CN114036485A - Face characteristic cooperative protection safety authentication system under public network - Google Patents

Face characteristic cooperative protection safety authentication system under public network Download PDF

Info

Publication number
CN114036485A
CN114036485A CN202111595747.2A CN202111595747A CN114036485A CN 114036485 A CN114036485 A CN 114036485A CN 202111595747 A CN202111595747 A CN 202111595747A CN 114036485 A CN114036485 A CN 114036485A
Authority
CN
China
Prior art keywords
authentication
user
server
face
template
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111595747.2A
Other languages
Chinese (zh)
Inventor
郭灵玉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202111595747.2A priority Critical patent/CN114036485A/en
Publication of CN114036485A publication Critical patent/CN114036485A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The application constructs a security authentication model based on biological feature protection under a public network environment from two aspects of a security authentication protocol based on human face feature cooperative protection and a security authentication system based on human face feature cooperative protection respectively, combines the features of biological feature identity authentication and an authentication interaction process under the public network environment to obtain a server for bearing the tasks of storing human face features and completing feature matching, realizes the cross-terminal identity authentication based on biological features, provides a security authentication framework based on human face feature cooperative protection suitable for two parties participating under a cross-terminal application scene, abstracts a feature cooperative protection algorithm based on a transformation technology, focuses on the security of a feature specific shell and authentication data, provides security guarantee on a human face identity authentication interaction process, realizes the interaction process from a bottom processing module to protocol authentication, and meets the security requirement of biological feature identity authentication under the public network environment, an authentication protocol with unified usability and safety is constructed.

