CN101674181A - User certification system using biological characteristic token - Google Patents

User certification system using biological characteristic token Download PDF

Info

Publication number
CN101674181A
CN101674181A CN200810212129A CN200810212129A CN101674181A CN 101674181 A CN101674181 A CN 101674181A CN 200810212129 A CN200810212129 A CN 200810212129A CN 200810212129 A CN200810212129 A CN 200810212129A CN 101674181 A CN101674181 A CN 101674181A
Authority
CN
China
Prior art keywords
user
biological characteristic
private key
token
biological
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN200810212129A
Other languages
Chinese (zh)
Inventor
郑建德
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN200810212129A priority Critical patent/CN101674181A/en
Publication of CN101674181A publication Critical patent/CN101674181A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a user certification system combining biological characteristic certification and token certification. The system converts a user biological characteristic pattern plate collected in advance into a private key, stores the private key in a biological characteristic token of the user and allows the user to keep the biological characteristic token by himself, so the cost neededto maintain the user biological characteristic database is saved, the loss of the user biological characteristic data is avoided, and the violation of privacy of the user is avoided. Supported by theinfrastructure of a public key, the user can obtain the biological characteristic token by any private key generator supporting the user certification system including the private key generator operated by a trusted third party and use the biological characteristic token in any application system compatible with the user certification system. The invention provides a relatively low-priced schemeto solve the problem of maintaining the biological characteristic data and regulate the use method of the biological characteristic data. By the user certification system, the biological characteristic certification technology can be widely applied to various computer application systems including trading systems of shopping centers and banks in a plug-and-play mode.

