CN103607282B - A kind of identity fusion authentication method based on biological characteristic - Google Patents

A kind of identity fusion authentication method based on biological characteristic Download PDF

Info

Publication number
CN103607282B
CN103607282B CN201310592436.XA CN201310592436A CN103607282B CN 103607282 B CN103607282 B CN 103607282B CN 201310592436 A CN201310592436 A CN 201310592436A CN 103607282 B CN103607282 B CN 103607282B
Authority
CN
China
Prior art keywords
user
private key
biological
biological characteristic
public key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310592436.XA
Other languages
Chinese (zh)
Other versions
CN103607282A (en
Inventor
张文科
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Electronics Technology Network Security Technology Co ltd
Original Assignee
Chengdu Westone Information Industry Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Westone Information Industry Inc filed Critical Chengdu Westone Information Industry Inc
Priority to CN201310592436.XA priority Critical patent/CN103607282B/en
Publication of CN103607282A publication Critical patent/CN103607282A/en
Application granted granted Critical
Publication of CN103607282B publication Critical patent/CN103607282B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

A kind of the invention belongs to data communication and information security field, more particularly to identity fusion authentication method based on biological characteristic.A kind of problem that the present invention is present for prior art, there is provided identity fusion authentication method based on biological characteristic.Which need to retain a small amount of biological information, simplify the architecture of PKI, and private key not can be preserved, and increase the safety and reliability of system.The present invention is calculated the private key for user, and is calculated check value by physical characteristics collecting equipment, if consistent with the check value for retaining, passes through certification.Present invention application and information security field.