Description

Face characteristic cooperative protection safety authentication system under public network
Technical Field
The application relates to a face feature collaborative protection security authentication system, in particular to a face feature collaborative protection security authentication system in a public network, and belongs to the technical field of face feature security authentication.
Background
With the rapid rise of cloud computing and big data, the coverage of public network services is wider and wider, and the requirement on identity security authentication is more and more. In the face of increasing identity authentication requirements, security authentication should be developed towards easy use, low cost and high security. The security of the traditional authentication technology based on password mainly depends on the complexity of the password, so that the usability and the security of the identity authentication technology form a reverse association relationship, namely, the simpler the password, the worse the security, the more complex the password with better security, and the difficulty in remembering the password. Although the hardware token-based authentication technology has high security, the deployment cost is high, and the use is inconvenient and the usability is poor. The emergence of biometric identification technology has brought a new opportunity for the construction of secure and user-friendly identity authentication technology. Compared with password passwords, the biological features are more complex, are bound with biological individuals for the lifetime and have stability, and are not easy to forget and lose although the biological features are complex. The biometric feature is inherent, and does not need to carry an additional authentication object like a hardware token, so that the user experience of the biometric authentication process is better. However, the uniqueness and irrevocability of the original biological features pose a potential safety hazard for the biological feature authentication system, and the safety of the biological features, particularly the human face features, in the public network environment becomes a concern.
Along with the rapid development of mobile networks, the performance of intelligent terminal equipment is stronger, many smart phone manufacturers use face recognition as a mobile phone standard, each financial payment platform starts to support the research of identity authentication technologies such as faces and irises, and the biometric authentication technology is accepted and used by more and more people. The rapid development of biometric technology has led to the face recognition technology being widely applied to security authentication protocols, however, the biometric features themselves have the characteristics of being irrevocable, being bound with user identities one by one, and the biometric feature data reflecting the biological privacy information, etc., so that the security of the original biometric features in the public network environment faces a serious challenge. Under ideal environment, the verifier of the identity authentication defaults to be an entity which is honest and believable, and can faithfully carry out the biometric identity authentication and safely store the user biometric characteristics. In reality, however, the biometric features of the user present a number of security problems, since the server verifier is at the other end of the intricate network. Firstly, the characteristic data stored by the verifier server has potential threat of being stolen, and the characteristic data submitted to the verifier server by a user is possibly intercepted by a third party in the network transmission process; secondly, the original biological characteristics are uniquely bound with the user, and characteristic revocation is difficult to realize on a common application server; in addition, it is possible for a dishonest application server to impersonate a user to access other servers using the user's biometric. The safety of the biological characteristics is guaranteed on the premise of identity authentication of the biological characteristics, and on the basis, the establishment of an authentication protocol with unified usability and safety is very important and has great application prospect.
On the basis of solving the problems of convenience and safety of user identity authentication, the prior art provides a plurality of authentication methods based on cryptography, and in the application of the authentication methods, large enterprises such as banks and the like adopt hardware token technologies such as U shields and the like to support the identity authentication, but the U shield token technology is rarely adopted by small and medium-sized enterprises and users due to the problems of high configuration, updating and maintenance costs and the like. Moreover, the hardware token cannot be used with the mobile smart device. Although the software token technology reduces the security of authentication and has the advantages of convenience and cheapness in deployment of hard tokens, the cost problem is rarely adopted, and the user verification requirement of the mobile intelligent device is difficult to meet. In addition, with the popularization of mobile phones, dynamic passwords become another common user authentication mode gradually, the dynamic passwords can only be used once within a certain time limit, in reality, most users only use one mobile phone to complete transaction and identity authentication simultaneously, and the technology cannot ensure the sufficient safety of user information and cannot be applied to identity authentication of a mobile public network.
In summary, the prior art face feature security authentication technology has many defects, and the current major defects and difficulties include:
firstly, the biological characteristics have the characteristics of non-revocable property, one-to-one binding with user identities, biological characteristic data reflecting biological privacy information and the like, so that the safety of the original biological characteristics in a public network environment faces a severe challenge, in a practical situation, as a server verifier is positioned at the other end of an intricate and complex network, the biological characteristics of a user have a plurality of safety problems, the characteristic data stored by a verifier server has a potential threat of being stolen, and the characteristic data submitted to the verifier server by the user is possibly intercepted by a third party in a network transmission process; the original biological characteristics are uniquely bound with the user, and characteristic revocation is difficult to realize on a common application server; a dishonest application server may impersonate a user to access other servers using the user's biometric characteristics; in the prior art, the face feature identity authentication can not simultaneously consider two aspects of biological feature cooperative protection and the safety of an authentication protocol under a public network environment, and the authentication protocol with unified availability and safety can not be constructed;
secondly, the usability of the biometric authentication system is directly influenced by the processing of the face feature template in the prior art, because the original face data extracted twice has data disturbance, the prior art directly encrypts the original face information by using a cryptographic algorithm, although the safety of face feature transmission is ensured, the matching performance of the encrypted face features is poor, the specific shell of the face needs to be decrypted before the application server performs specific shell matching, the face feature matching query efficiency is low, the precision and the practicability are poor, and the practical value is almost lost; in addition, the generated face template has no revocable property, because the original face of the user is unchangeable and unique for the whole life, the interlinkage of the face template between servers and the safety of the original face are protected, the face specific shell registered by the user is bound with the server and is subjected to irreversible processing, and the complete original face cannot be recovered from the face specific shell, but the prior art cannot completely realize the point;
thirdly, the safety of the parameters required by the feature template generation cannot be ensured through a safety protocol in the prior art, a reliable face feature collaborative protection algorithm is not introduced into a safety authentication protocol, the correct implementation of the feature collaborative protection algorithm cannot be ensured, the parameter acquisition and negotiation process is lacked, the safety of the template generated data cannot be ensured, the face feature collaborative protection algorithm and the negotiation process cannot be effectively implemented, the usability, the safety and the reliability of the face feature safety authentication are poor, the face feature safety authentication cannot be popularized to a plurality of important fields, the application is greatly limited, and the application has almost no practical value in the actual identity identification application;
fourthly, the prior art does not protect the face feature processing module of the user end equipment in place, a reasonable hardware evaluation mechanism is lacked, the original face is acquired and obtained at the user end equipment, the prior art does not introduce a user end equipment environment evaluation mechanism, the original face participating in the protocol cannot be guaranteed to be legal, a security authentication protocol and a feature collaborative protection algorithm are not combined, the safety of original face feature data cannot be guaranteed, revocation of a template is not supported, a user seriously depends on the terminal equipment during registration when performing identity authentication, and serious problems exist in safety and reliability.
Aiming at the safety problem of the biological characteristic specific shell, the method and the system develop safety certification based on biological characteristics from two aspects of certification protocol design and certification system realization, provide a safety certification framework based on face characteristic cooperative protection, design a safety certification protocol based on characteristic cooperative protection and realize the system. Aiming at the biological characteristic identity authentication characteristics and the safety requirements of the characteristic template, a biological characteristic cooperative protection model and an authentication interaction flow are designed, convenient and quick biological characteristic identity authentication is realized on the premise of protecting a biological characteristic specific shell, and the problem of unified availability and safety of biological characteristic identity authentication in a public network environment is solved.
Disclosure of Invention
The application is based on the face characteristic cooperative protection problem in the face safety authentication protocol, a safety authentication model based on biological characteristic protection under a public network environment is respectively constructed from two aspects of the face characteristic cooperative protection safety authentication protocol and the face characteristic cooperative protection safety authentication system, a safety authentication framework with two parties participating is provided, a server is obtained by combining the characteristics of biological characteristic identity authentication under the public network environment and an authentication interaction process, the server bears a specific shell of storage characteristics and completes the task of characteristic matching, the cross-terminal identity authentication based on biological characteristics can be realized, a safety authentication framework based on the face characteristic cooperative protection suitable for two parties participating under a cross-terminal application scene is provided, a characteristic cooperative protection algorithm based on a transformation technology is abstracted, the safety of the specific shell of the characteristics and authentication data is concerned, and the safety guarantee on the face identity authentication interaction process is provided, the method realizes the interactive flow from the bottom processing module to the protocol authentication, fully considers the safety of the human face characteristic specific shell, meets the safety requirement of biological characteristic identity authentication under the public network environment, and constructs the authentication protocol with unified availability and safety.
In order to achieve the technical effects, the technical scheme adopted by the application is as follows:
a face feature collaborative protection safety authentication system under a public network is used for constructing a safety authentication model based on biological feature protection under the public network environment from two aspects of a safety authentication protocol of face feature collaborative protection and a safety authentication system of face feature collaborative protection based on the face feature collaborative protection problem in the face safety authentication protocol, and a safety authentication framework with participation of two parties is provided;
firstly, a safety authentication protocol based on face feature collaborative protection comprises: the system comprises a safety authentication framework based on face feature collaborative protection, a face feature collaborative protection model, a certificateless public key and secret key collaborative protection system, a certificateless change negotiation protocol and a face feature collaborative protection method based on specific shell transformation; wherein, the face characteristic cooperative protection model comprises: model structural feature definition, a human face security authentication protocol and a protocol mathematical model;
combining the characteristics of the biological characteristic identity authentication under a public network environment and an authentication interaction process, obtaining a server, undertaking tasks of storing a characteristic specific shell and completing characteristic matching, and realizing cross-terminal identity authentication based on biological characteristics, designing a safety authentication framework based on face characteristic cooperative protection suitable for participation of two parties under a cross-terminal application scene, abstracting a characteristic cooperative protection algorithm based on a transformation technology, paying attention to the safety of the characteristic specific shell and authentication data, and providing safety guarantee on a face identity authentication interaction process;