Description

Adopt the customer certification system of biological characteristic token
Technical field
The invention belongs to field of information security technology, more particularly, relate to a kind of customer certification system that adopts biological characteristic token.
Background technology
In recent years, digitlization biological characteristic authentication technology, ripe day by day as fingerprint characteristic and genetic fingerprints feature authentication techniques, the important means that becomes the computer application system authentification of user that has.The major advantage of biological characteristic authentication is that it has inseparable characteristic with the user, and comprises bigger amount of information, is not easy to be forged, and its major defect then is the biological attribute data storehouse that each Verification System all must be set up the user.If these systems use independent database, then the user need register its biological characteristic repeatedly, thereby forms the lot of data copy, is easy to cause characteristic to run off, and invades user's the right of privacy.On the other hand, require these systems to use unified feature database to be actually infeasible, because this needs a complex interface system, and a kind of transmission mechanism of complexity guarantees that the data in the database can be authenticated the use of terminal security ground by each, modern in fact valency will be very expensive, therefore certainly will hinder applying of biological characteristic authentication technology.
Summary of the invention
The object of the present invention is to provide a kind of customer certification system that adopts biological characteristic token, in computer application system, apply the problems referred to above that run into to solve the biological characteristic authentication technology.
For realizing above purpose, the present invention by the following technical solutions:
A kind of customer certification system that adopts biological characteristic token, this system physical/comprise in logic authenticating party, user, private key for user generator (PKG), biological characteristic token, wherein authenticating party and private key generator all have necessary apparatus equipment, in order to gather user's biological characteristic, as fingerprint characteristic, genetic fingerprints feature, sclera feature etc.; The authentication mechanism of this system is made up of authenticating party initialization mechanism (A), private key generator initialization mechanism (B), private key for user generation and biological characteristic token initialization mechanism (C) and authentification of user mechanism (D), it is characterized in that:
Described authenticating party initialization mechanism (A) comprises the steps:
Step (A1), authenticating party is selected biological characteristic masterplate standard and related algorithm, comprises hash algorithm etc., and with its announcement;
Step (A2), authenticating party is announced the security authentication center (CA) of being trusted, if the private key for user generator is moved by authenticating party or its authorized agency, this step can omit.
Described private key generator initialization mechanism (B) comprises the steps:
Step (B1), private key generator utilize software or hardware to produce two big prime numbers of secret at random, are designated as p and q respectively, form its master key with them, calculate n=pq simultaneously, and produce a big integer e, make gcd[e, (p-1) (q-1)]=1;
Step (B2), the private key generator is selected an one-way Hash function h again, and with (n, e) and h announce that if the private key generator is moved by user oneself, then each user has the (n of oneself, e) parameter is right, if the private key generator is by credible third party (TTP) operation, then (n e) is shared by all users of system;
Step (B3), user or TTP be to specific security authentication center application digital certificate, with realize (n, e) with the binding of this user or TTP, if the private key for user generator by authenticating party or its authorized agency operation, this step can omit.
Described private key for user produces and biological token initialization mechanism (C) comprises the steps:
Step (C1), the private key generator is gathered user's biological characteristic by necessary apparatus equipment, makes the biological characteristic masterplate according to given standard, as the fingerprint masterplate, is designated as T, and by following formula it is mapped as the PKI of user based on biological characteristic, is designated as b:
b=ρ(T)‖h′[ID,ρ(T)],
Wherein ρ represents a reversible encryption algorithm, and h ' represents a crash-resistant one-way Hash function, " ‖ " representative series connection computing, the name of ID representative of consumer and/or number of the account;
Step (C2), the private key generator utilizes its master key, i.e. and the prime factor p of n and q are that the user extracts the private key β based on fingerprint according to following equation:
α=β e(modn);
Step (C3), private key generator are kept at β with the form of key among user's the biological characteristic token;
Step (C4), private key generator also are kept at user's ID and the TAC that is calculated as follows among user's the biological characteristic token:
TAC=h′[ID,ρ(T)];
Step (C5), private key generator are kept at the digital certificate of user or TTP and the root certificate of being trusted among user's the biological characteristic token at last.
Described authenticating user identification mechanism (D) comprising:
Step (D1), the user inserts biological characteristic token to the token terminal of appointment, and authentication is carried out in request;
Step (D2), authenticating party are read user's ID and TAC from user's biological characteristic token; And preservation user/TTP digital certificate wherein, check the validity of certificate, and from certificate, extract the parameter n of PKG;
Step (D3), authenticating party extracts user's biological characteristic then and there, makes a sample of biological characteristic masterplate, is designated as T ';
Step (D4), authenticating party produce a random number ξ,, with it as addressing inquires to a sign indicating number R s, or be calculated as follows R s:
R s=σ(T′)‖ξ
Wherein function σ is used to extract specific biological information, and sends it to token;
Step (D5), token obtains and user-dependent parameter lambda, this parameter can be password, the static symmetric keys by user's input, a dynamic session or a number of calculating according to the stable element in the user biological feature, if λ elects a parameter relevant with the user biological feature as, it can utilize σ (T) ⌒ σ (T ') to calculate, because wherein comprised T and the total part biological feature of T ';
Step (D6), token produce another random number η earlier, directly set R u=η or be calculated as follows R u:
R u=[σ(T)⌒σ(T′)]‖η,
Calculate again
x=k e(mod?n),
y = β - 1 k h ( TAC , R u , R s , λ , x ) ( mod n ) ,
Wherein k also is a random number, at last (R u, x y) returns to authenticating party as answer back code;
Step (D7), authenticating party are obtained earlier and user-dependent parameter lambda, if λ elects a parameter relevant with the user biological feature as, it can utilize σ (T) ⌒ σ (T ') to calculate, and required information can be from R uIn extract, authenticating party again by following formula according to answer back code calculate the user based on biological characteristic PKI b:
b = y - e x h ( TAC , R u , R s , λ , x ) ( mod n ) ,
And from b, recover biological characteristic masterplate T, again with itself and collection in worksite to user biological feature samples T ' mate, if the match is successful, then accept this user, otherwise refused.
H represents an one-way Hash function in the above formula, can adopt the hash algorithm identical with h '.
Three key points are arranged in the design of above-mentioned customer certification system.First key point is the design of biological characteristic masterplate, and second key point is the algorithm of parameter lambda, and the 3rd key point is the selection of digital signature technology.Suitable public key digital signature system must be selected by system, makes its signature verification algorithm have following form
b=f(m,s)(mod?n),
The m representative information of being signed wherein, s represents the signature of this information, the b representative of consumer based on biological characteristic PKI, recognize authentication can calculate the user from the answer back code of token biological characteristic masterplate thereby protect.
The present invention has following positive beneficial effect: the customer certification system that the invention provides a kind of integrated bio feature authentication and token authentication, this system is converted into private key to the user biological feature masterplate of gathering in advance, it is kept among user's the biological characteristic token, transfer to user oneself keeping, can save the required expense in maintenance customer's biological attribute data storehouse, can avoid the user biological characteristic to run off again, invade user's the right of privacy.Under the support of Public Key Infrastructure(PKI), the user can support PKG of the present invention by any one, comprises the PKG by the credible third party operation, obtain its biological characteristic token, and can in any compatibility application system of the present invention, use biological characteristic token.The invention provides a scheme that cost is lower, can solve the using method of biological attribute data maintenance issues and standard biological attribute data.Utilize the present invention biological characteristic authentication technology popularization to be applied to various computer application systems, comprise among the transaction system of market and bank in the mode of plug and play.
Description of drawings
Fig. 1, Fig. 2 and Fig. 3 are respectively that private key generator initialization mechanism of the present invention (B) flow chart, private key for user produce and biological characteristic token initialization mechanism (C) flow chart and authentification of user mechanism (D) flow chart.
Embodiment
The present invention is a kind of customer certification system that adopts biological characteristic token, this system physical/comprise in logic authenticating party, user, private key for user generator (PKG), biological characteristic token, wherein authenticating party and private key generator all have necessary apparatus equipment, in order to gather user's biological characteristic, as fingerprint characteristic, genetic fingerprints feature, sclera feature etc.; The authentication mechanism of this system is made up of authenticating party initialization mechanism (A), private key generator initialization mechanism (B), private key for user generation and biological characteristic token initialization mechanism (C) and authentification of user mechanism (D).The authenticating party initialization procedure mainly is to select and announcement biological characteristic masterplate standard and related algorithm, comprises hash algorithm etc.Below, further set forth the composition of biological characteristic masterplate respectively with regard to two kinds of concrete conditions:
When system adopted the user fingerprints feature as its biological characteristic, the biological characteristic masterplate (was the user
The fingerprint masterplate) T is by little feature (minutia) (τ j, μ j, v j), j=1,2 ... t constitutes, τ j, μ jAnd v jRepresent the x and the y coordinate of little feature respectively, the type of little feature and the direction of little feature; User's TAC and client public key b are calculated as follows:
T=(τ 1,μ 1,v 1,τ 2,μ 2,v 2,...τ t,μ t,v t),
ρ(T)=ρ(τ 1,μ 1,v 1,τ 2,μ 2,v 2,...τ t,μ t,v t)=τ 1‖μ 1‖v 1‖τ 2‖μ 2‖v 2‖...τ t‖μ t‖v t
TAC=h′[ID,ρ(T)]=h′(ID‖τ 1‖μ 1‖v 1‖τ 2‖μ 2‖v 2‖...τ t‖μ t‖v t),
b=ρ(T)‖TAC
=τ 1‖μ 1‖v 1‖τ 2‖μ 2‖v 2‖...τ t‖μ t‖v t‖h′(ID‖τ 1‖μ 1‖v 1‖τ 2‖μ 2‖v 2‖...τ t‖μ t‖v t)
When system adopted user's genetic fingerprints feature as its biological characteristic, the characteristic value that biological characteristic masterplate (being user's genetic fingerprints masterplates) T changes by the short polyphone repetitive sequence (STR) among the DNA constituted, and is designated as (τ j, μ j, v j), j=1,2 ... t constitutes, wherein τ jBe used to identify the STR site, μ jBe certain function of the short series connection in this site repetition number, v jRepresent other gene information in this site, other is constant.
Please refer to Fig. 1, described private key generator initialization mechanism (B) comprises the steps:
Step (B1), private key generator utilize software or hardware to produce secret big prime number p and q at random, and big integer e, calculate n=pq simultaneously;
Step (B2), the private key generator is announced related algorithm and parameter;
Step (B3), private key generator operator (user or the credible third party, i.e. TTP) is to specific security authentication center application digital certificate, to realize that (n is e) with the binding of this user or TTP.
Fig. 1 mainly describes step (B1) and (B3).
Please refer to Fig. 2, described private key for user produces and biological token initialization mechanism (C) comprises the steps:
Step (C1), the private key generator is gathered user's biological characteristic by necessary apparatus equipment, makes the biological characteristic masterplate according to given standard, as the fingerprint masterplate, is designated as T, and it is mapped as the PKI b of user based on biological characteristic;
Step (C2), the private key generator utilizes its master key, i.e. and the prime factor p of n and q are that the user extracts the private key β based on fingerprint according to following equation:
α=β e(modn);
Step (C3), private key generator are kept at β with the form of key among user's the biological characteristic token;
Step (C4), private key generator also are kept at other relevant information among user's the biological characteristic token, comprising the digital certificate of user's ID, TAC, user or TTP and the root certificate of being trusted.
Attention is in above mechanism, and (p is q) with (n e) also can directly adopt existing RSA key algorithm to produce.
Please refer to Fig. 3, described authenticating user identification mechanism (D) comprising:
Step (D1), the user inserts biological characteristic token to the token terminal of appointment, and authentication is carried out in request;
Step (D2), authenticating party obtain user's ID and TAC from user's biological characteristic token; And effective parameter n;
Step (D3), authenticating party extracts user's biological characteristic then and there, makes a sample of biological characteristic masterplate, is designated as T ';
Step (D4), authenticating party produce addresses inquires to sign indicating number R s, and send it to token;
Step (D5), token are obtained and user-dependent parameter lambda;
Step (D6), token produce R earlier u, calculating x again, y is at last (R u, x y) returns to authenticating party as answer back code;
Step (D7), authenticating party obtains earlier and user-dependent parameter lambda, according to answer back code calculate the user based on biological characteristic PKI b, and from b, recover biological characteristic masterplate T, again with itself and collection in worksite to user biological feature samples T ' mate, if the match is successful, then accept this user, otherwise refused.
Notice that Fig. 3 has ignored step (D1), and do not provide R s, R uComputational process with λ.Below, specifically set forth the algorithm of these variablees respectively with regard to two kinds of situations.When system adopts the user fingerprints feature as its biological characteristic, address inquires to sign indicating number R sBe calculated as follows:
R s=τ 1‖τ 2‖...τ t′‖ξ,
Wherein ξ is a random number, (τ j, μ j, v j), j=1,2 ... t ' is all the little features among the sample fingerprint T ' that arrives of collection in worksite; R in the answer back code uBe calculated as follows:
R u=τ 1‖τ 2‖...τ t″‖η,
Wherein η is a random number, (τ j, μ j, v j), j=1,2 ... t ", be the little feature of the total fingerprint of T and T '; Parameter lambda is calculated as follows:
λ=v 1‖v 2‖..v t″
When system adopts user's genetic fingerprints feature as its biological characteristic: R sAnd R uDirectly be taken as two random numbers; Parameter lambda is calculated as follows:
λ=v 1‖v 2‖..v t
Wherein t and { τ j, j=1,2 ... t} is all fixing, but τ jArrangement vary with each individual, require { μ j, j=1,2 ... t} satisfies
μ 1≤μ 2≤...μ t
If μ iI+1, then arrange by default natural order between the two.