Description

A kind of identity fusion authentication method based on biological characteristic
Technical field
The invention belongs to data communication and information security field, more particularly to a kind of identity fusion based on biological characteristic is recognized Card method.
Background technology
Information age, with developing rapidly for Networks and Communications technology and mankind's physics continuous with dummy activity space Expand, how the identity of precise Identification user, protection information safety, it has also become a key issue that must be solved.Meanwhile, letter Breath system proposes requirements at the higher level for the accuracy of user identity identification, safety and practicality.Traditional identification is such as The methods such as password, cipher key carrier can not meet easy-to-use safety, easily forge and lose, it is necessary to seek safer reliable, Identification new way easy to use.Then, biological identification technology arises at the historic moment, and becomes a kind of new identity recognizing technology. Living things feature recognition has succinctly quick, safe and reliable, accurate, it is not necessary to remembers the password of complexity, is also not required to carry with key The thing of spoon, smart card etc.Biological identification technology is intended that people itself, as everyone biological characteristic has and other The different uniqueness of people and stability constant over a period to come, are difficult to forge and palm off, and this just directly determines this recognizes Card mode is safer, more convenient.Additionally, biological identification technology is by means of the present computer technology, it is easy to realize safety, prison Control, the integration of management system, automated management.Due to its wide application prospect, huge Social benefit and economic benefit, Cause extensive concern and the great attention of various countries.The developed countries such as the U.S., Britain are in the strict employing of all aspects such as airport, entry and exit Fingerprint technique, India also have been set up whole people's fingerprint database, for identity card system in.The living things feature recognition of China Technology also achieves considerable progress, and the such as 2008 Beijing Olympic Games employs iris recognition technology, in daily life, also occurs Carry living things feature recognition(Mainly fingerprint recognition)Mobile phone, mouse and keyboard, storage device etc..Have the whole world in view, biological Feature identification technique is in the ascendant, not only government for national security consider and the work of a well-known writer input, all kinds of companies are to biological characteristic The interest of technology of identification is also increasingly dense.
Biological identification technology(Biometric Identification Technology)Refer to and utilize human body biological characteristics Carry out a kind of technology of identification.More specifically, biometrics identification technology be exactly by computer and optics, acoustics, The high-tech means such as biosensor and biostatisticss' principle are intimately associated, special using the intrinsic physiological property of human body and behavior Levy the identification that carries out personal identification.Each individuality have can uniquely measure or can automatic identification and checking physiological property Or way of act, i.e. biological characteristic.It can be divided into physiological feature(Such as fingerprint, image surface, iris, palmmprint etc.)And behavior characteristicss (Such as gait, sound, person's handwriting etc.).Living things feature recognition is exactly which to be entered according to unique biological characteristic between each individuality Row identification and the certification of identity.Biological identification technology is sampled to biological characteristic, is extracted its unique feature and is changed into Digital code, and these code combinations are formed feature templates further.When people carry out authentication with identifying system interaction, Identifying system is obtained its feature and is compared with the feature templates in data base, to determine whether to mate, so as to determine to receive Or refusal user accesses.
In current research with application, biometrics identification technology is applied primarily at computer vision, image Reason and pattern recognition, computer audio, speech processes, multi-sensor technology, virtual reality, computer graphicss, visualization skill Art, computer-aided design, intelligent robot sensory perceptual system etc..Traditional identity identifying method includes identity article(Such as Certificate, atm card etc.)And identity(Such as username and password), but due to be main by foreign object, once stolen or forget, Its identity is easy for being pretended to be by other people or replaces.Show according to related data, the damage for being caused due to certificate or password loss every year Lose huge.
After the present invention is by user biological feature extraction, using distinctive coded system, biological information is encoded into Based on the private key of elliptic curve cipher, the corresponding public key certificate of the private key for user is signed and issued, private key is simply taken in certification without retaining Business device end retains the public key certificate.
During User logs in, after the certification such as input ID, password passes through, the user biological is gathered by biometric device Feature, on local/physical characteristics collecting equipment calculates the private key for user, and calculates check value, if the school with reservation Test value consistent, then certification passes through;Otherwise fail, return user's failure information.With the private key signature message, server end is according to this The public key certificate of user(The ID bindings of the certificate and user)Sign test is carried out, when only sign test passes through, the User logs in just success;
The major advantage of the invention is that have system only retain a small amount of biological information, simplifies the system knot of PKI Structure, private key not can be preserved, and increase the safety reliability of system.The bodies such as USB-KEY, IC-card are based purely on than traditional For identity authentication method, with higher safety, motility and reliability, with anti-lost and Anti-theft function.
The invention adopts distinctive biometric coding techniques, with stronger safety and loss prevention function, Ke Yiguang General apply in the application scenario stricter to authentication requirement, such as bank, military affairs, customs etc..
Content of the invention