secondly, the safety certification system based on face feature collaborative protection comprises: the system comprises a system overall architecture, a system module design, a system registration process design and a system authentication process design, and realizes an interactive flow from a bottom processing module to protocol authentication.
A face feature collaborative protection safety authentication system under a public network further provides a safety authentication framework of face feature collaborative protection under a central model, a server executes matching operation, only an authentication template needs to be submitted during authentication, and the server performs matching;
and (3) registration process: the method comprises the steps that a user side acquires associated information and necessary parameters of an application server, the user side acquires face data of a user, the user side binds an original face with a server identifier and generates a face specific shell in an irreversible transformation mode, and the user side sends the user identifier and the face specific shell to the application server;
and (3) authentication process: the method comprises the steps that a user side acquires the association information and necessary parameters of an application server, the user side acquires user face data, the user side binds an original face with a server identifier and can not perform inverse transformation to generate an authentication template, then the authentication template and the user identifier are sent to the server, the server searches for a registration template according to the user identifier, and the registration template is matched with the authentication template to complete the whole identity authentication.
The face characteristic cooperative protection algorithm is modeled, identity authentication is completed based on the face characteristic cooperative protection algorithm, a user terminal equipment registration protocol is designed, and evaluation of the environment and performance of the user terminal equipment and negotiation of a characteristic cooperative protection algorithm change item are achieved.
The face characteristic collaborative protection safety certification system under the public network, further, the model structure characteristic definition: the face feature collaborative protection model is divided into three modules, which are respectively: the system comprises a user registration template generation module, a user authentication template generation module and a specific shell matching module, wherein the user registration template generation module is completed in the registration process, and the latter two modules are completed in the authentication process;
the user end equipment firstly scans the face of a user J through a face sensor to obtain an original face image JjThen, extracting the features to obtain the face feature data ZjThe face feature is transformed by using a special shell transformation method, and feature data Z is obtainedjConverting the special cipher shell into a special cipher shell, wherein the conversion parameters are divided into user side parameters and server side parameters, the user side parameters are used when a template is generated, the server side parameters are used for de-converting the special shell before the special shell is matched, the conversion parameters are generated by a value shared by a user j and a server i and respective private keys, and the respective private keys of the user j and the server i do not directly participate in the generation of the special shell and the matching of the special shell;
defining one: in the face feature cooperative protection model, VJAjIdentity, CJA, representing user jiThe identity mark of the server i is represented, and the registration template stored in the server i by the user j is RjiN for authentication template generated at the time of authentication of user jjiRepresents;
definition II: if the parameter of the known user terminal equipment is w1Server side parameter w2The sharing parameter between the user and the server is w, and the private key of the user is cwjThe server private key is cwiThe user side parameter generation algorithm is fsThe server-side parameter number generation algorithm is fcThen, there are:
w1=fs(w,cwj,CJAi),w2=fc(w,cwi,VJAj);
defining three: if t represents a random value, the registration template generation algorithm of the user j is gtbfThen, there are:
Rji=gtbf(Zj,w1,w2,t);
defining four: the authentication template generation algorithm of user j is gdvrThen, there are:
Nji=gdvr(Zj,w1,t);
definition of five: the specific shell matching algorithm of the server i is a, the visual value set by the system is b, and the matching result is expressed by s, then:
s=a(Rji,Nji,w2,b)∈{accepted,rejected};
design algorithm f that satisfies the following propertiess、fc、gtbf、gdvrAnd a, establishing a face feature collaborative protection model, and satisfying the following features based on a feature collaborative protection algorithm:
the method is characterized in that: algorithm gtbfAnd gdvrThe operation on the original characteristic data has irreversibility, namely for the algorithm x, under the condition of lacking a random value t used in the generation of the specific shell, the original face characteristic data Z is recoveredjComputationally infeasible;
the second characteristic: the parameters are bound with the private key, and the binding of the private key has irreversibility, namely a known parameter generation algorithm fsAnd fcFrom w1Recovery of cwjAnd by w2Recovery of cwiComputationally infeasible;
the characteristics are three: registration template RjiAnd an authentication template NjiWith matchability, or at parameter w2Has matching property after the solution of (1), namely to RjiAnd NjiSimilarity calculations may be performed.
Raw feature data ZjAnd the matching operation of the enrollment template and the authentication template irreversibly guarantees the safety of Z, the peculiar shell RjiAnd NjiMatching can be carried out to ensure that the face authentication is available.
The face characteristic collaborative protection safety authentication system under the public network, further, the face safety authentication protocol: the registration process of the face security authentication comprises the following steps:
the first process is as follows: between the user side and the server side: w, w2,VJAj,CJAi
Negotiating a sharing parameter w between the client device and the server for generating respective characteristic cooperative protection parameters w1,w2User side execution of w1=fs(w,cwj,CJAj) Server execution w2=fc(w,cwi,VJAi);
And a second process: user side to server side: rji
User end equipment captures original face JjExtracting characteristic data ZjGenerating an algorithm g using the authentication templatedvrGenerating a registration template RjiAnd sending to the server; server receiving characteristic special shell RjiAnd storing the VJA in own databasej,w,w2,Rji};
After the registration is completed, the authentication process of the user comprises the following steps:
scheme 1: user side to server side: VJAj
The user end sends VJA the identity of the user to be authenticated to the serverj
And (2) a flow scheme: server-to-client: w is a
The server is according to VJAjFinding out the sharing value w and sending the sharing value w to the user side equipment;
and (3) a flow path: user side to server side: n is a radical ofji
The user end equipment is according to the shared value w and the private key cwjGenerating a parameter w1The user end equipment captures an original face JjExtracting characteristic data ZjGenerating an algorithm g using the authentication templatetbfGenerating an authentication template NjiAnd sending to the server; the server is according to VJAjFind register template RjiCalling the specific shell matching algorithm a and the authentication template NjiMatching is carried out, a matching result s is sent to the user terminal equipment, if the result is accepted, the authentication is passed, otherwise, the service is refused; the generation of the registration template and the authentication template depends on the shared value negotiated by the user end device and the application server in the registration stage, and the cancellation of the face peculiar shell is realized by changing the shared value w.
The face characteristic collaborative protection safety certification system under the public network, further, the protocol mathematical model: the specific shell generation algorithm in the face feature cooperative protection model carries out reversible and irreversible transformation on features, and the definition of the face feature cooperative protection model based on the feature transformation comprises the following steps:
define six: face feature cooperative protection model based on feature transformations、fc、gtbf、gdvrAnd a, five algorithms are composed:
input user side private key cwjParameter generation algorithm fsOutput w1
Inputting the server private key cwiParameter generation algorithm fcOutput w2
Inputting user face feature data ZjUser side parameter w1Server parameter w2Algorithm output registration template Nji
Inputting user personFace feature data ZjAnd user side parameter w1Algorithm output authentication template Rji
Input registration template NjiAnd an authentication template RjiOutputting a matching result s by a specific shell matching algorithm, wherein s belongs to { accepted, rejected };
correctness: gtbfRegistration process for face identity authentication, { gdvrA, forming an authentication process of face identity authentication, a corresponding to a matching process of the face, acquiring an original face by a user side, defaulting to have enough protection on the original face, generating all specific shells at the user side, and protecting the specific shells by the whole model according to an implemented specific shell generation algorithm gtbf、gdvrAnd parameters w, w participating in the algorithm1,w2
Feasibility: by algorithm fcGenerated parameter w2With the server private key cwiBinding, Algorithm fcEnsuring private key cwiSecurity of (2), register template RjiAnd an authentication template NjiAdding random number factor to ensure original face feature not to be revealed, RjiAnd NjiAt w2Is matched.
The face characteristic cooperative protection safety certification system under the public network, further, the certificateless public key and secret key cooperative protection system: the key pairs of the user side and the server are obtained by the following method:
with SjRepresenting member j in the system, identified as SJAjThe key agreement step includes:
the first step is as follows: sj→ secret key generation system: v. ofj,SJAj
SjSetting random numbers
Figure BDA0003430453010000071
As part of the master key of its own,
Figure BDA0003430453010000072
is FqA multiplier subgroup of FqIs a finite cyclic group, computingPartial key pair
Figure BDA0003430453010000073
SjStart negotiating a complete key pair with the key generation system, SjV is to bejAnd its own SJAjSending to a key generation system;
the second step is that: key generating System → Sj:kj,AWj
Key generation system setup random number
Figure BDA0003430453010000074
Computing partial key pairs
Figure BDA0003430453010000075
And according to vjAnd user SJAjCalculating Vj=H1(SJAj,kj,vj) And a partial private key AWj,H1For a particular hash function, then part of the public key kjAnd a partial private key AWjTo Sj
SjReceipt of AWjAnd kjThen calculate V firstj=H1(SJAj,kj,vj) And AWjThen start to check AWjValidity of, if valid, computing the private key Cj=AWj+xjPublic key (k)j,vj) Thus obtaining a complete key pair { (C)j,xj),(kj,vj) Else discard AWjAnd kjAnd returns to the first step to restart negotiating keys.
A face feature collaborative protection safety authentication system under a public network is further provided with a face feature collaborative protection method based on specific shell transformation: the biological specific shell is transformed into G (BR, Z) under the action of a random key Z, and is divided into two types of reversible transformation and irreversible transformation, wherein the reversible transformation key Z is used for recovering the original biological characteristic specific shell (BR), the irreversible transformation Z is a one-way key, the original biological specific shell cannot be recovered from a transformed result even if Z is known, and the definition of the human face characteristic cooperative protection model requires irreversible transformation on original characteristic data
The face feature collaborative protection method based on the specific shell transformation comprises a registration process and an authentication process:
(1) registration procedure
Step 1: collecting an original face image of a user, and extracting features to obtain a feature matrix Z;
step 2: generating a specific shell transform matrix E ═ E1,e2,…,emPerforming orthogonal operation H-E.Z on the characteristic matrix Z to obtain an orthogonal decomposition coefficient H-H1,h2,…,hm};
And 3, step 3: decomposing the specific shell transformation matrix E into two independent submatrices { E) according to a preset proportion t1,E2In which E1={e1,e2,…,en},E2={en+1,en+2,…,emIs divided into { H } corresponding orthogonal decomposition coefficients1,H2},H1={h1,h2,…,hn},H2={hn+1,hn+2,…,hmH, where t ═ H1/H=n/m;
And 4, step 4: to H1Face encryption is carried out, and the encryption operation is set as B, WbIs a randomly generated key, then pair H1Is H1b=B(H1,Wb) (ii) a To H2Performing key binding, and setting the binding operation as G, WgIs the key to bind, then pair H2Is H2g=B(H2,Wg);
And 5, step 5: to H1bAnd H2gPerforming orthogonal fusion operation to obtain a feature ciphertext Hbg=E1·H1b+E1·H1b
(2) Authentication procedure
The step (1): collecting original face images of users, extracting features to obtain a feature matrix Z*
Step (2): generating an orthogonal matrix E*={e1 *,e2 *,…,en *,en+1,en+2,…,em}={E1 *,E2For feature matrix Z*Performing an orthogonal operation H*=E*·Z*To obtain an orthogonal decomposition coefficient H*={h1 *,h2 *,…,hm *};
Step (3): decomposing the orthogonal matrix E into two independent sub-matrices { E } according to a preset proportion t1 *,E2In which E1 *={e1 *,e2 *,…,en *},E2={en+1,en+2,…,emIs divided into { H } corresponding orthogonal decomposition coefficients1 *,H2 *},H1 *={h1 *,h2 *,…,hn *},H2 *={hn+1 *,hn+2 *,…,hm *H, where t ═ H1/H=n/m;
