteristics sequence and system Column are compared, and obtain the result of authentication.Therefore, traditional bio-identification identity identifying technology needs in advance by user's Template characteristic sequence stores in systems, for the use of subsequent certification link.
However, no matter user template characteristic sequence is stored in background server, it is still stored in terminal device, is all suffered from The risk of user biological characteristic sequence leakage, the template characteristic sequence of user may be stolen, and be illegally used, to make At the immeasurable consequence such as privacy leakage, property loss, security threat.
Summary of the invention
In view of the deficiencies in the prior art, the purpose of the present invention is to provide a kind of identity based on biological identification to recognize Card method, this method is more safe and reliable, can thoroughly prevent user biological characteristic sequence from being leaked.
To achieve the above objectives, the technical solution adopted by the present invention is that:
A kind of identity identifying method based on biological identification, comprising steps of
S1: in user's registration, obtaining the identity information of user, acquires the biological information of user, generates corresponding Biological identification, and encryption key is generated according to the biological identification, preset plaintext is encrypted using the encryption key, The registration ciphertext of user is obtained, and establishes the identity information of user and the linked list of registration ciphertext one-to-one relationship, and deposit It stores up in registration ciphertext database;
S2: when user to be verified carries out authentication, the biological information of user to be verified is acquired, is generated to be verified The biological identification of user, and decruption key is generated according to the biological identification of the user to be verified;
S3: being decrypted the registration ciphertext in the registration ciphertext database using the decruption key, according to whether It is decrypted in the presence of registration ciphertext and successfully judges whether the authentication of user to be verified passes through.
Based on the above technical solution, the specific steps of above-mentioned steps S3 include:
Judge whether to obtain the identity information of user to be verified;
If not obtaining the identity information of user to be verified, using the decruption key in the registration ciphertext database All registration ciphertexts are decrypted, and register ciphertext if it exists and are decrypted successfully, then the authentication of the user to be verified passes through, Subscriber identity information corresponding with successfully registration ciphertext is decrypted is the body of user to be verified in the linked list Part information;Registration ciphertext is decrypted successfully if it does not exist, then the authentication of the user to be verified does not pass through;
If obtaining the identity information of user to be verified, search whether that there are to be verified in the registration ciphertext database The identity information of user, if it does not exist, then the authentication of the user to be verified does not pass through;If it exists, then it extracts described to be tested The corresponding registration ciphertext of identity information of user is demonstrate,proved, and is decrypted using registration ciphertext of the decruption key to extraction, if Successful decryption, then the authentication of the user to be verified passes through, if decryption is unsuccessful, the authentication of the user to be verified is not Pass through.
Based on the above technical solution, the detailed process of encryption key is generated in step S1 according to the biological identification Are as follows: it is close to generate corresponding encryption using pseudorandom number generator using the biological identification as the seed of pseudorandom number generator Key.
Based on the above technical solution, the biological information for acquiring user generates the side of corresponding biological identification Method are as follows: the characteristic sequence for extracting the biological information is handled the characteristic sequence using special algorithm, generation pair The biological identification answered.
Based on the above technical solution, the special algorithm can be Fuzzy extractor, fuzzy safety box or fuzzy Promise to undertake algorithm.
Based on the above technical solution, the method for default plaintext is generated are as follows: the plaintext generator of preset algorithm is loaded, The relevant information of user is input in the plaintext generator, the plaintext generator generates preset plaintext.
The present invention also provides a kind of identity authorization systems based on biological identification, including registration module and authentication module;
The registration module is used in user's registration, obtains the identity information of user, acquires the biological characteristic letter of user Breath generates corresponding biological identification, and generates encryption key according to the biological identification, using the encryption key to preset It is encrypted in plain text, obtains the registration ciphertext of user, and established the identity information of user and register ciphertext one-to-one relationship Linked list, and store into registration ciphertext database;
The authentication module is used to acquire the biological characteristic letter of user to be verified when user to be verified carries out authentication Breath generates the biological identification of user to be verified, and generates decruption key according to the user biological mark to be verified, using described The registration ciphertext in the registration ciphertext database is decrypted in decruption key, is decrypted into according to whether there is registration ciphertext Function, judges whether the authentication of user to be verified passes through.
Based on the above technical solution, the authentication module includes that judging unit, the first authentication unit and second are recognized Demonstrate,prove unit;
The judging unit is for judging whether to obtain the identity information of user to be verified;
First authentication unit is used to make when judging unit judgement does not obtain the identity information of user to be verified Registration ciphertext all in the registration ciphertext database is decrypted with the decruption key, and judges whether there is registration Ciphertext is decrypted successfully, and if it exists, then the authentication of the user to be verified passes through, in the linked list be decrypted into The corresponding subscriber identity information of registration ciphertext of function, the identity information of user as to be verified, if it does not exist, then this is to be verified The authentication of user does not pass through;
Second authentication unit is used for when the judging unit judges to obtain the identity information of user to be verified, in the note Search whether that there are the identity informations of user to be verified in volume ciphertext database, if it does not exist, then the identity of the user to be verified Certification does not pass through;If it exists, then the corresponding registration ciphertext of identity information of the user to be verified is extracted, and uses the decryption The registration ciphertext that key pair is extracted is decrypted, if successful decryption, the authentication of the user to be verified passes through, if decryption is not Success, then the authentication of the user to be verified does not pass through.
Based on the above technical solution, the registration module and authentication module respectively include that a pseudo random number occurs Device, and the two pseudorandom number generators are consistent;
The registration module is also used to utilize pseudorandom using the biological identification of user as the seed of pseudorandom number generator Number generator generates corresponding encryption key;
The authentication module is also used to utilize using the biological identification of user to be verified as the seed of pseudorandom number generator Pseudorandom number generator generates corresponding decruption key.
Compared with the prior art, the advantages of the present invention are as follows: the identity identifying method of the invention based on biological identification, In After the biological information for collecting user, corresponding biological identification can be first generated, and generate according to the biological identification Encryption key, using the encryption key to encrypting in plain text after, obtain registration ciphertext, then the registration ciphertext stored, at this In the process, the information of storage is registration ciphertext, is not user biological characteristic information, more securely and reliably, user biological is not present The risk that characteristic sequence is leaked.
Detailed description of the invention
Fig. 1 is the schematic diagram of register flow path in the identity identifying method based on biological identification in the embodiment of the present invention;
Fig. 2 is the schematic diagram of identifying procedure in the identity identifying method based on biological identification in the embodiment of the present invention.
Specific embodiment
Invention is further described in detail with reference to the accompanying drawings and embodiments.
Shown in Figure 1, the embodiment of the present invention provides a kind of identity identifying method based on biological identification, including registration flow Journey and identifying procedure.
The register flow path of the embodiment of the present invention specifically includes that steps are as follows:
A1: in user's registration, obtaining the identity information of user, and acquires the biological information of user, the life of user Object characteristic information can for fingerprint, face, iris, refer to vein, gait, vocal print, brain wave, sclera etc.;
A2: according to the biological information of user, the characteristic sequence of the biological information is extracted, and utilizes special algorithm The characteristic sequence is handled, corresponding biological identification is generated, in embodiments of the present invention, the special algorithm used can be with For Fuzzy extractor, fuzzy safety box or fuzzy promise scheduling algorithm;
A3: it is close to generate encryption using pseudorandom number generator using biological identification as the seed of pseudorandom number generator Key;
A4: preset plaintext is encrypted using the encryption key, obtains the registration ciphertext of user;
A5: establishing subscriber identity information and registers the linked list of ciphertext one-to-one relationship, and the linked list is deposited It stores up in registration ciphertext database, completes identity registration.
Further, there are many preset plaintext acquisition modes used in step A4, it is preferable that generate default plaintext Method are as follows: the relevant information of user is input in the plaintext generator, is stated clearly by the plaintext generator for loading preset algorithm Literary generator generates preset plaintext, and during this, it can be Hash that the algorithm that plaintext generator uses, which is not particularly limited, Function, exclusive or, with or with or splicing, cascade and its form etc. arbitrarily is applied in combination, the relevant information of user, which is not also done, to be had Body limitation can be true random number, address name, user identity card number, account name, mailbox number, cell-phone number, bank account, clothes Account, passport No., the work trade mark, the biological identification etc. of business device distribution.
Specifically, when being encrypted using the encryption key to preset plaintext, the Encryption Algorithm that uses can be for DES, 3DES, TDEA, Blowfish, RC2, RC4, RC5, IDEA, SKIPJACK, AES etc..
Shown in Figure 2, the identifying procedure of the embodiment of the present invention specifically includes that steps are as follows:
B1: when user to be verified carries out authentication, the biological information of user to be verified is acquired;
B2: according to the biological information of user to be verified, the characteristic sequence of the biological information is extracted, and utilizes spy Determine algorithm to handle the characteristic sequence, generate corresponding biological identification, to the processing method of characteristic sequence in this step It is identical as the processing method in register flow path step A2;
B3: using method identical with register flow path step A3, generates decryption according to the user biological mark to be verified Key;
B4: judge whether to obtain the identity information of user to be verified, if not obtaining the identity information of user to be verified, jump Step B5 is gone to, if obtaining the identity information of user to be verified, go to step B7;
B5: registration ciphertext all in the registration ciphertext database is decrypted using the decruption key;
B6: it judges whether there is registration ciphertext and is decrypted successfully, register ciphertext if it exists and be decrypted successfully, then this is to be verified The authentication of user passes through, and searches in the linked list that step A5 is established corresponding with successfully registration ciphertext is decrypted Subscriber identity information, the subscriber identity information found are the identity information of user to be verified;Ciphertext quilt is registered if it does not exist Successful decryption, then the authentication of the user to be verified does not pass through;
B7: search whether that there are the identity informations of user to be verified in the registration ciphertext database, and if it exists, then hold Row step B8, if it does not exist, then the authentication of the user to be verified does not pass through;
B8: extracting the corresponding registration ciphertext of identity information of the user to be verified, and using the decruption key to mentioning The registration ciphertext taken is decrypted, if successful decryption, the authentication of the user to be verified passes through, if decryption is unsuccessful, The authentication of the user to be verified does not pass through.
The identity identifying method based on biological identification of the embodiment of the present invention, the biological information for collecting user it Afterwards, corresponding biological identification can be first generated, and encryption key is generated according to the biological identification, using the encryption key to bright After text is encrypted, registration ciphertext is obtained, then store the registration ciphertext, in this course, the information of storage is registration ciphertext, It is not user biological characteristic information, more securely and reliably, there is no the risks that user biological characteristic sequence is leaked.
The embodiment of the invention also provides a kind of identity authorization systems based on biological identification, including registration module and certification Module;
The registration module is used in user's registration, acquires the biological information of user, generates corresponding biology mark Know, and encryption key is generated according to the biological identification, preset plaintext is encrypted using the encryption key, is used The registration ciphertext at family, and by the storage corresponding with registration ciphertext of the identity information of user into registration ciphertext database;
The authentication module is used to acquire the biological characteristic letter of user to be verified when user to be verified carries out authentication Breath generates the biological identification of user to be verified, and generates decruption key according to the biological identification of the user to be verified, uses institute It states decruption key the registration ciphertext in the registration ciphertext database is decrypted, be decrypted according to whether there is registration ciphertext Success, judges whether the authentication of user to be verified passes through.
Further, the authentication module includes judging unit, the first authentication unit and the second authentication unit;
The judging unit is for judging whether to obtain the identity information of user to be verified;
First authentication unit is used to make when judging unit judgement does not obtain the identity information of user to be verified Registration ciphertext all in the registration ciphertext database is decrypted with the decruption key, and judges whether there is registration Ciphertext is decrypted successfully, and if it exists, then the authentication of the user to be verified passes through, and searches and be decrypted in linked list The successfully corresponding subscriber identity information of registration ciphertext, the subscriber identity information found are the identity letter of user to be verified Breath;If it does not exist, then the authentication of the user to be verified does not pass through;
Second authentication unit is used for when the judging unit judges to obtain the identity information of user to be verified, in the note Search whether that there are the identity informations of user to be verified in volume ciphertext database, if it does not exist, then the identity of the user to be verified Certification does not pass through;If it exists, then the corresponding registration ciphertext of identity information of the user to be verified is extracted, and uses the decryption The registration ciphertext that key pair is extracted is decrypted, if successful decryption, the authentication of the user to be verified passes through, if decryption is not Success, the authentication of the user to be verified do not pass through.
Specifically, the registration module and authentication module respectively include a pseudorandom number generator, and the two pseudorandoms Number generator is consistent;
The registration module is also used to utilize pseudorandom using the biological identification of user as the seed of pseudorandom number generator Number generator generates corresponding encryption key;The authentication module be also used to using the biological identification of user to be verified as it is pseudo- with The seed of machine number generator generates corresponding decruption key using pseudorandom number generator.
The identity authorization system based on biological identification of the embodiment of the present invention, the biological information for collecting user it Afterwards, corresponding biological identification can be first generated, and encryption key is generated according to the biological identification, using the encryption key to bright After text is encrypted, registration ciphertext is obtained, then store the registration ciphertext, in this course, the information of storage is registration ciphertext, It is not user biological characteristic information, more securely and reliably, there is no the risks that user biological characteristic sequence is leaked.
It should be understood that system provided by the above embodiment is when carrying out authentication operation, only with above-mentioned each function The division progress of module, can be complete by different function module by above-mentioned function distribution as needed for example, in practical application At the internal structure of system being divided into different functional modules, to complete all or part of the functions described above.
The present invention is not limited to the above-described embodiments, for those skilled in the art, is not departing from Under the premise of the principle of the invention, several improvements and modifications can also be made, these improvements and modifications are also considered as protection of the invention Within the scope of.The content being not described in detail in this specification belongs to the prior art well known to professional and technical personnel in the field.

Claims (9)

1. a kind of identity identifying method based on biological identification, which is characterized in that comprising steps of
S1: in user's registration, the identity information of user is obtained, acquires the biological information of user, generates corresponding biology Mark, and encryption key is generated according to the biological identification, preset plaintext is encrypted using the encryption key, is obtained The registration ciphertext of user, and the identity information of user and the linked list of registration ciphertext one-to-one relationship are established, and store and arrive It registers in ciphertext database;
S2: when user to be verified carries out authentication, the biological information of user to be verified is acquired, user to be verified is generated Biological identification, and according to the biological identification of the user to be verified generate decruption key;
S3: being decrypted the registration ciphertext in the registration ciphertext database using the decruption key, according to whether in the presence of Registration ciphertext, which is decrypted, successfully judges whether the authentication of user to be verified passes through.
2. as described in claim 1 based on the identity identifying method of biological identification, which is characterized in that above-mentioned steps S3's is specific Step includes:
Judge whether to obtain the identity information of user to be verified;
If not obtaining the identity information of user to be verified, owned using the decruption key in the registration ciphertext database Registration ciphertext be decrypted, if it exists register ciphertext be decrypted successfully, then the authentication of the user to be verified passes through, in institute Stating subscriber identity information corresponding with successfully registration ciphertext is decrypted in linked list is that the identity of user to be verified is believed Breath;Registration ciphertext is decrypted successfully if it does not exist, then the authentication of the user to be verified does not pass through;
If obtaining the identity information of user to be verified, search whether that there are users to be verified in the registration ciphertext database Identity information, if it does not exist, then the authentication of the user to be verified does not pass through;If it exists, then the use to be verified is extracted The corresponding registration ciphertext of the identity information at family, and be decrypted using registration ciphertext of the decruption key to extraction, if decryption Success, then the authentication of the user to be verified passes through, if decryption is unsuccessful, the authentication of the user to be verified is obstructed It crosses.
3. as described in claim 1 based on the identity identifying method of biological identification, which is characterized in that in step S1 according to The detailed process of biological identification generation encryption key are as follows: raw using pseudorandom number generator using the biological identification as seed At corresponding encryption key.
4. as described in claim 1 based on the identity identifying method of biological identification, which is characterized in that the biology for acquiring user is special Reference breath, the method for generating corresponding biological identification are as follows: the characteristic sequence for extracting the biological information utilizes special algorithm The characteristic sequence is handled, corresponding biological identification is generated.
5. as claimed in claim 4 based on the identity identifying method of biological identification, it is characterised in that: the special algorithm can be with For Fuzzy extractor, fuzzy safety box or fuzzy promise algorithm.
6. as described in claim 1 based on the identity identifying method of biological identification, which is characterized in that generate the side of default plaintext Method are as follows: the relevant information of user is input in the plaintext generator, the plaintext by the plaintext generator for loading preset algorithm Generator generates preset plaintext.
7. a kind of identity authorization system based on biological identification, it is characterised in that: including registration module and authentication module;
The registration module is used in user's registration, is obtained the identity information of user, is acquired the biological information of user, raw Encryption key is generated at corresponding biological identification, and according to the biological identification, using the encryption key to preset plaintext It is encrypted, obtains the registration ciphertext of user, and establish the identity information of user and being associated with for registration ciphertext one-to-one relationship List, and store into registration ciphertext database;
The authentication module is used to acquire the biological information of user to be verified when user to be verified carries out authentication, The biological identification of user to be verified is generated, and decruption key is generated according to the user biological mark to be verified, uses the solution Registration ciphertext in registration ciphertext database described in close key pair is decrypted, and is decrypted into according to whether there is registration ciphertext Function, judges whether the authentication of user to be verified passes through.
8. as claimed in claim 7 based on the identity authorization system of biological identification, it is characterised in that: the authentication module includes Judging unit, the first authentication unit and the second authentication unit;
The judging unit is for judging whether to obtain the identity information of user to be verified;
First authentication unit is used to use institute when judging unit judgement does not obtain the identity information of user to be verified It states decruption key registration ciphertext all in the registration ciphertext database is decrypted, and judges whether there is registration ciphertext It is decrypted successfully, and if it exists, then the authentication of the user to be verified passes through, and in the linked list and is decrypted successful Register the corresponding subscriber identity information of ciphertext, the identity information of user as to be verified, if it does not exist, then the user to be verified Authentication do not pass through;
Second authentication unit is used for when the judging unit judges to obtain the identity information of user to be verified, close in the registration Search whether that there are the identity informations of user to be verified in literary database, if it does not exist, then the authentication of the user to be verified Do not pass through;If it exists, then the corresponding registration ciphertext of identity information of the user to be verified is extracted, and uses the decruption key The registration ciphertext of extraction is decrypted, if successful decryption, the authentication of the user to be verified passes through, if decryption not at Function, then the authentication of the user to be verified does not pass through.
9. as claimed in claim 7 based on the identity authorization system of biological identification, it is characterised in that: the registration module and recognize Demonstrate,proving module respectively includes a pseudorandom number generator, and the two pseudorandom number generators are consistent;
The registration module is also used to send out using the biological identification of user as the seed of pseudorandom number generator using pseudo random number Raw device, generates corresponding encryption key;
The authentication module is also used to using the biological identification of user to be verified as the seed of pseudorandom number generator, using puppet with Machine number generator generates corresponding decruption key.
CN201810362573.7A 2018-04-20 2018-04-20 Identity identifying method and system based on biological identification Pending CN110392029A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810362573.7A CN110392029A (en) 2018-04-20 2018-04-20 Identity identifying method and system based on biological identification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810362573.7A CN110392029A (en) 2018-04-20 2018-04-20 Identity identifying method and system based on biological identification

Publications (1)

Publication Number Publication Date
CN110392029A true CN110392029A (en) 2019-10-29

Family

ID=68283519

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810362573.7A Pending CN110392029A (en) 2018-04-20 2018-04-20 Identity identifying method and system based on biological identification

Country Status (1)

Country Link
CN (1) CN110392029A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111259946A (en) * 2020-01-12 2020-06-09 杭州复杂美科技有限公司 Mnemonic word generating method, mnemonic word recovering method, equipment and storage medium
CN111555873A (en) * 2020-05-07 2020-08-18 四川普思科创信息技术有限公司 Remote authentication method, device and system
CN111740958A (en) * 2020-05-22 2020-10-02 卓望数码技术(深圳)有限公司 Data encryption method, data decryption method, encryption and decryption transmission method and system
CN112671782A (en) * 2020-12-28 2021-04-16 福建网龙计算机网络信息技术有限公司 File encryption method and terminal
CN114553413A (en) * 2022-02-28 2022-05-27 西安电子科技大学 Access authentication and key derivation method and system for biological identification identity authentication
CN114584314A (en) * 2022-02-28 2022-06-03 天翼安全科技有限公司 Registration method, device, equipment and medium
CN114697043A (en) * 2022-03-14 2022-07-01 国网山东省电力公司信息通信公司 Identity authentication unified management platform based on block chain technology and authentication method thereof
CN115913580A (en) * 2023-02-21 2023-04-04 杭州天谷信息科技有限公司 Homomorphic encryption-based biometric authentication method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130232542A1 (en) * 2012-03-02 2013-09-05 International Business Machines Corporation System and method to provide server control for access to mobile client data
CN106533697A (en) * 2016-12-06 2017-03-22 上海交通大学 Random number generating and extracting method and application thereof to identity authentication
CN106846623A (en) * 2017-02-10 2017-06-13 深圳怡化电脑股份有限公司 A kind of bank card business dealing for self-service device processes method and self-service device
CN107332659A (en) * 2017-05-24 2017-11-07 舒翔 A kind of identity identifying method based on biological characteristic, storage medium and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130232542A1 (en) * 2012-03-02 2013-09-05 International Business Machines Corporation System and method to provide server control for access to mobile client data
CN106533697A (en) * 2016-12-06 2017-03-22 上海交通大学 Random number generating and extracting method and application thereof to identity authentication
CN106846623A (en) * 2017-02-10 2017-06-13 深圳怡化电脑股份有限公司 A kind of bank card business dealing for self-service device processes method and self-service device
CN107332659A (en) * 2017-05-24 2017-11-07 舒翔 A kind of identity identifying method based on biological characteristic, storage medium and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
杨得新等: "基于生物特征和口令放大的远程认证协议", 《计算机工程与应》 *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111259946A (en) * 2020-01-12 2020-06-09 杭州复杂美科技有限公司 Mnemonic word generating method, mnemonic word recovering method, equipment and storage medium
CN111555873A (en) * 2020-05-07 2020-08-18 四川普思科创信息技术有限公司 Remote authentication method, device and system
CN111740958A (en) * 2020-05-22 2020-10-02 卓望数码技术(深圳)有限公司 Data encryption method, data decryption method, encryption and decryption transmission method and system
CN112671782A (en) * 2020-12-28 2021-04-16 福建网龙计算机网络信息技术有限公司 File encryption method and terminal
CN112671782B (en) * 2020-12-28 2023-03-14 福建网龙计算机网络信息技术有限公司 File encryption method and terminal
CN114553413A (en) * 2022-02-28 2022-05-27 西安电子科技大学 Access authentication and key derivation method and system for biological identification identity authentication
CN114584314A (en) * 2022-02-28 2022-06-03 天翼安全科技有限公司 Registration method, device, equipment and medium
CN114553413B (en) * 2022-02-28 2023-10-13 西安电子科技大学 Access authentication and key derivation method and system for biometric identity authentication
CN114697043A (en) * 2022-03-14 2022-07-01 国网山东省电力公司信息通信公司 Identity authentication unified management platform based on block chain technology and authentication method thereof
CN114697043B (en) * 2022-03-14 2023-11-14 国网山东省电力公司信息通信公司 Identity authentication unified management platform based on blockchain technology and authentication method thereof
CN115913580A (en) * 2023-02-21 2023-04-04 杭州天谷信息科技有限公司 Homomorphic encryption-based biometric authentication method and system

Similar Documents

Publication Publication Date Title
CN110392029A (en) Identity identifying method and system based on biological identification
CN107332659B (en) Identity authentication method, storage medium and system based on biological characteristics
CN107819587B (en) Authentication method based on fully homomorphic encryption, user equipment and authentication server
CN106101136B (en) A kind of authentication method and system of biological characteristic comparison
CN104735065B (en) A kind of data processing method, electronic equipment and server
CN104579649B (en) Personal identification method and system
JPWO2003069489A1 (en) Identification method
CN106603234A (en) Method, device and system for device identity authentication
CN110290134B (en) Identity authentication method, identity authentication device, storage medium and processor
CN105187389B (en) A kind of Web access method and system for obscuring encryption based on number
CN109493058A (en) A kind of personal identification method and relevant device based on block chain
CN101174953A (en) Identity authentication method based on S/Key system
CN108830502A (en) A kind of seal system
CN108540470A (en) Verification System and method based on digital certificate label
CN107733636A (en) Authentication method and Verification System
CN108959891A (en) Brain electricity identity identifying method based on privacy sharing
CN106936775A (en) A kind of authentication method and system based on fingerprint recognition
CN109981290A (en) The communication system and method close based on no certificate label under a kind of intelligent medical environment
CN107180342A (en) A kind of guard method of block chain private key, apparatus and system
CN114241560A (en) Face recognition privacy protection system and method
CN108075894A (en) A kind of authentication on-line processing method and system
CN104639528A (en) DBA (database administrator) mobile client counterattack method and DBA mobile client counterattack device
CN108667801A (en) A kind of Internet of Things access identity safety certifying method and system
CN109039643B (en) A kind of sustainable method for authenticating user identity and system based on electromagnetic radiation
CN110392030A (en) A kind of authentication based on biological characteristic, method for processing business and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191029