The technical problem to be solved is:For the problem that prior art is present, there is provided a kind of based on biological special The identity fusion authentication method that levies.Which need to retain a small amount of biological information, simplify the architecture of PKI, and private key can Not to preserve, increase the safety reliability of system.The identity identifying methods such as USB-KEY, IC-card are based purely on than traditional For, with higher safety, motility and reliability, with anti-lost and Anti-theft function.
The technical solution used in the present invention is as follows:
A kind of identity fusion authentication method based on biological characteristic includes:
Step 1:Biological characteristic is extracted, and gathers user biological characteristic information with biological characteristic extraction equipment;
Step 2:Biological information is encoded:According to user biological characteristic information, in conjunction with ID, password is used for, local/raw Ellipse curve public key cipher algorithm private key operation is realized on thing collection apparatus equipment, obtains the private key of the user, in biological characteristic The check value of 32 bytes for only needing to retain the private key on collecting device;
Step 3:Client public key certificate issuance:On physical characteristics collecting equipment, according to private key for user, calculate based on ellipse The corresponding public key of circular curve cryptographic algorithm, signs and issues the public key certificate to server;
Step 4:User logs in:During User logs in, after input ID, password authentication pass through, by biometric device The user biological feature is gathered, and the private key for user is calculated on physical characteristics collecting equipment, and calculates check value, if with The check value of reservation is consistent, then certification passes through;Otherwise fail, return user's failure information;With the private key signature message, server Hold the public key certificate according to the user(The ID bindings of the certificate and user)Sign test is carried out, when only sign test passes through, the user steps on Record just success.
In the step 2, check value is realized using hash cryptographic algorithm or block cipher.
The private key for user is not preserved.
Algorithm of the hash cryptographic algorithm from 256 bits of output.
The hash algorithm detailed process is:
Step 11:Biological information is calculated first time cryptographic Hash, ID splicing is existedAfterwards, calculate most Whole value is used as private key for user;
Step 2:On physical characteristics collecting equipment, according to private key for user, calculate based on elliptic curve cryptography Corresponding public key, signs and issues the public key certificate to server;
Step 3:During User logs in, after input ID, password authentication pass through, the user is gathered by biometric device Biological characteristic, calculates the private key for user on physical characteristics collecting equipment, and check value is calculated, if the school with reservation Test value consistent, then certification passes through;Otherwise fail, return user's failure information.Step 4:With the private key signature message, server end Public key certificate according to the user carries out sign test, when only sign test passes through, the User logs in just success, the wherein certificate and user ID binding.
In sum, as a result of above-mentioned technical proposal, the invention has the beneficial effects as follows:
1)A small amount of biological information need to be retained only, the architecture of PKI is simplified, private key not can be preserved, be increased The safety reliability of adding system.Than traditional be based purely on the identity identifying methods such as USB-KEY, IC-card for, with higher Safety, motility and reliability, with anti-lost and Anti-theft function.
2)Distinctive biometric coding techniques, with stronger safety and loss prevention function, can be widely used in Stricter application scenario, such as bank, military affairs, customs etc. are required to authentication.
Description of the drawings
Examples of the present invention will be described by way of reference to the accompanying drawings, wherein:
Fig. 1 is biometric identity fusion authentication method;
Fig. 2 is the identity fusion verification process based on biological characteristic.
Specific embodiment
All features disclosed in this specification, or disclosed all methods or during the step of, except mutually exclusive Feature and/or step beyond, can combine by any way.
This specification(Including any accessory claim, summary and accompanying drawing)Disclosed in any feature, except non-specifically is chatted State, can equivalent by other or with similar purpose alternative features replaced.I.e., unless specifically stated otherwise, each feature It is an example in a series of equivalent or similar characteristics.
This place of biological characteristic extraction equipment is not specific to specific equipment, at present, general fingerprint identification device, recognition of face Equipment, speech recognition apparatus and iris identification equipment etc. all can be within the scope of.
The present invention realizes that flow process is as follows:
A, biological characteristic are extracted:User biological feature is gathered with biological characteristic extraction equipment;
B, biological information coding:According to user biological characteristic information, in conjunction with ID, password etc., using peculiar calculation Method, on local/physical characteristics collecting equipment realizes ellipse curve public key cipher algorithm private key operation, obtains the private of the user Key, the check value of 32 bytes for only needing to retain the private key on local/physical characteristics collecting equipment, the check value can be with Realized using hash cryptographic algorithm, block cipher;
C, client public key certificate issuance:On local/physical characteristics collecting equipment, according to private key for user, calculate and be based on The corresponding public key of elliptic curve cryptography, signs and issues the public key certificate to server;
D, User logs in:During User logs in, after the certification such as input ID, password passes through, adopted by biometric device Collect the user biological feature, the private key for user is calculated on local/physical characteristics collecting equipment, and calculate check value, such as Fruit is consistent with the check value for retaining, then certification passes through;Otherwise fail, return user's failure information.With the private key signature message, take Public key certificate of the business device end according to the user(The ID bindings of the certificate and user)Sign test is carried out, when only sign test passes through, the use Family logs in just success.
The invention is not limited in aforesaid specific embodiment.The present invention is expanded to and any is disclosed in this manual New feature or any new combination, and the arbitrary new method that discloses or the step of process or any new combination.