Step (4): to H1 *Face encryption is carried out to obtain H1b *=B(H1 *,Wb *) Let H2g *=H2 *
Step (5): to H1b *And H2g *Performing orthogonal fusion operation to obtain a feature ciphertext Hbg *=E1 *·H1b *+E2 *·H2e *
Step (6): by using E2To HbgAnd Hbg *Performing orthogonal decomposition to extract matching domain feature Hw=G-1(E2·Zbg,E2)=H2g-E2=H2And Hw *=E2·Zbg *=H2 *
Step (7): to findSolution of HwAnd Hw *The covariance value of (a) completes the specific shell matching.
Face feature collaborative protection model rules based on specific shell transformation:
rule 1: parameter w1Is defined as a sub-matrix E1Algorithm fsDescribed as first producing a matrix partition ratio t from a shared value w, identifying CJA by a serveriAnd a user private key cwjGenerating a submatrix E1
Rule 2: parameter w2Is defined as a sub-matrix E2Algorithm fcDescribed as first producing a matrix division ratio t from the shared value w, identified by the user VJAjAnd server private key cwiGenerating a submatrix E2
Rule 3: algorithm gtbfDescribed as steps 3 to 5 of the registration procedure, registering the template RjiAs a feature ciphertext HbgRandom secret key WbIs a random number factor;
rule 4: algorithm gdvrDescribed as steps (3) to (5) of the authentication process, the authentication template NjiAs a feature ciphertext Hbg *Random secret key Wb *Is a random number factor;
rule 5: algorithm a is described as steps (6) to (7) of the authentication procedure, HwAnd Hw *The covariance value of (a) is within the range of a given error b, namely the matching is successful, otherwise, the matching is failed.
The face characteristic collaborative protection safety certification system under the public network, further, the system overall structure: the face processing association algorithm is realized through the client, the server is communicated during identity authentication, authentication data are written into the database, the face processing association algorithm is written into a safety area for the client, and the whole system comprises three parts:
(1) the user: providing an original face and necessary identification information;
(2) customer premise equipment: generating parameters, generating a registration template and generating an authentication template, wherein an algorithm associated with a face is realized in a security zone, a specific shell generation module of the security zone collects the face, generates the registration template, sends the registration template to a common zone application program and forwards the registration template to an application server during registration, the specific shell generation module of the security zone sends the original face to generate an encrypted authentication template to the application server through the common zone application program during authentication, before the authentication is started, the security zone carries out security evaluation on user equipment and sends an evaluation result to the application server for verification.
(3) A server: and the system is responsible for storing the received face registration template into a database, searching the database through the identity provided by the user to obtain the registration template for the authentication template, and calling a matching algorithm to match the registration template with the authentication template.
The face characteristic collaborative protection safety certification system under the public network, further, the system registration process design: the registration process is a step which is required to be carried out when a user accesses the server in the associated application for the first time, only the user which is successfully registered can obtain the service, a safety area is introduced into user terminal equipment, and the safety area independently exists in the process;
the user opens an application program needing identity authentication to trigger a face security authentication system, and the application program in the non-security area sends an access request to the server; the server receives the access request and then VJA according to the user identificationjInquiring whether a user is registered in a database, and if the user is not registered, starting change item negotiation by the user side equipment and the server; the safety area carries out integrity check on the self program, generates an evaluation report and sends the evaluation report and an intermediate result of the shared value to be negotiated to the server; the server checks the user side evaluation report, and completes change item negotiation with the user side after the check is passed; the user end negotiates a shared value w and generates a parameter w1,w2Using these parameters, the client security zone module starts to generate the registration template RjiThe application program in the non-safety area of the user end sends the generated registration template to the server, and the server stores the registration template R in the database after receiving the registration templatejiAnd shared value w, server parameter w2And user identification VJAj
A face feature cooperative protection safety certification system under public network, further, a system certification process deviceCounting: after the user finishes the registration in the registration stage, the authentication process is triggered when the user accesses the server again, under the condition that the safe area participates independently, the user opens an application program needing identity authentication to trigger the face safety authentication system, the non-safe area application program sends an access request to the server, and the server receives the access request and then sends VJA user identificationjInquiring whether a user is registered in a database, and starting a user process if the user is registered; the safety area carries out integrity check on the self program, generates an evaluation report and sends the evaluation report to the server together with the parameter request; the server checks the user side evaluation report, and responds the shared value w negotiated during registration to a user side security area after the check is passed; the user terminal generates a parameter w according to the shared value w1User side safety zone module utilizing parameter w1Generating an authentication template NjiThe non-safety area application program of the user side sends the generated authentication template to the server; after the server receives the authentication template, it is identified VJA according to the user's IDjQuerying a database for a registration template RjiAnd server parameter w2Server pair registration template RjiAnd an authentication template NjiAnd executing matching operation, and returning a matching result, namely an authentication result, to the user side application program, so that the user knows whether the user successfully authenticates.
Compared with the prior art, the innovation points and advantages of the application are as follows:
firstly, the application constructs a security authentication model based on biological feature protection under a public network environment from two aspects of a security authentication protocol based on human face feature cooperative protection and a security authentication system based on human face feature cooperative protection respectively based on human face feature cooperative protection in a human face security authentication protocol, provides a security authentication framework with two parties participating, combines the features of biological feature identity authentication under the public network environment and an authentication interaction process to obtain a security authentication framework based on biological feature which is suitable for two parties participating under a cross-terminal application scene and can realize cross-terminal identity authentication based on biological feature by bearing the tasks of storing a feature specific shell and completing feature matching, and provides a security authentication framework based on human face feature cooperative protection suitable for two parties participating under the cross-terminal application scene, abstracts a feature cooperative protection algorithm based on a transformation technology, pays attention to the security of the feature specific shell and authentication data and provides security guarantee on a human face identity authentication interaction process, the interaction process from a bottom processing module to protocol authentication is realized, the safety of the human face characteristic specific shell is fully considered, the safety requirement of biological characteristic identity authentication under a public network environment is met, and powerful guarantee is provided for the cooperative protection of biological characteristics;
secondly, a safety authentication protocol based on face feature cooperative protection is provided, a face feature transformation method and a feature cooperative protection algorithm are abstracted based on the relation between face feature cooperative protection and the authentication protocol from the safety requirement of the face safety authentication protocol, a safety authentication framework based on face feature cooperative protection is designed according to the characteristics and the safety requirement of face identity authentication, a feature cooperative protection method is improved, a method substitution model based on orthogonal transformation is fused, and an authentication protocol with unified usability and safety is constructed;
thirdly, designing and realizing an authentication system using a safety authentication protocol based on feature cooperative protection, analyzing responsibility of each participant of the authentication protocol, designing a safety interface to hide bottom layer human face feature processing details and protect safety of human face features of a user, combining the human face safety authentication protocol with a trusted hardware technology, and designing a safety authentication system method based on human face feature cooperative protection, which is suitable for a public network environment, greatly improves authentication efficiency compared with an original human face feature safety authentication system, can enable human face feature cooperative protection safety authentication to be more widely applied, and has high sensitivity, safety and practicability;
fourthly, the application also improves partial detail problems: firstly, the processing of the feature template does not affect the usability of the biometric authentication system; the generated face specific shell has revocable property, the original face of the user is unchangeable and unique for the whole life, and in order to avoid the interlinkability of the face specific shell between servers and protect the safety of the original face, the face specific shell registered by the user is bound with the server and cannot recover the complete original face from the face specific shell through irreversible treatment; thirdly, the safety of the parameters required by the generation of the characteristic specific shell is ensured through a safety protocol while the characteristic template is cooperatively protected, and the protocol designs the processes of parameter acquisition and negotiation for ensuring the correct implementation of a characteristic cooperative protection algorithm; and fourthly, designing a reasonable hardware evaluation mechanism based on the protection requirements of the face feature processing module of the user side equipment, acquiring and acquiring the original face at the user side equipment, and introducing the environment evaluation mechanism of the user side equipment into the protocol to ensure that the original face participating in the protocol is legal.
Drawings
Fig. 1 is a schematic diagram of a security authentication architecture based on face feature collaborative protection.
Fig. 2 is a schematic diagram of a registration process of face security authentication according to the present application.
Fig. 3 is a schematic view of an authentication process of face security authentication according to the present application.
FIG. 4 is a schematic process diagram of a face feature cooperative protection method based on the special shell transformation.
Fig. 5 is an overall architecture diagram of a security authentication system based on face feature cooperative protection.
Fig. 6 is a design diagram of a user side of a security authentication system based on face feature cooperative protection.
Fig. 7 is a server-side design diagram of a security authentication system based on face feature cooperative protection.
Fig. 8 is a flowchart of a registration process executed by the security authentication system based on face feature collaborative protection.
Fig. 9 is a flowchart of a security authentication system executing authentication process based on face feature cooperative protection.
Fig. 10 is a sequence diagram of authentication executed by a security authentication system based on face feature cooperative protection.
Detailed description of the invention
The technical solution of the system for cooperatively protecting security authentication by using face features in a public network provided in the present application is further described below with reference to the accompanying drawings, so that those skilled in the art can better understand the present application and can implement the present application.
With the rapid development of mobile public networks, the performance of intelligent terminal equipment is getting stronger, smart phone manufacturers use face recognition as mobile phone standards, various financial payment platforms start to support the research of face, iris and other identity authentication technologies, and biometric authentication technologies are widely accepted and used. The biometric features have the characteristics of lifelong binding and stability with the biological individuals, the biometric feature authentication technology is widely applied to the security authentication protocol, however, the uniqueness of the original biometric features makes the original biometric features irrevocable, and the data carries the privacy information of the biological individuals, so that the security of the original biometric information in a public network environment faces a serious challenge. In practical application, because the server verifier is at the other end of the complicated network, the data stored by the verifier server has a potential threat of being stolen, and the characteristic data submitted to the verifier server by the user can be intercepted by a third party. Therefore, the security of the biological characteristic data is the premise of the biological characteristic identity authentication, and the construction of an authentication protocol with unified usability and security has an important role on the basis.