Claims (3)

1. biological characteristic token Verification System, this system physical/comprise in logic authenticating party, user, private key for user generator (PKG), biological characteristic token, wherein authenticating party and private key generator all have necessary apparatus equipment, in order to gather user's biological characteristic, as fingerprint characteristic, genetic fingerprints feature, sclera feature etc.; The authentication mechanism of this system is made up of authenticating party initialization mechanism (A), private key generator initialization mechanism (B), private key for user generation and biological characteristic token initialization mechanism (C) and authentification of user mechanism (D), it is characterized in that:
Described authenticating party initialization mechanism (A) comprises the steps:
Step (A1), authenticating party is selected biological characteristic masterplate standard and related algorithm, comprises hash algorithm etc., and with its announcement;
Step (A2), authenticating party is announced the security authentication center (CA) of being trusted, if the private key for user generator is moved by authenticating party or its authorized agency, this step can omit.
Described private key generator initialization mechanism (B) comprises the steps:
Step (B1), private key generator utilize software or hardware to produce two big prime numbers of secret at random, are designated as p and q respectively, form its master key with them, calculate n=pq simultaneously, and produce a big integer e, make gcd[e, (p-1) (q-1)]=1;
Step (B2), the private key generator is selected an one-way Hash function h again, and with (n, e) and h announce that if the private key generator is moved by user oneself, then each user has the (n of oneself, e) parameter is right, if the private key generator is by credible third party (TTP) operation, then (n e) is shared by all users of system;
Step (B3), user or TTP be to specific security authentication center application digital certificate, with realize (n, e) with the binding of this user or TTP, if the private key for user generator by authenticating party or its authorized agency operation, this step can omit.
Described private key for user produces and biological token initialization mechanism (C) comprises the steps:
Step (C1), the private key generator is gathered user's biological characteristic by necessary apparatus equipment, makes the biological characteristic masterplate according to given standard, as the fingerprint masterplate, is designated as T, and by following formula it is mapped as the PKI of user based on biological characteristic, is designated as b:
b=ρ(T)‖h′[ID,ρ(T)],
Wherein ρ represents a reversible encryption algorithm, and h ' represents a crash-resistant one-way Hash function, " ‖ " representative series connection computing, the name of ID representative of consumer and/or number of the account;
Step (C2), the private key generator utilizes its master key, i.e. and the prime factor p of n and q are that the user extracts the private key β based on fingerprint according to following equation:
α=β e(modn);
Step (C3), private key generator are kept at β with the form of key among user's the biological characteristic token;
Step (C4), private key generator also are kept at user's ID and the TAC that is calculated as follows among user's the biological characteristic token:
T4C=h′[ID,ρ(T)];
Step (C5), private key generator are kept at the digital certificate of user or TTP and the root certificate of being trusted among user's the biological characteristic token at last.
Described authenticating user identification mechanism (D) comprising:
Step (D1), the user inserts biological characteristic token to the token terminal of appointment, and authentication is carried out in request;
Step (D2), authenticating party are read user's ID and TAC from user's biological characteristic token; And preservation user/TTP digital certificate wherein, check the validity of certificate, and from certificate, extract the parameter n of PKG;
Step (D3), authenticating party extracts user's biological characteristic then and there, makes a sample of biological characteristic masterplate, is designated as T ";
Step (D4), authenticating party produce a random number ξ,, with it as addressing inquires to a sign indicating number R s, or be calculated as follows R s:
R s=σ(T′)‖ξ
Wherein function σ is used to extract specific biological information, and sends it to token;
Step (D5), token obtains and user-dependent parameter lambda, this parameter can be password, the static symmetric keys by user's input, a dynamic session or a number of calculating according to the stable element in the user biological feature, if λ elects a parameter relevant with the user biological feature as, it can utilize σ (T) ∩ σ (T ') to calculate, because wherein comprised T and the total part biological feature of T ';
Step (D6), token produce another random number η earlier, directly set R u=η or be calculated as follows R u:
R u=[σ(T)∩σ(T′)]‖η,
Calculate again
x=k e(mod?n),
y = β - 1 k h ( TAC , R u , R s , λ , x ) ( mod n ) ,
Wherein k also is a random number, at last (R u, x y) returns to authenticating party as answer back code;
Step (D7), authenticating party are obtained earlier and user-dependent parameter lambda, if λ elects a parameter relevant with the user biological feature as, it can utilize σ (T) ∩ σ (T ') to calculate, and required information can be from R uIn extract, authenticating party again by following formula according to answer back code calculate the user based on biological characteristic PKI b:
b = y - e x h ( TAC , R u , R s , λ , x ) ( mod n ) ,
Wherein h represents an one-way Hash function, and recovers biological characteristic masterplate T from b, again with itself and collection in worksite to user biological feature samples T ' mate, if the match is successful, then accept this user, otherwise refused.
2. biological characteristic token Verification System as claimed in claim 1 is characterized in that:
Adopt the user fingerprints feature as its biological characteristic;
Biological characteristic masterplate (being the user fingerprints masterplate) T is by little feature (minutia) (τ j, μ j, v j), j=1,2 ... t constitutes, τ j, μ jAnd v jRepresent the x and the y coordinate of little feature respectively, the type of little feature and the direction of little feature;
User's T, TAC and client public key b are calculated as follows:
T=(τ 1,μ 1,v 1,τ 2,μ 2,v 2,...τ t,μ t,v t),
ρ(T)=ρ(τ 1,μ 1,v 1,τ 2,μ 2,v 2,...τ t,μ t,v t)=τ 1‖μ 1‖v 1‖τ 2‖μ 2‖v 2‖...τ t‖μ t‖v t
TAC=h′[ID,ρ(T)]=h′(ID‖τ 1‖μ 1‖v 1‖τ 2‖μ 2‖v 2‖...τ t‖μ t‖v t),
b=ρ(T)‖TAC
=τ 1‖μ 1‖v 1‖τ 2‖μ 2‖v 2‖...τ t‖μ t‖v t‖h′(ID‖τ 1‖μ 1‖v 1‖τ 2‖μ 2‖v 2‖...τ t‖μ t‖v t)
Address inquires to sign indicating number R sBe calculated as follows:
R s=τ 1‖τ 2‖...τ t′‖ξ
Wherein ξ is a random number, (τ j, μ j, v j), j=1,2 ... t ' is all the little features among the sample fingerprint T ' that arrives of collection in worksite;
R in the answer back code uBe calculated as follows:
R u=τ 1‖τ 2‖...τ t″‖η
Wherein η is a random number, (τ j, μ j, v j), j=1,2 ... t ", be the little feature of the total fingerprint of T and T ';
Parameter lambda is calculated as follows:
λ=v 1‖v 2‖..v t″
3. biological characteristic token Verification System as claimed in claim 1 is characterized in that:
Adopt user's genetic fingerprints features (being dna characteristics) as its biological characteristic;
Biological characteristic masterplate (being user's genetic fingerprints masterplates) T is made of the characteristic value of the short polyphone repetitive sequence (STR) among the DNA, is designated as (τ j, μ j, v j), j=1,2 ... t constitutes, wherein τ jBe used to identify the STR site, μ jBe certain function of the short series connection in this site repetition number, v jRepresent other gene information in this site;
R sAnd R uDirectly be taken as two random numbers;
Parameter lambda is calculated as follows:
λ=v 1‖v 2‖..v t
Wherein t and { τ j, j=1,2 ... t} is all fixing, but τ jArrangement vary with each individual, require { μ j, j=1,2 ... t} satisfies
μ 1≤μ 2≤...μ t
If μ iI+1, then arrange by default natural order between the two.
CN200810212129A 2008-09-08 2008-09-08 User certification system using biological characteristic token Pending CN101674181A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200810212129A CN101674181A (en) 2008-09-08 2008-09-08 User certification system using biological characteristic token