Claims (2)

1. a kind of identity fusion authentication method based on biological characteristic, it is characterised in that include:
Step 1:Biological characteristic is extracted, and gathers user biological characteristic information with biological characteristic extraction equipment;
Step 2:Biological information is encoded:According to user biological characteristic information, in conjunction with ID, password, local/biological special Levy, obtain the private key of the user, in physical characteristics collecting The check value of 32 bytes for only needing to retain the private key on equipment;
Step 3:Client public key certificate issuance:On physical characteristics collecting equipment, according to private key for user, calculate based on oval bent The corresponding public key of line cryptographic algorithm, signs and issues the public key certificate to server;
Step 4:User logs in:During User logs in, after input ID, password authentication pass through, gathered by biometric device The user biological feature, calculates the private key for user on physical characteristics collecting equipment, and calculates check value, if with reservation Check value consistent, then certification passes through;Otherwise fail, return user's failure information;With the private key signature message, server end root Sign test is carried out according to the public key certificate of the user, when only sign test passes through, the User logs in just success;
In the step 2, check value is realized using hash cryptographic algorithm or block cipher;
The hash cryptographic algorithm detailed process is:
Step 11:Biological information is calculated first time cryptographic Hash, ID splicing is existedAfterwards, calculate final Value is used as private key for user;
Step 12:On physical characteristics collecting equipment, according to private key for user, corresponding to based on elliptic curve cryptography is calculated Public key, signs and issues the public key certificate to server;
Step 13:During User logs in, after input ID, password authentication pass through, user's life is gathered by biometric device Thing feature, calculates the private key for user on physical characteristics collecting equipment, and check value is calculated, if the verification with reservation Value is consistent, then certification passes through;Otherwise fail, return user's failure information;
Step 14:With the private key signature message, server end carries out sign test according to the public key certificate of the user, and only sign test passes through When, the ID bindings of the User logs in just success, the wherein certificate and user;
The private key for user is not preserved.
2. a kind of identity fusion authentication method based on biological characteristic according to claim 1, it is characterised in that described miscellaneous Algorithm of the cryptographic algorithm that gathers from 256 bits of output.
CN201310592436.XA 2013-11-22 2013-11-22 A kind of identity fusion authentication method based on biological characteristic Active CN103607282B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310592436.XA CN103607282B (en) 2013-11-22 2013-11-22 A kind of identity fusion authentication method based on biological characteristic

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310592436.XA CN103607282B (en) 2013-11-22 2013-11-22 A kind of identity fusion authentication method based on biological characteristic

Publications (2)

Publication Number Publication Date
CN103607282A CN103607282A (en) 2014-02-26
CN103607282B true CN103607282B (en) 2017-03-15

Family

ID=50125483

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310592436.XA Active CN103607282B (en) 2013-11-22 2013-11-22 A kind of identity fusion authentication method based on biological characteristic

Country Status (1)

Country Link
CN (1) CN103607282B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107196922A (en) * 2017-05-03 2017-09-22 国民认证科技(北京)有限公司 Identity identifying method, user equipment and server

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103841108B (en) 2014-03-12 2018-04-27 北京天诚盛业科技有限公司 The authentication method and system of user biological feature
CN104657649B (en) * 2014-05-23 2018-02-23 北京集联网络技术有限公司 A kind of token device of living things feature recognition start
CN104065487A (en) * 2014-07-08 2014-09-24 华南理工大学 Random secret value IBC identity authentication method based on digital fingerprint
KR101829266B1 (en) * 2015-04-23 2018-03-29 최운호 Authentication in ubiquitous environment
CN104767624B (en) * 2015-04-23 2018-02-09 北京航空航天大学 Remote authentication protocol method based on biological characteristic
CN106209730B (en) * 2015-04-30 2020-03-10 华为技术有限公司 Method and device for managing application identifier
CN106506168A (en) * 2016-12-07 2017-03-15 北京信任度科技有限公司 A kind of safe method based on biological characteristic long-distance identity-certifying
CN108737103B (en) * 2018-03-27 2021-06-29 中国科学院数据与通信保护研究教育中心 SM2 algorithm signature method applied to CS framework
CN108900309B (en) * 2018-05-17 2020-08-18 北京岸思信息科技有限公司 Authentication method and authentication system
CN109039643B (en) * 2018-06-28 2019-10-11 中南民族大学 A kind of sustainable method for authenticating user identity and system based on electromagnetic radiation
CN111353144A (en) * 2018-12-24 2020-06-30 航天信息股份有限公司 Identity authentication method and device
CN113055157B (en) * 2019-12-27 2023-03-10 京东科技控股股份有限公司 Biological characteristic verification method and device, storage medium and electronic equipment
CN111325814A (en) * 2020-02-20 2020-06-23 成都卫士通信息产业股份有限公司 Simulation handwriting fitting method, device, equipment and readable storage medium
CN114550316B (en) * 2022-04-27 2022-08-05 广州商景网络科技有限公司 One-stop credible biological characteristic data acquisition terminal equipment and acquisition and sharing method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1972189A (en) * 2005-11-24 2007-05-30 株式会社日立制作所 Biometrics authentication system
CN101479987A (en) * 2006-06-27 2009-07-08 微软公司 Biometric credential verification framework
CN101674181A (en) * 2008-09-08 2010-03-17 郑建德 User certification system using biological characteristic token