The method is based on the face feature collaborative protection problem in the face security authentication protocol, a security authentication model based on biological feature protection in a public network environment is respectively constructed from two aspects of the face feature collaborative protection security authentication protocol and the face feature collaborative protection security authentication system, and a security authentication architecture with participation of two parties is provided;
firstly, a safety authentication protocol based on face feature collaborative protection comprises: the system comprises a safety authentication framework based on face feature collaborative protection, a face feature collaborative protection model, a certificateless public key and secret key collaborative protection system, a certificateless change negotiation protocol and a face feature collaborative protection method based on specific shell transformation; wherein, the face characteristic cooperative protection model comprises: model structural feature definition, a human face security authentication protocol and a protocol mathematical model;
combining the characteristics of the biological characteristic identity authentication under a public network environment and an authentication interaction process, obtaining a safety authentication framework which is suitable for two parties to participate under a cross-terminal application scene and is based on face characteristic cooperative protection, wherein the server bears a storage characteristic specific shell and completes the task of characteristic matching so as to realize the cross-terminal identity authentication based on biological characteristics, abstracting a characteristic cooperative protection algorithm based on a transformation technology, paying attention to the safety of the characteristic specific shell and authentication data, and providing safety guarantee on a face identity authentication interaction process;
secondly, the safety certification system based on face feature collaborative protection comprises: the system comprises a system overall architecture, a system module design, a system registration process design and a system authentication process design, realizes an interactive flow from a bottom processing module to protocol authentication, and fully considers the safety of the human face characteristic specific shell.
The safety authentication protocol and the authentication system implementation method based on the characteristic cooperative protection meet the safety requirement of biological characteristic identity authentication in a public network environment and provide powerful guarantee for the cooperative protection of biological characteristics.
Safety authentication protocol based on face feature cooperative protection
In a public network environment, a face recognition technology is applied without protecting an original face, so that hidden dangers are certainly left for the safety of user identity information. Protecting original face features, namely designing a safe face feature cooperative protection algorithm and designing a face feature safety authentication protocol on the basis of the face feature cooperative protection algorithm to ensure that the face feature cooperative protection algorithm can be correctly implemented. According to the available protection requirements of face security authentication, the application provides a security authentication method based on face feature cooperative protection, which comprises two key modules, namely a face feature cooperative protection model and a change negotiation protocol.
Safety certification framework based on face feature cooperative protection
The application provides a security authentication architecture for face feature collaborative protection under a central model, as shown in fig. 1. The server executes matching operation, only an authentication template needs to be submitted during authentication, the server performs matching, and under the condition that the application server is not completely trusted, the safety authentication method based on the characteristic cooperative protection comprises a registration process and an authentication process;
and (3) registration process: the method comprises the steps that a user side acquires associated information and necessary parameters of an application server, the user side acquires face data of a user, the user side binds an original face with a server identifier and generates a face specific shell in an irreversible transformation mode, and the user side sends the user identifier and the face specific shell to the application server;
and (3) authentication process: the method comprises the steps that a user side acquires the association information and necessary parameters of an application server, the user side acquires user face data, the user side binds an original face with a server identifier and can not perform inverse transformation to generate an authentication template, then the authentication template and the user identifier are sent to the server, the server searches for a registration template according to the user identifier, and the registration template is matched with the authentication template to complete the whole identity authentication.
The key problem to be solved is that: firstly, a face specific shell needs to be generated and stored in an application server, the face specific shell is associated with the server and is a ciphertext specific shell, original face information is prevented from being leaked, and a face feature collaborative protection model supporting revocable and protection of an original face is defined; secondly, matching the face specific shell, wherein the registration template and the authentication template are in a ciphertext state; and thirdly, generating the special shell at the user side, needing evaluation measures of the environment and the performance of the equipment at the user side, realizing the evaluation by a reasonable equipment registration protocol, and carrying out change item negotiation of the characteristic cooperative protection algorithm while evaluating the environment and the performance of the equipment.
Aiming at the problems, the face feature collaborative protection algorithm is modeled, the original face data is ensured to be safe, meanwhile, the appropriate face feature collaborative protection algorithm is searched to complete identity authentication, a user terminal device registration protocol is designed, and the evaluation of the environment and performance of the user terminal device and the feature collaborative protection algorithm change item negotiation are realized.
(II) face feature cooperative protection model
The face characteristic cooperative protection model is suitable for an authentication model matched with a server, the face safety authentication of a user does not depend on front-end equipment, the user can carry out remote identity authentication by using equipment with a face sensor and a face specific shell processing algorithm, the face specific shell of the user needs to be stored by the server or a third party, the submitted face specific shell needs to be encrypted for avoiding face privacy disclosure, and the face specific shell needs to be protected and can be submitted to the server.
1. Model structural feature definition
The face feature collaborative protection model defined by the application is divided into three modules, which are respectively: the system comprises a user registration template generation module, a user authentication template generation module and a specific shell matching module, wherein the user registration template generation module is completed in the registration process, and the latter two modules are completed in the authentication process.
The user end equipment firstly scans the face of a user J through a face sensor to obtain an original face image JjThen, extracting the features to obtain the face feature data ZjThe face feature is transformed by using a special shell transformation method, and feature data Z is obtainedjConverting the special cipher shell into a special cipher shell, wherein the conversion parameters are divided into user side parameters and server side parameters, the user side parameters are used when a template is generated, the server side parameters are used for de-converting the special shell before the special shell is matched, the conversion parameters are generated by a value shared by a user j and a server i and respective private keys, and the respective private keys of the user j and the server i do not directly participate in the generation of the special shell and the matching of the special shell;
defining one: in the face feature cooperative protection model, VJAjIdentity, CJA, representing user jiThe identity mark of the server i is represented, and the registration template stored in the server i by the user j is RjiN for authentication template generated at the time of authentication of user jjiRepresents;
definition II: if the parameter of the known user terminal equipment is w1Server side parameter w2The sharing parameter between the user and the server is w, and the private key of the user is cwjThe server private key is cwiThe user side parameter generation algorithm is fsThe server-side parameter number generation algorithm is fcThen, there are:
w1=fs(w,cwj,CJAi),w2=fc(w,cwi,VJAj);
defining three: if t represents a random value, the registration template generation algorithm of the user j is gtbfThen, there are:
Rji=gtbf(Zj,w1,w2,t);
defining four: by usingThe authentication template generation algorithm of the user j is gdvrThen, there are:
Nji=gdvr(Zj,w1,t);
definition of five: the specific shell matching algorithm of the server i is a, the visual value set by the system is b, and the matching result is expressed by s, then:
s=a(Rji,Nji,w2,b)∈{accepted,rejected};
design algorithm f that satisfies the following propertiess、fc、gtbf、gdvrAnd a, establishing a face feature collaborative protection model, and satisfying the following features based on a feature collaborative protection algorithm:
the method is characterized in that: algorithm gtbfAnd gdvrThe operation on the original characteristic data has irreversibility, namely for the algorithm x, under the condition of lacking a random value t used in the generation of the specific shell, the original face characteristic data Z is recoveredjComputationally infeasible;
the second characteristic: the parameters are bound with the private key, and the binding of the private key has irreversibility, namely a known parameter generation algorithm fsAnd fcFrom w1Recovery of cwjAnd by w2Recovery of cwiComputationally infeasible;
the characteristics are three: registration template RjiAnd an authentication template NjiWith matchability, or at parameter w2Has matching property after the solution of (1), namely to RjiAnd NjiSimilarity calculations may be performed.
The key of the face feature collaborative protection algorithm is to aim at the original feature data ZjAnd the matching operation of the enrollment template and the authentication template irreversibly guarantees the safety of Z, the peculiar shell RjiAnd NjiMatching can be carried out to ensure that the face authentication is available.
2. Face security authentication protocol
The registration process of face security authentication is shown in fig. 2.
The first process is as follows: between the user side and the server side: w, w2,VJAj,CJAi
Negotiating a sharing parameter w between the client device and the server for generating respective characteristic cooperative protection parameters w1,w2User side execution of w1=fs(w,cwj,CJAj) Server execution w2=fc(w,cwi,VJAi);
And a second process: user side to server side: rji
User end equipment captures original face JjExtracting characteristic data ZjGenerating an algorithm g using the authentication templatedvrGenerating a registration template RjiAnd sending to the server; server receiving characteristic special shell RjiAnd storing the VJA in own databasej,w,w2,Rji};
The process of authenticating the user after the registration is completed is shown in fig. 3.
Scheme 1: user side to server side: VJAj
The user end sends VJA the identity of the user to be authenticated to the serverj
And (2) a flow scheme: server-to-client: w is a
The server is according to VJAjFinding out the sharing value w and sending the sharing value w to the user side equipment;
and (3) a flow path: user side to server side: n is a radical ofji
The user end equipment is according to the shared value w and the private key cwjGenerating a parameter w1The user end equipment captures an original face JjExtracting characteristic data ZjGenerating an algorithm g using the authentication templatetbfGenerating an authentication template NjiAnd sending to the server; the server is according to VJAjFind register template RjiCalling the specific shell matching algorithm a and the authentication template NjiMatching is carried out, a matching result s is sent to the user terminal equipment, if the result is accepted, the authentication is passed, otherwise, the service is refused; the generation of the registration template and the authentication template depends on the shared value negotiated by the user end device and the application server in the registration stage, and the cancellation of the face peculiar shell is realized by changing the shared value w.
3. Protocol mathematical model
The specific shell generation algorithm in the face feature cooperative protection model carries out reversible and irreversible transformation on features, and the definition of the face feature cooperative protection model based on the feature transformation comprises the following steps:
define six: face feature cooperative protection model based on feature transformations、fc、gtbf、gdvrAnd a, five algorithms are composed:
input user side private key cwjParameter generation algorithm fsOutput w1
Inputting the server private key cwiParameter generation algorithm fcOutput w2
Inputting user face feature data ZjUser side parameter w1Server parameter w2Algorithm output registration template Nji
Inputting user face feature data ZjAnd user side parameter w1Algorithm output authentication template Rji