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200810212129A CN101674181A (en) 2008-09-08 2008-09-08 User certification system using biological characteristic token

Publications (1)

Publication Number Publication Date
CN101674181A true CN101674181A (en) 2010-03-17

Family

ID=42021186

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200810212129A Pending CN101674181A (en) 2008-09-08 2008-09-08 User certification system using biological characteristic token

Country Status (1)

Country Link
CN (1) CN101674181A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101848213A (en) * 2010-04-22 2010-09-29 西北工业大学 Configurable mutual authentication method based on biometrics and password
CN103607282A (en) * 2013-11-22 2014-02-26 成都卫士通信息产业股份有限公司 Identity fusion authentication method based on biological characteristics
CN104683115A (en) * 2014-05-07 2015-06-03 孙强 Identity authentication method based on fingerprint information
CN104751042A (en) * 2015-01-16 2015-07-01 西安电子科技大学 Credibility detection method based on password hash and biometric feature recognition
CN106059764A (en) * 2016-08-02 2016-10-26 西安电子科技大学 Password and fingerprint third-party authentication method based on halting key derivation function
CN106878017A (en) * 2015-12-14 2017-06-20 中国电信股份有限公司 Method, user terminal, Website server and system for network ID authentication
CN108702291A (en) * 2015-12-18 2018-10-23 株式会社 Kt Authentication device based on biological information and its operating method
CN110391897A (en) * 2018-04-20 2019-10-29 武汉真元生物数据有限公司 A kind of password generated method and system based on biological identification
CN110717170A (en) * 2019-10-09 2020-01-21 重庆市筑智建信息技术有限公司 BIM system fingerprint login system, method and device
CN112733065A (en) * 2021-01-15 2021-04-30 海南金垦赛博信息科技有限公司 Tropical agriculture expert information management method and system

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101848213A (en) * 2010-04-22 2010-09-29 西北工业大学 Configurable mutual authentication method based on biometrics and password
CN101848213B (en) * 2010-04-22 2012-09-26 西北工业大学 Configurable mutual authentication method based on biometrics and password
CN103607282A (en) * 2013-11-22 2014-02-26 成都卫士通信息产业股份有限公司 Identity fusion authentication method based on biological characteristics
CN103607282B (en) * 2013-11-22 2017-03-15 成都卫士通信息产业股份有限公司 A kind of identity fusion authentication method based on biological characteristic
CN104683115A (en) * 2014-05-07 2015-06-03 孙强 Identity authentication method based on fingerprint information
CN104683115B (en) * 2014-05-07 2016-01-06 江苏意迪驱动设备有限公司 Based on the identity identifying method of finger print information
CN104751042A (en) * 2015-01-16 2015-07-01 西安电子科技大学 Credibility detection method based on password hash and biometric feature recognition
CN104751042B (en) * 2015-01-16 2018-03-06 西安电子科技大学 Creditability detection method based on cryptographic hash and living things feature recognition
CN106878017A (en) * 2015-12-14 2017-06-20 中国电信股份有限公司 Method, user terminal, Website server and system for network ID authentication
CN106878017B (en) * 2015-12-14 2020-02-28 中国电信股份有限公司 Method, user terminal, website server and system for network identity authentication
CN108702291A (en) * 2015-12-18 2018-10-23 株式会社 Kt Authentication device based on biological information and its operating method
CN106059764A (en) * 2016-08-02 2016-10-26 西安电子科技大学 Password and fingerprint third-party authentication method based on halting key derivation function
CN106059764B (en) * 2016-08-02 2019-05-03 西安电子科技大学 Based on the password and fingerprint tripartite's authentication method for terminating key derivation functions
CN110391897A (en) * 2018-04-20 2019-10-29 武汉真元生物数据有限公司 A kind of password generated method and system based on biological identification
CN110717170A (en) * 2019-10-09 2020-01-21 重庆市筑智建信息技术有限公司 BIM system fingerprint login system, method and device
CN110717170B (en) * 2019-10-09 2023-08-11 江苏重华数字科技有限公司 Fingerprint login system, method and device of BIM system
CN112733065A (en) * 2021-01-15 2021-04-30 海南金垦赛博信息科技有限公司 Tropical agriculture expert information management method and system

Similar Documents

Publication Publication Date Title
CN101674181A (en) User certification system using biological characteristic token
CN107566117B (en) A kind of block chain key management system and method
CN106504008B (en) A kind of fair contract signature method based on block chain
Shen et al. A modified remote user authentication scheme using smart cards
TWI703852B (en) Authentication and verification method and device for user's identity content information
CN103679436A (en) Electronic contract security system and method based on biological information identification
CN109460966A (en) Contract signing method, apparatus and terminal device based on requesting party's classification
CA2914956C (en) System and method for encryption
CN101414909A (en) System, method and mobile communication terminal for verifying network application user identification
CN101183439A (en) Electronic bill processing system and processing method
CN113438088A (en) Social network credit monitoring method and device based on block chain distributed identity
EP2916484A1 (en) User authentication using elliptic curve based OTP
CN108769020A (en) A kind of the identity attribute proof system and method for secret protection
CN102043912A (en) Method for using fingerprint signature and seal
CN104283961A (en) Community management cloud service integration platform and method
CN113347008B (en) Loan information storage method adopting addition homomorphic encryption
CN104901804A (en) User autonomy-based identity authentication implementation method
CN106487786A (en) A kind of cloud data integrity verification method based on biological characteristic and system
TWI578253B (en) System and method for applying financial certificate using a mobile telecommunication device
CN113364597A (en) Privacy information proving method and system based on block chain
CN104899737B (en) Fingerprint IRLRD feature encryptions method and the mobile-payment system based on this method and method
CN113468570A (en) Private data sharing method based on intelligent contract
Rattan et al. E-Commerce Security using PKI approach
CN107248997A (en) Authentication method based on smart card under environment of multi-server
CN106533681B (en) A kind of attribute method of proof and system that support section is shown

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20100317