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1972189A (en) * 2005-11-24 2007-05-30 株式会社日立制作所 Biometrics authentication system
CN101479987A (en) * 2006-06-27 2009-07-08 微软公司 Biometric credential verification framework
CN101674181A (en) * 2008-09-08 2010-03-17 郑建德 User certification system using biological characteristic token

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107196922A (en) * 2017-05-03 2017-09-22 国民认证科技(北京)有限公司 Identity identifying method, user equipment and server
CN107196922B (en) * 2017-05-03 2020-08-04 国民认证科技(北京)有限公司 Identity authentication method, user equipment and server

Also Published As

Publication number Publication date
CN103607282A (en) 2014-02-26

Similar Documents

Publication Publication Date Title
CN103607282B (en) A kind of identity fusion authentication method based on biological characteristic
CN102722696B (en) Identity authentication method of identity card and holder based on multi-biological characteristics
Wang et al. Secure stochastic ECG signals based on Gaussian mixture model for $ e $-healthcare systems
CN105187217A (en) Dual-factor identity authentication method and apparatus thereof
CN106709417A (en) Multimodal biological recognition system and use method thereof
CN103646203A (en) Computer safety system with human body biological characteristic recognition
CN103093133B (en) Biological identity authentication method facing institute of electrical and electronic engineers (IEEE) 802.15.6
CN104123565A (en) Identity card authentication and holder identity authentication method based on multimodal identification
CN103279764A (en) Real-name network authentication system based on face identification
CN103646202A (en) Fingerprint information coding encryption and application method
CN107124283A (en) A kind of physical characteristics collecting system and physical characteristics collecting method
CN102750516B (en) A kind of certificate false proof system of embedded bio characteristic sum barcode technology
CN104007929A (en) Gesture recognition based mobile terminal unlocking method and mobile terminal
CN104009973B (en) It is a kind of based on set polynomial transformation with reconcile details in fingerprint Information hiding and restoration methods
CN108390884A (en) A kind of identity identifying method and device
CN103368736B (en) Business information encryption, decryption method and device
ES2911182T3 (en) Biometric authentication system based on venous networks and unique and unfalsifiable encodings of branched structures and associated method
CN103646236A (en) Palm print information coding, encryption and application method
Wu et al. Fingerprint bio‐key generation based on a deep neural network
JP5903257B2 (en) Authentication system, registration device, and authentication device
CN106503519A (en) A kind of method of identification check
CN111723595A (en) Personnel identity identification method and system
CN106790237A (en) A kind of authentication device and method based on living things feature recognition
CN203324988U (en) Dual fingerprint and vein identification verification system
WO2011113326A1 (en) Person identity identification system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: No. 333, Yunhua Road, Chengdu hi tech Zone, China (Sichuan) pilot Free Trade Zone, Chengdu, Sichuan 610041

Patentee after: China Electronics Technology Network Security Technology Co.,Ltd.

Address before: No. 333, Yunhua Road, high tech Zone, Chengdu, Sichuan 610041

Patentee before: CHENGDU WESTONE INFORMATION INDUSTRY Inc.