Input registration template NjiAnd an authentication template RjiOutputting a matching result s by a specific shell matching algorithm, wherein s belongs to { accepted, rejected };
correctness: gtbfRegistration process for face identity authentication, { gdvrA, forming an authentication process of face identity authentication, a corresponding to a matching process of the face, acquiring an original face by a user side, defaulting to have enough protection on the original face, generating all specific shells at the user side, and protecting the specific shells by the whole model according to an implemented specific shell generation algorithm gtbf、gdvrAnd parameters w, w participating in the algorithm1,w2
Feasibility: by algorithm fcGenerated parameter w2With the server private key cwiBinding, Algorithm fcEnsuring private key cwiSecurity of (2), register template RjiAnd an authentication template NjiAdding random number factor to ensure original face feature not to be revealed, RjiAnd NjiAt w2Is matched.
(III) certificateless public key and secret key cooperative protection system
The application designs a security authentication protocol based on characteristic cooperative protection, and the key pairs of the user side and the server are obtained according to the following method.
With SjRepresenting member j in the system, identified as SJAjThe key agreement step includes:
the first step is as follows: sj→ secret key generation system: v. ofj,SJAj
SjSetting random numbers
Figure BDA0003430453010000151
As part of the master key of its own,
Figure BDA0003430453010000152
is FqA multiplier subgroup of FqIs a finite cyclic group, calculates partial key pairs
Figure BDA0003430453010000153
SjStart negotiating a complete key pair with the key generation system, SjV is to bejAnd its own SJAjSending to a key generation system;
the second step is that: key generating System → Sj:kj,AWj
Key generation system setup random number
Figure BDA0003430453010000154
Computing partial key pairs
Figure BDA0003430453010000155
And according to vjAnd user SJAjCalculating Vj=H1(SJAj,kj,vj) And a partial private key AWj,H1For a particular hash function, then part of the public key kjAnd a partial private key AWjTo Sj
SjReceipt of AWjAnd kjThen calculate V firstj=H1(SJAj,kj,vj) And AWjThen start to check AWjValidity of, if valid, computing the private key Cj=AWj+xjPublic key (k)j,vj) Thus obtaining a complete key pair { (C)j,xj),(kj,vj) Else discard AWjAnd kjAnd returns to the first step to restart negotiating keys.
(IV) Certificateless-based change negotiation protocol
Aiming at the problem of generation of a change item in a face feature collaborative protection model, the application designs a certificateless-based change item negotiation protocol, an equipment authentication link is added in the certificateless-based change item negotiation protocol, before face identification authentication starts, environment of user side equipment is evaluated and detected, an evaluation result is sent to a server for verification, a user side negotiates a shared value w on the basis that equipment evaluation is passed, and if the user side equipment and the server both obtain a key pair through certificateless key negotiation, the key pair of the user side equipment is { (C)j,xj),(kj,vj) The key pair of the application server is { (C)i,xi),(ki,vi) And | | | is a join operation.
(V) face feature cooperative protection method based on specific shell transformation
The biological specific shell is transformed into G (BR, Z) under the action of a random key Z, and is divided into two types of reversible transformation and irreversible transformation, wherein the reversible transformation key Z is used for recovering the original biological characteristic specific shell (BR), the irreversible transformation Z is a one-way key, the original biological specific shell cannot be recovered from a transformed result even if Z is known, and the definition of the human face characteristic cooperative protection model requires irreversible transformation on original characteristic data
The face feature collaborative protection method process based on the specific shell transformation is represented by a figure 4, and comprises a registration process and an authentication process:
(1) registration procedure
Step 1: collecting an original face image of a user, and extracting features to obtain a feature matrix Z;
step 2: generating a specific shell transform matrix E ═ E1,e2,…,emPerforming orthogonal operation H-E.Z on the characteristic matrix Z to obtain an orthogonal decomposition coefficient H-H1,h2,…,hm};
And 3, step 3: decomposing the specific shell transformation matrix E into two independent submatrices { E) according to a preset proportion t1,E2In which E1={e1,e2,…,en},E2={en+1,en+2,…,emIs divided into { H } corresponding orthogonal decomposition coefficients1,H2},H1={h1,h2,…,hn},H2={hn+1,hn+2,…,hmH, where t ═ H1/H=n/m;
And 4, step 4: to H1Face encryption is carried out, and the encryption operation is set as B, WbIs a randomly generated key, then pair H1Is H1b=B(H1,Wb) (ii) a To H2Performing key binding, and setting the binding operation as G, WgIs the key to bind, then pair H2Is H2g=B(H2,Wg);
And 5, step 5: to H1bAnd H2gPerforming orthogonal fusion operation to obtain a feature ciphertext Hbg=E1·H1b+E1·H1b
(2) Authentication procedure
The step (1): collecting original face images of users, extracting features to obtain a feature matrix Z*
Step (2): generating an orthogonal matrix E*={e1 *,e2 *,…,en *,en+1,en+2,…,em}={E1 *,E2For feature matrix Z*Performing an orthogonal operation H*=E*·Z*To obtain an orthogonal decomposition coefficient H*={h1 *,h2 *,…,hm *};
Step (3): decomposing the orthogonal matrix E into two independent sub-matrices { E } according to a preset proportion t1 *,E2In which E1 *={e1 *,e2 *,…,en *},E2={en+1,en+2,…,emIs divided into { H } corresponding orthogonal decomposition coefficients1 *,H2 *},H1 *={h1 *,h2 *,…,hn *},H2 *={hn+1 *,hn+2 *,…,hm *H, where t ═ H1/H=n/m;
Step (4): to H1 *Face encryption is carried out to obtain H1b *=B(H1 *,Wb *) Let H2g *=H2 *
Step (5): to H1b *And H2g *Performing orthogonal fusion operation to obtain a feature ciphertext Hbg *=E1 *·H1b *+E2 *·H2e *
Step (6): by using E2To HbgAnd Hbg *Performing orthogonal decomposition to extract matching domain feature Hw=G-1(E2·Zbg,E2)=H2g-E2=H2And Hw *=E2·Zbg *=H2 *
Step (7): solving for HwAnd Hw *The covariance value of (a) completes the specific shell matching.
Face feature collaborative protection model rules based on specific shell transformation:
rule 1: parameter w1Is defined as a sub-matrix E1Algorithm fsDescribed as first sharing a valuew production matrix division ratio t, server identification CJAiAnd a user private key cwjGenerating a submatrix E1
Rule 2: parameter w2Is defined as a sub-matrix E2Algorithm fcDescribed as first producing a matrix division ratio t from the shared value w, identified by the user VJAjAnd server private key cwiGenerating a submatrix E2
Rule 3: algorithm gtbfDescribed as steps 3 to 5 of the registration procedure, registering the template RjiAs a feature ciphertext HbgRandom secret key WbIs a random number factor;
rule 4: algorithm gdvrDescribed as steps (3) to (5) of the authentication process, the authentication template NjiAs a feature ciphertext Hbg *Random secret key Wb *Is a random number factor;
rule 5: algorithm a is described as steps (6) to (7) of the authentication procedure, HwAnd Hw *The covariance value of (a) is within the range of a given error b, namely the matching is successful, otherwise, the matching is failed.
Safety authentication system based on face feature cooperative protection
System architecture
The face processing association algorithm is realized through the client, the server is communicated during identity authentication, authentication data is written into the database, and the face processing association algorithm is written into the safety area for the client. The overall architecture of the system is shown in fig. 5.
The whole system comprises three parts:
(1) the user: providing an original face and necessary identification information;
(2) customer premise equipment: generating parameters, generating a registration template and generating an authentication template, wherein an algorithm associated with a face is realized in a security zone, a specific shell generation module of the security zone collects the face, generates the registration template, sends the registration template to a common zone application program and forwards the registration template to an application server during registration, the specific shell generation module of the security zone sends the original face to generate an encrypted authentication template to the application server through the common zone application program during authentication, before the authentication is started, the security zone carries out security evaluation on user equipment and sends an evaluation result to the application server for verification.
(3) A server: and the system is responsible for storing the received face registration template into a database, searching the database through the identity provided by the user to obtain the registration template for the authentication template, and calling a matching algorithm to match the registration template with the authentication template.
(II) System Module design
1. Customer premise equipment: the generation of the specific face shell of the user is realized, and the user side operation of the face identity authentication is completed, and the system comprises a communication module, a face specific shell generation module and a face acquisition module, and is designed as shown in fig. 6.
The user terminal is divided into two parts: the method comprises the steps that a client side application program and a write-in safety area program are adopted, original face preprocessing, change item negotiation, generation of a registration template and a verification template of a user are all realized in the safety area, and in the verification process, the safety area carries out safety evaluation on client side equipment and sends an evaluation result to an application server for verification in a change item negotiation stage; the client application program is responsible for carrying out safe communication with the server, and the safe area program realizes face acquisition, change item negotiation, special shell generation and safety evaluation.
2. A server module: the server acts as an identity verifier and plays an important role in the whole system, and the server is designed as shown in fig. 7.
The server is divided into two parts: the system comprises a server program and a database, wherein the server program performs change negotiation with a client, verifies authentication data sent by a user, extracts a face specific shell stored in the database and matches an authentication template; the database stores user registration templates, and the server program comprises four parts: the method comprises a communication module, change item negotiation, specific shell matching and specific shell storage.
(III) System registration Process design
The registration process is a step that a user needs to access a server in an associated application for the first time, only the user who has successfully registered can obtain a service, a security zone is introduced into user end equipment, the security zone independently exists in the process, and the system executes the registration process as shown in the flowchart of fig. 8.
As shown in fig. 8, the user opens an application program requiring identity authentication to trigger a face security authentication system, and the non-security area application program sends an access request to the server; the server receives the access request and then VJA according to the user identificationjInquiring whether a user is registered in a database, and if the user is not registered, starting change item negotiation by the user side equipment and the server; the safety area carries out integrity check on the self program, generates an evaluation report and sends the evaluation report and an intermediate result of the shared value to be negotiated to the server; the server checks the user side evaluation report, and completes change item negotiation with the user side after the check is passed; the user end negotiates a shared value w and generates a parameter w1,w2Using these parameters, the client security zone module starts to generate the registration template RjiThe application program in the non-safety area of the user end sends the generated registration template to the server, and the server stores the registration template R in the database after receiving the registration templatejiAnd shared value w, server parameter w2And user identification VJAj
(IV) System authentication Process design
After the user completes registration in the registration stage, the authentication process is triggered when the user accesses the server again, and under the condition that the security zone participates independently, the authentication process corresponding to the user authentication process executed by the system is shown in the flowchart of fig. 9.
As shown in fig. 9, the user opens the application program requiring identity authentication to trigger the face security authentication system, the non-security area application program sends an access request to the server, and the server receives the access request and then VJA according to the user identifierjInquiring whether a user is registered in a database, and starting a user process if the user is registered; the safety area carries out integrity check on the self program, generates an evaluation report and sends the evaluation report to the server together with the parameter request; the server checks the user side evaluation report, and responds the shared value w negotiated during registration to a user side security area after the check is passed; the user terminal generates a parameter w according to the shared value w1User side safety zone module utilizationParameter w1Generating an authentication template NjiThe non-safety area application program of the user side sends the generated authentication template to the server; after the server receives the authentication template, it is identified VJA according to the user's IDjQuerying a database for a registration template RjiAnd server parameter w2Server pair registration template RjiAnd an authentication template NjiAnd executing matching operation, and returning a matching result, namely an authentication result, to the user side application program, so that the user knows whether the user successfully authenticates. The specific implementation sequence diagram of the authentication process is shown in fig. 10.

Claims (10)

1. A face feature collaborative protection safety authentication system under a public network is characterized in that a safety authentication model based on biological feature protection under a public network environment is respectively constructed from two aspects of a safety authentication protocol of face feature collaborative protection and a safety authentication system of face feature collaborative protection based on the face feature collaborative protection problem in a face safety authentication protocol, and a safety authentication framework with participation of two parties is provided;
firstly, a safety authentication protocol based on face feature collaborative protection comprises: the system comprises a safety authentication framework based on face feature collaborative protection, a face feature collaborative protection model, a certificateless public key and secret key collaborative protection system, a certificateless change negotiation protocol and a face feature collaborative protection method based on specific shell transformation; wherein, the face characteristic cooperative protection model comprises: model structural feature definition, a human face security authentication protocol and a protocol mathematical model;
combining the characteristics of the biological characteristic identity authentication under a public network environment and an authentication interaction process, obtaining a server, undertaking tasks of storing a characteristic specific shell and completing characteristic matching, and realizing cross-terminal identity authentication based on biological characteristics, designing a safety authentication framework based on face characteristic cooperative protection suitable for participation of two parties under a cross-terminal application scene, abstracting a characteristic cooperative protection algorithm based on a transformation technology, paying attention to the safety of the characteristic specific shell and authentication data, and providing safety guarantee on a face identity authentication interaction process;
secondly, the safety certification system based on face feature collaborative protection comprises: the system comprises a system overall architecture, a system module design, a system registration process design and a system authentication process design, and realizes an interactive flow from a bottom processing module to protocol authentication.
2. The system for the cooperative protection and the safety certification of the face features under the public network according to the claim 1 is characterized in that a safety certification framework for the cooperative protection of the face features under a central model is provided, a server executes matching operation, only an authentication template needs to be submitted during certification, and the server can carry out matching;
and (3) registration process: the method comprises the steps that a user side acquires associated information and necessary parameters of an application server, the user side acquires face data of a user, the user side binds an original face with a server identifier and generates a face specific shell in an irreversible transformation mode, and the user side sends the user identifier and the face specific shell to the application server;
and (3) authentication process: the method comprises the steps that a user side acquires the associated information and necessary parameters of an application server, the user side acquires user face data, the user side binds an original face with a server identifier and can not perform inverse transformation to generate an authentication template, then the authentication template and the user identifier are sent to a server, the server searches a registration template according to the user identifier, and the registration template is matched with the authentication template to complete the whole identity authentication;
the face characteristic cooperative protection algorithm is modeled, identity authentication is completed based on the face characteristic cooperative protection algorithm, a user terminal equipment registration protocol is designed, and evaluation of the environment and performance of the user terminal equipment and negotiation of a characteristic cooperative protection algorithm change item are achieved.
3. The system for face feature collaborative protection security authentication under the public network according to claim 1, wherein the model structure feature definition: the face feature collaborative protection model is divided into three modules, which are respectively: the system comprises a user registration template generation module, a user authentication template generation module and a specific shell matching module, wherein the user registration template generation module is completed in the registration process, and the latter two modules are completed in the authentication process;
the user end equipment firstly scans the face of a user J through a face sensor to obtain an original face image JjThen, extracting the features to obtain the face feature data ZjThe face feature is transformed by using a special shell transformation method, and feature data Z is obtainedjConverting the special cipher shell into a special cipher shell, wherein the conversion parameters are divided into user side parameters and server side parameters, the user side parameters are used when a template is generated, the server side parameters are used for de-converting the special shell before the special shell is matched, the conversion parameters are generated by a value shared by a user j and a server i and respective private keys, and the respective private keys of the user j and the server i do not directly participate in the generation of the special shell and the matching of the special shell;
defining one: in the face feature cooperative protection model, VJAjIdentity, CJA, representing user jiThe identity mark of the server i is represented, and the registration template stored in the server i by the user j is RjiN for authentication template generated at the time of authentication of user jjiRepresents;
definition II: if the parameter of the known user terminal equipment is w1Server side parameter w2The sharing parameter between the user and the server is w, and the private key of the user is cwjThe server private key is cwiThe user side parameter generation algorithm is fsThe server-side parameter number generation algorithm is fcThen, there are:
w1=fs(w,cwj,CJAi),w2=fc(w,cwi,VJAj);
defining three: if t represents a random value, the registration template generation algorithm of the user j is gtbfThen, there are:
Rji=gtbf(Zj,w1,w2,t);
defining four: the authentication template generation algorithm of user j is gdvrThen, there are:
Nji=gdvr(Zj,w1,t);
definition of five: the specific shell matching algorithm of the server i is a, the visual value set by the system is b, and the matching result is expressed by s, then:
s=a(Rji,Nji,w2,b)∈{accepted,rejected};
design algorithm f that satisfies the following propertiess、fc、gtbf、gdvrAnd a, establishing a face feature collaborative protection model, and satisfying the following features based on a feature collaborative protection algorithm:
the method is characterized in that: algorithm gtbfAnd gdvrThe operation on the original characteristic data has irreversibility, namely for the algorithm x, under the condition of lacking a random value t used in the generation of the specific shell, the original face characteristic data Z is recoveredjComputationally infeasible;
the second characteristic: the parameters are bound with the private key, and the binding of the private key has irreversibility, namely a known parameter generation algorithm fsAnd fcFrom w1Recovery of cwjAnd by w2Recovery of cwiComputationally infeasible;
the characteristics are three: registration template RjiAnd an authentication template NjiWith matchability, or at parameter w2Has matching property after the solution of (1), namely to RjiAnd NjiSimilarity calculation can be carried out;
raw feature data ZjAnd the matching operation of the enrollment template and the authentication template irreversibly guarantees the safety of Z, the peculiar shell RjiAnd NjiMatching can be carried out to ensure that the face authentication is available.
4. The system for collaborative protection and security authentication of human face features under public network according to claim 1, wherein the human face security authentication protocol: the registration process of the face security authentication comprises the following steps:
the first process is as follows: between the user side and the server side: w, w2,VJAj,CJAi
Negotiating a sharing parameter w between the client device and the server for generating respective characteristic cooperative protection parameters w1,w2User side execution of w1=fs(w,cwj,CJAj) Server execution w2=fc(w,cwi,VJAi);
And a second process: user side to server side: rji
User end equipment captures original face JjExtracting characteristic data ZjGenerating an algorithm g using the authentication templatedvrGenerating a registration template RjiAnd sending to the server; server receiving characteristic special shell RjiAnd storing the VJA in own databasej,w,w2,Rji};
After the registration is completed, the authentication process of the user comprises the following steps:
scheme 1: user side to server side: VJAj
The user end sends VJA the identity of the user to be authenticated to the serverj
And (2) a flow scheme: server-to-client: w is a
The server is according to VJAjFinding out the sharing value w and sending the sharing value w to the user side equipment;
and (3) a flow path: user side to server side: n is a radical ofji
The user end equipment is according to the shared value w and the private key cwjGenerating a parameter w1The user end equipment captures an original face JjExtracting characteristic data ZjGenerating an algorithm g using the authentication templatetbfGenerating an authentication template NjiAnd sending to the server; the server is according to VJAjFind register template RjiCalling the specific shell matching algorithm a and the authentication template NjiMatching is carried out, a matching result s is sent to the user terminal equipment, if the result is accepted, the authentication is passed, otherwise, the service is refused; the generation of the registration template and the authentication template depends on the shared value negotiated by the user end device and the application server in the registration stage, and the cancellation of the face peculiar shell is realized by changing the shared value w.
5. The system for cooperative protection and security authentication of human face features under public network according to claim 1, wherein the protocol mathematical model is: the specific shell generation algorithm in the face feature cooperative protection model carries out reversible and irreversible transformation on features, and the definition of the face feature cooperative protection model based on the feature transformation comprises the following steps:
define six: face feature cooperative protection model based on feature transformations、fc、gtbf、gdvrAnd a, five algorithms are composed:
input user side private key cwjParameter generation algorithm fsOutput w1
Inputting the server private key cwiParameter generation algorithm fcOutput w2
Inputting user face feature data ZjUser side parameter w1Server parameter w2Algorithm output registration template Nji
Inputting user face feature data ZjAnd user side parameter w1Algorithm output authentication template Rji
Input registration template NjiAnd an authentication template RjiOutputting a matching result s by a specific shell matching algorithm, wherein s belongs to { accepted, rejected };
correctness: gtbfRegistration process for face identity authentication, { gdvrA, forming an authentication process of face identity authentication, a corresponding to a matching process of the face, acquiring an original face by a user side, defaulting to have enough protection on the original face, generating all specific shells at the user side, and protecting the specific shells by the whole model according to an implemented specific shell generation algorithm gtbf、gdvrAnd parameters w, w participating in the algorithm1,w2
Feasibility: by algorithm fcGenerated parameter w2With the server private key cwiBinding, Algorithm fcEnsuring private key cwiSecurity of (2), register template RjiAnd an authentication template NjiAdding random number factor to ensure original face feature not to be revealed, RjiAnd NjiAt w2Is matched.
6. The system for face feature collaborative protection and security authentication under a public network according to claim 1, wherein the certificateless public key and secret key collaborative protection system comprises: the key pairs of the user side and the server are obtained by the following method:
with SjRepresenting member j in the system, identified as SJAjThe key agreement step includes:
the first step is as follows: sj→ secret key generation system: v. ofj,SJAj
SjSetting random numbers
Figure FDA0003430452000000041
As part of the master key of its own,
Figure FDA0003430452000000042
is FqA multiplier subgroup of FqIs a finite cyclic group, calculates partial key pairs
Figure FDA0003430452000000043
SjStart negotiating a complete key pair with the key generation system, SjV is to bejAnd its own SJAjSending to a key generation system;
the second step is that: key generating System → Sj:kj,AWj
Key generation system setup random number
Figure FDA0003430452000000044
Computing partial key pairs
Figure FDA0003430452000000045
And according to vjAnd user SJAjCalculating Vj=H1(SJAj,kj,vj) And a partial private key AWj,H1For a particular hash function, then part of the public key kjAnd a partial private key AWjTo Sj
SjReceipt of AWjAnd kjThen calculate V firstj=H1(SJAj,kj,vj) And AWjThen start to check AWjValidity of, if valid, computing the private key Cj=AWj+xjPublic key (k)j,vj) Thus obtaining a complete key pair { (C)j,xj),(kj,vj) Else discard AWjAnd kjAnd returns to the first step to restart negotiating keys.
7. The system for collaborative protection and security authentication of human face features under public network according to claim 1, wherein the method for collaborative protection of human face features based on specific shell transformation comprises: the biological specific shell is transformed into G (BR, Z) under the action of a random key Z, and is divided into two types of reversible transformation and irreversible transformation, wherein the reversible transformation key Z is used for recovering the original biological characteristic specific shell (BR), the irreversible transformation Z is a one-way key, the original biological specific shell cannot be recovered from a transformed result even if Z is known, and the definition of the human face characteristic cooperative protection model requires irreversible transformation on original characteristic data
The face feature collaborative protection method based on the specific shell transformation comprises a registration process and an authentication process:
(1) registration procedure
Step 1: collecting an original face image of a user, and extracting features to obtain a feature matrix Z;
step 2: generating a specific shell transform matrix E ═ E1,e2,…,emPerforming orthogonal operation H-E.Z on the characteristic matrix Z to obtain an orthogonal decomposition coefficient H-H1,h2,…,hm};
And 3, step 3: decomposing the specific shell transformation matrix E into two independent submatrices { E) according to a preset proportion t1,E2In which E1={e1,e2,…,en},E2={en+1,en+2,…,emIs divided into { H } corresponding orthogonal decomposition coefficients1,H2},H1={h1,h2,…,hn},H2={hn+1,hn+2,…,hmH, where t ═ H1/H=n/m;
And 4, step 4: to H1Face encryption is carried out, and the encryption operation is set as B, WbIs a randomly generated key, then pair H1Is H1b=B(H1,Wb) (ii) a To H2Performing key binding, and setting the binding operation as G, WgIs the key to bind, then pair H2Is H2g=B(H2,Wg);
And 5, step 5: to H1bAnd H2gPerforming orthogonal fusion operation to obtain a feature ciphertext Hbg=E1·H1b+E1·H1b
(2) Authentication procedure
The step (1): collecting original face images of users, extracting features to obtain a feature matrix Z*
Step (2): generating an orthogonal matrix E*={e1 *,e2 *,…,en *,en+1,en+2,…,em}={E1 *,E2For feature matrix Z*Performing an orthogonal operation H*=E*·Z*To obtain an orthogonal decomposition coefficient H*={h1 *,h2 *,…,hm *};
Step (3): decomposing the orthogonal matrix E into two independent sub-matrices { E } according to a preset proportion t1 *,E2In which E1 *={e1 *,e2 *,…,en *},E2={en+1,en+2,…,emIs divided into { H } corresponding orthogonal decomposition coefficients1 *,H2 *},H1 *={h1 *,h2 *,…,hn *},H2 *={hn+1 *,hn+2 *,…,hm *H, where t ═ H1/H=n/m;
Step (4): to H1 *Face encryption is carried out to obtain H1b *=B(H1 *,Wb *) Let H2g *=H2 *
Step (5): to H1b *And H2g *Performing orthogonal fusion operation to obtain a feature ciphertext Hbg *=E1 *·H1b *+E2 *·H2e *
Step (6): by using E2To HbgAnd Hbg *Performing orthogonal decomposition to extract matching domain feature Hw=G-1(E2·Zbg,E2)=H2g-E2=H2And Hw *=E2·Zbg *=H2 *
Step (7): solving for HwAnd Hw *Completing the matching of the specific shells by the covariance values;
face feature collaborative protection model rules based on specific shell transformation:
rule 1: parameter w1Is defined as a sub-matrix E1Algorithm fsDescribed as first producing a matrix partition ratio t from a shared value w, identifying CJA by a serveriAnd a user private key cwjGenerating a submatrix E1
Rule 2: parameter w2Is defined as a sub-matrix E2Algorithm fcDescribed as first producing a matrix division ratio t from the shared value w, identified by the user VJAjAnd server private key cwiGenerating a submatrix E2
Rule 3: algorithm gtbfDescribed as steps 3 to 5 of the registration procedure, registering the template RjiAs a feature ciphertext HbgRandom secret key WbIs a random number factor;
rule 4: algorithm gdvrDescribed as steps (3) to (5) of the authentication process, the authentication template NjiAs a feature ciphertext Hbg *Random secret key Wb *Is a random number factor;
rule 5: algorithm a is described as steps (6) to (7) of the authentication procedure, HwAnd Hw *The covariance value of (a) is within the range of a given error b, namely the matching is successful, otherwise, the matching is failed.
8. The system for face feature collaborative protection security authentication under the public network according to claim 1, wherein the system overall architecture is as follows: the face processing association algorithm is realized through the client, the server is communicated during identity authentication, authentication data are written into the database, the face processing association algorithm is written into a safety area for the client, and the whole system comprises three parts:
(1) the user: providing an original face and necessary identification information;
(2) customer premise equipment: generating parameters, generating a registration template and generating an authentication template, wherein an algorithm associated with a face is realized in a security zone, a specific shell generation module of the security zone collects the face, generates the registration template, sends the face, generates the registration template to a common zone application program and forwards the registration template to an application server during registration, the specific shell generation module of the security zone sends the original face, generates and encrypts the authentication template to the application server through the common zone application program during authentication, and before the authentication is started, the security zone performs security evaluation on user equipment and sends an evaluation result to the application server for verification;
(3) a server: and the system is responsible for storing the received face registration template into a database, searching the database through the identity provided by the user to obtain the registration template for the authentication template, and calling a matching algorithm to match the registration template with the authentication template.
9. The system for collaborative protection and security authentication of human face features under public network according to claim 1, wherein the system registration process is designed as follows: the registration process is a step which is required to be carried out when a user accesses the server in the associated application for the first time, only the user which is successfully registered can obtain the service, a safety area is introduced into user terminal equipment, and the safety area independently exists in the process;
the user opens an application program needing identity authentication to trigger a face security authentication system, and the application program in the non-security area sends an access request to the server; the server receives the access request and then VJA according to the user identificationjInquiring whether a user is registered in a database, and if the user is not registered, starting change item negotiation by the user side equipment and the server; the safety area carries out integrity check on the self program, generates an evaluation report and sends the evaluation report and an intermediate result of the shared value to be negotiated to the server; the server checks the user side evaluation report, and completes change item negotiation with the user side after the check is passed; the user end negotiates a shared value w and generates a parameter w1,w2Using these parameters, the client security zone module starts to generate the registration template RjiThe application program in the non-safety area of the user end sends the generated registration template to the server, and the server stores the registration template R in the database after receiving the registration templatejiAnd shared value w, server parameter w2And user identification VJAj
10. The system for face feature collaborative protection security authentication under a public network according to claim 1, wherein the system authentication process is designed as follows: after the user finishes the registration in the registration stage, the authentication process is triggered when the user accesses the server again, under the condition that the safe area participates independently, the user opens an application program needing identity authentication to trigger the face safety authentication system, the non-safe area application program sends an access request to the server, and the server receives the access request and then sends VJA user identificationjInquiring whether a user is registered in a database, and starting a user process if the user is registered; the safety area carries out integrity check on the self program, generates an evaluation report and sends the evaluation report to the server together with the parameter request; the server checks the user side evaluation report, and responds the shared value w negotiated during registration to a user side security area after the check is passed; the user terminal generates a parameter w according to the shared value w1User side safety zone module utilizing parameter w1Generating an authentication template NjiAuthentication module to be generated by application program in non-safety zone of user endThe board is sent to the server; after the server receives the authentication template, it is identified VJA according to the user's IDjQuerying a database for a registration template RjiAnd server parameter w2Server pair registration template RjiAnd an authentication template NjiAnd executing matching operation, and returning a matching result, namely an authentication result, to the user side application program, so that the user knows whether the user successfully authenticates.
CN202111595747.2A 2021-12-23 2021-12-23 Face characteristic cooperative protection safety authentication system under public network Pending CN114036485A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111595747.2A CN114036485A (en) 2021-12-23 2021-12-23 Face characteristic cooperative protection safety authentication system under public network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111595747.2A CN114036485A (en) 2021-12-23 2021-12-23 Face characteristic cooperative protection safety authentication system under public network

Publications (1)

Publication Number Publication Date
CN114036485A true CN114036485A (en) 2022-02-11

Family

ID=80141051

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111595747.2A Pending CN114036485A (en) 2021-12-23 2021-12-23 Face characteristic cooperative protection safety authentication system under public network

Country Status (1)

Country Link
CN (1) CN114036485A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117408395A (en) * 2023-12-14 2024-01-16 成都乐超人科技有限公司 Method and device for optimizing running stability of wind control platform based on digital supply chain

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117408395A (en) * 2023-12-14 2024-01-16 成都乐超人科技有限公司 Method and device for optimizing running stability of wind control platform based on digital supply chain
CN117408395B (en) * 2023-12-14 2024-04-02 成都乐超人科技有限公司 Method and device for optimizing running stability of wind control platform based on digital supply chain

Similar Documents

Publication Publication Date Title
US20220058655A1 (en) Authentication system
CN111818039B (en) Three-factor anonymous user authentication protocol method based on PUF in Internet of things
US20240129304A1 (en) Biometric electronic signature authenticated key exchange token
US9064257B2 (en) Mobile device transaction using multi-factor authentication
US11824991B2 (en) Securing transactions with a blockchain network
US7840813B2 (en) Method and system with authentication, revocable anonymity and non-repudiation
Chen et al. Mobile device integration of a fingerprint biometric remote authentication scheme
Li et al. Applying biometrics to design three‐factor remote user authentication scheme with key agreement
US20170339138A1 (en) Multifactor privacy-enhanced remote identification using a rich credential
IES20020190A2 (en) a biometric authentication system and method
Nagaraju et al. SecAuthn: Provably secure multi-factor authentication for the cloud computing systems
Wang et al. An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation
Kurmi et al. A survey of zero-knowledge proof for authentication
Yang et al. Cryptanalysis and improvement of a biometrics-based authentication and key agreement scheme for multi-server environments
Meshram et al. An efficient remote user authentication with key agreement procedure based on convolution-Chebyshev chaotic maps using biometric
CN114063651A (en) Method for mutual authentication between user and multiple unmanned aerial vehicles and storage medium
CN114036485A (en) Face characteristic cooperative protection safety authentication system under public network
WO2019148130A1 (en) Decentralized biometric authentication platform
Savitha et al. A unique secure multimodal biometrics-based user anonymous authenticated key management protocol (SMUAAKAP) based on block chain mechanism for generic HIoTNs
Buccafurri et al. Ethereum Transactions and Smart Contracts among Secure Identities.
KR20130014676A (en) User authentication method using biometric one-time password
Chen et al. An efficient and secure smart card based authentication scheme
CN116112242B (en) Unified safety authentication method and system for power regulation and control system
Naganuma et al. New secret key management technology for blockchains from biometrics fuzzy signature
Zhu et al. An efficient biometric authenticated protocol for arbitrary-domain-server with blockchain technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination