CN103646236B - The coding encrypting and application process of a kind of palmprint information - Google Patents
The coding encrypting and application process of a kind of palmprint information Download PDFInfo
- Publication number
- CN103646236B CN103646236B CN201310661847.XA CN201310661847A CN103646236B CN 103646236 B CN103646236 B CN 103646236B CN 201310661847 A CN201310661847 A CN 201310661847A CN 103646236 B CN103646236 B CN 103646236B
- Authority
- CN
- China
- Prior art keywords
- information
- authentication
- password
- palmprint
- palm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 26
- 238000000605 extraction Methods 0.000 claims description 29
- 229910002056 binary alloy Inorganic materials 0.000 claims description 6
- 238000012795 verification Methods 0.000 claims description 5
- 238000004891 communication Methods 0.000 claims description 3
- 238000012360 testing method Methods 0.000 claims description 2
- 238000003384 imaging method Methods 0.000 claims 1
- 238000005516 engineering process Methods 0.000 abstract description 18
- 230000003542 behavioural effect Effects 0.000 abstract description 4
- 230000007423 decrease Effects 0.000 abstract description 2
- 230000001960 triggered effect Effects 0.000 abstract description 2
- 238000010200 validation analysis Methods 0.000 abstract description 2
- 230000015572 biosynthetic process Effects 0.000 description 8
- 238000011161 development Methods 0.000 description 7
- 230000007547 defect Effects 0.000 description 2
- 230000001815 facial effect Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 210000001525 retina Anatomy 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000012850 discrimination method Methods 0.000 description 1
- 238000012407 engineering method Methods 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 230000005021 gait Effects 0.000 description 1
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
- 201000009032 substance abuse Diseases 0.000 description 1
- 230000003245 working effect Effects 0.000 description 1
Landscapes
- Collating Specific Patterns (AREA)
Abstract
The coding encrypting and application process of a kind of palmprint information are related to information safety system, particularly the encrypted message that the fixed biological information of people's palmmprint builds with staff palmmprint coding is combined and is not only able to play the security relative high that human body biological characteristics are recognized, reliability, convenience and the behavioral characteristics of password can be played and avoided because of stolen the triggered safety problem of biological information, simultaneously because the complexity of password can decline therefore can also mitigate the burden of authentication person's cipher memory so as to be favorably improved information security and promote the further genralrlization application of identity validation technology.
Description
Technical field
The present invention relates to the coding encrypting mode and application process of a kind of palmprint information, particularly by the right-and-left palm of people
Line is encoded to build password by binary mode, so as to realize the combination of biological characteristic and variable cipher that palmmprint is fixed
And improve the security for being recognized based on biometric identity or being verified.
Background technology
Progress into 21st century science and technology causes class society quick stepped into information epoch, the information technology of high speed development
The information interchange of people is allowed to become more convenient, fast, operating efficiency obtains huge lifting, and reinvents us in all its bearings
Society.However, the development band stolen, falsely use or distort also to our societies of thing followed information security issue such as information
Stern challenge is carried out.Estimate according to Federal Trade Commission, in recent years, about 10,000,000 American individual every year
Information is stolen or abuses, and 5,000,000,000 dollars of loss is caused to consumer, and the loss of annual commercial undertaking is then up to 48,000,000,000 U.S.s
Unit.It is the important channel for ensuring information safety to carry out personal verification, how personal identification is rapidly and accurately identified, with true
Protect information security and safeguard civil order, it has also become modern society's important topic urgently to be resolved hurrily.
Traditional authentication identifying method mainly has two kinds:Knowledge based engineering method and the method based on keepsake.Knowledge based
Method determine personal identification by checking " what you know ", i.e., person to be verified uses grasped knowledge such as password, individual
People's identification code (PIN) or password etc. prove the identity of oneself.Method based on keepsake then by check " what you possess " come
Determine personal identification, i.e., person to be verified proves the identity of oneself using the keepsake held such as certificate, seal or key etc..It is aobvious
So, above two method has obvious defect, and " knowledge " exists easily to forget or obscure, be stolen by others or crack etc. and asks
Topic, " keepsake " then there are problems that it is inconvenient to carry, can lose or be stolen, easily.Therefore, traditional identity discrimination method
Defect causes its development for being increasingly not suitable with science and technology and the progress of society, is that this people has turned to sight with not reproducible
The biological identification technology of feature human body biological characteristics.So-called bio-identification, i.e., determine personal identification according to characteristics of human body.With biography
" knowledge " that system technology is used is compared with " keepsake ", and the characteristics of human body that biological identification technology is used has and is not afraid of forgetting, no
Can lose, be difficult to forge, it is irreplaceable, be not required to the outstanding advantages such as extra carrying.Therefore, bio-identification is not only safe and reliable, and
And it is easy to operate, with significant superiority.
The feature that human body is used for bio-identification can be divided into two classes:Physiological characteristic and behavioural characteristic.Physiological characteristic mainly has:
Fingerprint, palm shape, iris, retina, face, facial thermal imagery etc.;Behavioural characteristic mainly has:Signature, voice, gait, keystroke etc..Grind
Study carefully and experiment shows, the features described above of human body all meets generality, uniqueness, stability and collection property etc. to varying degrees
Four requirements of fundamental property.Based on these features, people have developed various biological identification technologies, wherein application is relatively wide or studies
Deeper has:Fingerprint recognition, the identification of palm shape, iris recognition, retina identification, recognition of face, facial thermal imagery identification, human ear are known
Not, signature recognition, speech recognition etc..In various biological identification technologies, fingerprint recognition is most widely used with palm shape identification.
Compared to other technologies such as fingerprint, face and iris recognitions, the characteristics of personal recognition has its exclusive:(1) palmmprint region is than larger,
Contain the features such as abundant grain;(2) current personal recognition mainly uses low-resolution image, and collecting device cost is not
Height, especially, with computer camera, the popularization of mobile phone camera, palmmprint can together constitute multi-modal certification with face
System;(3) hand contour line is utilized, is easy to position the R01 regions of palmmprint;(4) palmmprint is easily with hand etc.
Feature constitute multimodal recognition system, without increase hardware cost, it is often more important that, personal recognition be a kind of discrimination very
Biometrics identification technology high, can be as fingerprint and the substitute technology of iris recognition.
But biological characteristic is fixed in actual application be stolen the safety problem of initiation and limit living things feature recognition
The large-scale promotion application of technology.For example on the one hand on the internet by trojan horse usurp other people including ID card No.,
Fingerprint, face information and the report committed a crime happens occasionally, or even there occurs prison inmates after prison guard is murdered with the fingerprint of prison guard
The felony opened prison gate and sneak away.These problems generation cause people to biometrics identification technology can
Query is proposed by property and security.There is problem during biometrics identification technology can effectively be overcome in therefore urgent need development now
New method, system advantageously promoting the development of social economy and the raising of living standards of the people.
Therefore, the application propose to be encoded the palm line of people or so two by binary system in the world first it is close to build
Code, improves based on biometric identity identification or tests so as to realize biological characteristic and the combination of variable cipher that palmmprint fixes
The security of card, contributes to the further development for information security and social civilization.
The content of the invention
Technical problem:It is an object of the invention to provide the coding encrypting and application process of a kind of palmprint information, by people or so
Two palm lines are encoded to build password by binary system, so as to realize the biological characteristic of palmmprint fixation and the group of variable cipher
Close with play convenience of the biological information in authentication, it is effective the advantages of and coding encrypting dynamic advantage, to ensure
Authentication conveniently, safely with reliability.
Technical scheme:The right-and-left palmmprint of people is encoded to build by the present invention by binary system first in the world
Password, so as to realize the combination of biological characteristic and variable cipher that staff palmmprint is fixed and by fixed palmmprint biological information
Being combined from variable different palmmprints coding encrypted message is used for authentication, so that it is close with coding to play biological information identification
The advantage of code information identification, to advance the further development and application of identity validation technology.A kind of coding encrypting mode of palmmprint
And application process is it is characterized in that setting people right-hand man putting in order and encoded according to 0-1 i.e. binary system first, then
Password segment of the palm based on obtaining palmmprint coding is stretched, repetition is stretched palm process and can be built and stretches the cipher chips that the palm is formed by each time
It is disconnected build it is binary coded.
A kind of coding encrypting method of palmprint information of the present invention, it is characterised in that set putting in order for people right-hand man first
And according to 0-1 be that binary system is encoded, password segment of the palm based on obtaining palmmprint coding is then stretched, palm process is stretched in repetition
To build the binary coded of the password segment structure that the palm is formed is stretched by each time.
The palm of stretching refers to stretch out selected palm and gathered by palmmprint collecting device to stretch palm palmprint image to obtain correlation
Palmprint information, coding information go forward side by side onestep extraction be based on coding information password segment;And it refers to once to stretch the palm to repeat to stretch the palm
After the completion of, the selected palm of the palm will be once stretched in addition and is stretched out and is gathered by palmmprint collecting device stretch palm palmprint image to obtain phase
Close palmprint information, coding information onestep extraction of going forward side by side and be based on the password segment of coding information.
The palmprint image is obtained by picture pick-up device, capacitance sensor, inductance sensor, ultrasonic sensor in interior palmmprint
Taking equipment is obtained.
The palmprint image obtains the palmprint information that can be used for information comparison by feature extraction and template extraction;
A kind of application process of palmprint information of the invention is:The password is used for authentication system;The identity is tested
Card system includes client and server, and client also possesses in addition to authentication person can be allowed to log in can obtain identity
Verifier is based on the palmprint information of palmprint image and is further obtained by feature extraction and template extraction that row information can be entered
The information extracting system of the palmprint information of comparison;Server end includes application server and database, has identity in database
The palmprint information of the right-hand man that can enter row information comparison of verifier, the sequence of left and right palmmprint and coding information and password, and
Application server then undertakes connection client with database and carries out the function of computational service;Application server passes through with client
Ciphertext communication realize authentication person user log in, authentication;The computational service function of application server refers to computational service
The palmprint information that device will be stretched in the palmprint information and database that the palm is obtained is compared to primarily determine that authentication by search, information
Person, application server calls the left and right palmmprint coding information of authentication person from database and further incorporates more than after success
The palmprint information and coding information for once stretching the palm extract the password segment based on coding information to combine the authentication person to be formed defeated
Enter identification password, the identification password that be input into for authentication person by subsequent application server is tested with the identity in database
Card password is compared to determine authentication person's identity by searching for into row information;When client can not carry out acquired palmprint image
Feature extraction and during template extraction, the application server of server end undertakes feature extraction and the template of acquired palmprint image
Extract.
The authentication flow of authentication system includes that authentication person proposes body by client to application server
After part checking request, authentication system starts, and application server sends acquisition checking information to client identity verifier will
Ask, then authentication person is extracted more than the palmprint information for once stretching palm acquisition and passed successively by client-side information extraction system
Application server is handed to, application server compares with preliminary palmprint information with the palmprint information in database by search
Determine authentication person's identity, application server calls the coding of the left and right palmmprint of authentication person to believe from database after success
Cease and further incorporate more than the palmprint information for once stretching the palm and password segment combination of the coding information extraction based on coding information
Authentication person's input identification password of formation, the identification password that be input into for authentication person by subsequent application server
Compared into row information to determine authentication person's identity by searching for the identification password in database, when information is compared really
When recognizing identical, application server feedback client identity verifier authentication success, and work as information and compare continuous three failures
Shi Ze is failed by application server feedback client identity verifier authentication.
The password is modified from client after authentication person's authentication success with application server contacts;
The password can set multiple, including identification password, alarm password, backup password to same authentication person;Institute
Identification password is stated for authentication;The identity that the alarm password is used for when authentication person is coerced by other people is tested
Demonstrate,prove, now application server can terminate the authentication taken in conjunction police and seek to assist by the system failure is informed;It is described standby
Part password is close for can again be given for change when preventing authentication person from forgetting identification password or reset authentication
Code.
The database of the authentication system server is including left and right it is determined that being collected in the case of authentication person's identity
The password of the palmprint information of hand, the coding information of right-hand man's palmmprint and authentication person's setting.
It refers to that the palmprint image of collection is carried out into feature extraction and template that the information that the authentication system is carried out is compared
Information verification is carried out with discriminative information comparison result by search with palmprint information in database after extraction, verification primarily determines that body
Its right-hand man's palmmprint coding information for setting is called after part verifier and with reference to authentication person more than the palmmprint for once stretching the palm
Information and coding information extract the password segment based on coding information and combine the authentication person to be formed input identification password
And the identification password with authentication person in database passes through to search for discriminative information comparison result again.
The client of authentication system passes through ciphertext communication with application server;Described ciphertext passes through AES reality
Existing, AES includes symmetry algorithm and asymmetric arithmetic;
The client and server may be incorporated in together.
Beneficial effect:The ID cards and cryptographic technique of traditional identity checking and existing human body biological characteristics identification technology are in body
The aspect such as safe and accurate, convenient, fast and cheap that part checking is required also there are problems that a lot, be this application by people's palmmprint
The encrypted message that builds of fixed biological information and staff palmmprint coding is combined and is not only able to play human body biological characteristics knowledge
Other security relatively high, reliability, convenience and the behavioral characteristics of password can be played and reduced or even avoided because of life
Stolen the triggered safety problem of thing characteristic information, simultaneously because the complexity of password can decline therefore can also mitigate identity
The burden of verifier's cipher memory is so as to be favorably improved information security and promote the further expansion of authentication application field.
Brief description of the drawings
Fig. 1 is staff palmprint information coding encrypting combination authentication system structure.
Fig. 2 is staff palmprint information coding encrypting combination authentication system authentication flow.
Specific embodiment
With reference to embodiment, the present invention is further illustrated.
Embodiment one:
User Zhang San sets up account and submits palmprint information and oneself selected right-hand man of two hands in bank first
0-1 sorts and coded system and by 1, stretches the identification password that palm coding is formed 1,0,0,1,0 six time, stretches the palm 1,1,0 three time
The alarm password of formation and 1, stretches backup password that the palm formed for 0,1,0,1 five time to be embodied in the database of bank server.
Then mobile phone is passed through after Zhang San logs in bank account when the client shopping on the web that mobile phone is installed needs to pay first
Camera is absorbed six times and stretches palm image and sent to bank server, bank server by the ciphertext that symmetric encipherment algorithm is obtained
Its six times are stretched with the palmprint information that the image of the palm stretches the palm for its six times by being obtained after feature extraction and template extraction, bank server
Number by these palmprint informations with to be compared by search according to the palmprint information in storehouse to primarily determine that be Zhang San, bank after success
Zhang San's right-hand man's palmmprint coding information set in advance is in conjunction with the palmprint information for stretching the palm for its six times in server calls database
The identification password of Zhang San's input is determined for 1,0,1, and bank server is by the identity in the identification password and database
Checking password is compared, and is compared bank server after coincideing and is notified Zhang San's authentication success by ciphertext, and Zhang San can enter
Enter its account and realize network payment.
If Zhang San feels that its personal information includes that the encrypted message for setting goes wrong, it can be tested by success identity
Demonstrate,prove and modify.
If two palmprint informations of hand of Zhang San are stolen by hacker by network wooden horse, and attempt to log in Zhang San bank account
During family, because it can only provide fix information, it is impossible to provide palmmprint coding encrypted message, therefore it is stolen and can not succeed.
System can enroll and log in people's associated picture and used for solving a case below when hacker logs in unsuccessfully, and simultaneity factor can be by short message
Breath notifies Zhang San to avoid risk.
If Zhang San is held as a hostage, Zhang San can be stretched by its three times and be slapped and the palmprint information of acquisition and its alarm of formation
Password alarms for example neighbouring by 110 to the police by bank account authentication system, and simultaneity factor prompt system failure is opened with protecting
Three.
Embodiment two:
After the gate control system network that certain prison system is set up, two palmprint informations of hand of submission of every prison guard are collected first
And sequence and the coded system of 0 to the 1 of oneself left and right palm, and its selected 1,1,1 identification password, 1,0,1 three time
Palm alarm password is stretched to be embodied in the database of gate control system server.Usually prison guard A workings are installed by each firm door in prison
Have the client of electric capacity palmprint sensor close using the palmprint information for stretching the palm for its selected three times and authentication of its formation
Code carries out authentication to pass in and out prison access control system by the ciphertext that rivest, shamir, adelman is obtained, if prison guard is subject to crime
Molecule threatens the palmprint information and its password prompt for being formed of then stretching the palm by three times alarm occur to inform that other prison guards provide
Support, and gate control system then prompt system breaks down protecting prison guard.
Embodiment three:
Li Si is provided with ultrasonic wave palmprint sensor authentication system on safety box, only successfully to carry out body
Can opening safety case after part checking.It is 0- that subsequent Li Si submits the palmprint information and oneself selected right-to-left of two hand to
1 sortord and stretch for three times the palm formed 0,0,1 identification password, stretch twice the palm formed 1,1 alarm password and stretch the palm 5 times
1,0,1,0, the 1 backup password for being formed is being embodied in the database of safety box server.Now client merges with server
Together.Can be entered by the encrypted message of the palmprint information of its selected hand and its formation when opening safety case is needed behind Li Si
Row log in, authentication and open.
When Li Si forgets its identification password, can be by selecting the palmprint information of hand and backup password of its formation
Logged in and given for change or reset identification password.Can be by selecting hand when Li Si is by stress opening safety case
Palmmprint and its alarm password of formation logged in, authentication system is alarmed by being contacted with the police at that time, while carrying
There was a mechanical failure and protects Li Si to show safety box.
Example IV:
King five is input into two hands of its household in safety door for dwelling installation authentication system and in system database
Palmprint information and its selected left and right are 0-1 sortords and the selected identification password for stretching out one's hand palmmprint coding composition, alarm
Password.Its one family can pass in and out safety door with by authentication system below, safe and convenient.
Embodiment five:
User Zhang San sets up account and submits palmprint information and oneself selected right-hand man of two hands in bank first
0-1 sorts and coded system and by 1, stretches the identification password that palm coding is formed 1,0,0,1,0 six time, stretches the palm 1,1,0 three time
The alarm password of formation and 1, stretches backup password that the palm formed for 0,1,0,1 five time to be embodied in the database of bank server.
Then mobile phone is passed through after Zhang San logs in bank account when the client shopping on the web that mobile phone is installed needs to pay first
The image processing software that camera intake is stretched palm image for six times and loaded by mobile phone login account passes through feature extraction and template
Its three face informations in no time are obtained after extraction, and are sent to bank server by the ciphertext that symmetric encipherment algorithm is obtained,
Bank server number by these palmprint informations with to be compared by search according to the palmprint information in storehouse to primarily determine that be Zhang San,
Zhang San's right-hand man's palmmprint coding information set in advance stretches the palm in conjunction with its six times during bank server calls database after success
Palmprint information determine the identification password of Zhang San's input for 1,0,1, bank server is by the identification password and data
Identification password in storehouse is compared, and is compared bank server after coincideing and is notified Zhang San's authentication success by ciphertext,
Zhang San can enter its account and realize network payment.
Claims (8)
1. a kind of coding encrypting method of palmprint information, it is characterised in that set putting in order and according to 0- for people right-hand man first
1 i.e. binary system encoded, then stretch the palm by obtain palmmprint coding based on password segment, repetition stretch palm process with build by
Stretch the binary coded of the password segment structure that the palm is formed for each time;
The palm of stretching refers to stretch out selected palm and gathered by palmmprint collecting device to stretch palm palmprint image to obtain related palmmprint
Information, coding information go forward side by side onestep extraction be based on coding information password segment;And it refers to once to stretch palm completion to repeat to stretch the palm
Afterwards, the selected palm of the palm will be once stretched in addition and is stretched out and is gathered by palmmprint collecting device stretch palm palmprint image to obtain the related palm
Line information, coding information go forward side by side onestep extraction be based on coding information password segment.
2. the coding encrypting method of palmprint information according to claim 1, it is characterised in that the palmprint image is by imaging
Equipment, capacitance sensor, inductance sensor, ultrasonic sensor obtain equipment and obtain in interior palmmprint.
3. the coding encrypting method of a kind of palmprint information according to claim 1, it is characterised in that the palmprint image leads to
Cross feature extraction and template extraction and obtain and can be used for the palmprint information that information is compared.
4. a kind of a kind of application process of palmprint information as claimed in claim 1, it is characterised in that the password is used for identity
Checking system;The authentication system includes client and server, and client is logged in except that can allow authentication person
It is outer also possess can obtain authentication person and be based on the palmprint information of palmprint image and further carried by feature extraction and template
Take and obtain the information extracting system that can enter the palmprint information that row information is compared;Server end includes application server and data
Storehouse, the palmprint information for having the right-hand man that can enter row information comparison of authentication person in database, the sequence of left and right palmmprint
With coding information and password, and application server then undertakes connection client and database and carries out the function of computational service;Should
With server and client by ciphertext communication realize authentication person user log in, authentication;The computing of application server
Service function refers to that the palmprint information that calculation server will be stretched in palmprint information and database that the palm is obtained passes through search, information ratio
To primarily determine that authentication person, application server calls the left and right palmmprint of authentication person to encode from database after success
Information simultaneously further incorporates more than the palmprint information for once stretching the palm and coding information password segment group of the extraction based on coding information
The authentication person's input identification password for being formed is closed, the authentication that be input into for authentication person by subsequent application server is close
Code is compared to determine authentication person's identity by searching for the identification password in database into row information;When client not
When can carry out feature extraction and the template extraction of acquired palmprint image, the application server of server end undertakes acquired palmmprint
The feature extraction of image and template extraction.
5. a kind of application process of palmprint information according to claim 4, it is characterised in that the identity of authentication system
Checking flow includes authentication person after client proposes authentication request to application server, and authentication system is opened
Dynamic, application server sends acquisition checking information requirement to client identity verifier, and then authentication person passes through client
Information extracting system is extracted more than the palmprint information for once stretching palm acquisition and is transferred to application server successively, and application server will
Palmprint information is compared to primarily determine that authentication person's identity with the palmprint information in database by search, should after success
The coding information of the left and right palmmprint of authentication person is called from database with server and is further incorporated more than and once stretch the palm
Palmprint information and coding information extract based on coding information password segment combine to be formed authentication person input identity test
Card password, the identification password that be input into for authentication person by subsequent application server leads to the identification password in database
Cross to search for and compared to determine authentication person's identity into row information, when information is compared to be confirmed to coincide, application server feedback visitor
The authentication person's authentication success of family end, and when information compares continuous three failures then by application server feedback client
Authentication person's authentication fails.
6. the application process of a kind of palmprint information according to claim 4, it is characterised in that the password is in authentication
After person's authentication success, it is modified with application server contacts from client;The password is to same authentication person
Multiple, including identification password, alarm password, backup password can be set;The identification password is used for authentication;
The alarm password is used for authentication of authentication person when being coerced by other people, and now application server can be by informing
The system failure and terminate the authentication taken in conjunction police seek assist;The backup password is used to prevent authentication person from forgetting body
Can again give for change or reset identification password during part checking password.
7. a kind of application process of palmprint information according to claim 4, it is characterised in that the authentication system clothes
The database of business device is including the palmprint information of right-hand man, the volume of right-hand man's palmmprint it is determined that being collected in the case of authentication person's identity
Code information and the password of authentication person's setting.
8. the application process of a kind of palmprint information according to claim 4, it is characterised in that the authentication system enters
It refers to lead to palmprint information in database after the palmprint image of collection is carried out into feature extraction and template extraction that capable information is compared
Crossing search carries out information verification with discriminative information comparison result, and verification primarily determines that the left and right for calling it to set after authentication person
Palm line coding information and being extracted based on coding more than the palmprint information and coding information for once stretching the palm with reference to authentication person
The password segment of information combine to be formed authentication person input identification password and again with authentication person in database
Identification password by search with discriminative information comparison result.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310661847.XA CN103646236B (en) | 2013-12-09 | 2013-12-09 | The coding encrypting and application process of a kind of palmprint information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310661847.XA CN103646236B (en) | 2013-12-09 | 2013-12-09 | The coding encrypting and application process of a kind of palmprint information |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103646236A CN103646236A (en) | 2014-03-19 |
CN103646236B true CN103646236B (en) | 2017-07-07 |
Family
ID=50251447
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310661847.XA Expired - Fee Related CN103646236B (en) | 2013-12-09 | 2013-12-09 | The coding encrypting and application process of a kind of palmprint information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103646236B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105323355A (en) * | 2015-09-22 | 2016-02-10 | 电子科技大学 | Android privacy protection system based on palm print recognition |
CN106096444B (en) * | 2016-06-12 | 2019-05-14 | 杨鹏 | A kind of identification based on biological information and social information's recording method and system |
CN108595933B (en) * | 2018-04-25 | 2019-12-17 | 维沃移动通信有限公司 | Verification information prompting method and mobile terminal |
CN109635906A (en) * | 2018-12-07 | 2019-04-16 | 深圳市集虹鼎源科技有限公司 | Two-dimensional code generation method and device |
TWI696141B (en) * | 2019-04-17 | 2020-06-11 | 彰化商業銀行股份有限公司 | Feature coding system and method and online banking service system and method thereof using the same |
CN116405211B (en) * | 2023-06-07 | 2023-09-01 | 深圳市乐凡信息科技有限公司 | Multiple encryption method, device, equipment and storage medium based on biological characteristics |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1971582A (en) * | 2005-11-24 | 2007-05-30 | 中国科学院自动化研究所 | Identity identification method based on palmprint image recognition |
CN101093626A (en) * | 2007-07-27 | 2007-12-26 | 哈尔滨工业大学 | Palm print cipher key system |
CN103400436A (en) * | 2013-08-17 | 2013-11-20 | 慈溪市科创电子科技有限公司 | Access control system and control method thereof |
-
2013
- 2013-12-09 CN CN201310661847.XA patent/CN103646236B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1971582A (en) * | 2005-11-24 | 2007-05-30 | 中国科学院自动化研究所 | Identity identification method based on palmprint image recognition |
CN101093626A (en) * | 2007-07-27 | 2007-12-26 | 哈尔滨工业大学 | Palm print cipher key system |
CN103400436A (en) * | 2013-08-17 | 2013-11-20 | 慈溪市科创电子科技有限公司 | Access control system and control method thereof |
Also Published As
Publication number | Publication date |
---|---|
CN103646236A (en) | 2014-03-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103646236B (en) | The coding encrypting and application process of a kind of palmprint information | |
CN103646201A (en) | Verification method achieved by combining human faces with identities | |
US9704051B2 (en) | Method and system for verifying identities | |
CN103646202A (en) | Fingerprint information coding encryption and application method | |
Amin et al. | Biometric and traditional mobile authentication techniques: Overviews and open issues | |
CN103646200B (en) | The coding encrypting of a kind of face information and application process | |
US11503021B2 (en) | Mobile enrollment using a known biometric | |
CN107124283A (en) | A kind of physical characteristics collecting system and physical characteristics collecting method | |
Prakash et al. | A biometric approach for continuous user authentication by fusing hard and soft traits. | |
Kaur | A study of biometric identification and verification system | |
Teh et al. | Improving keystroke dynamics authentication system via multiple feature fusion scheme | |
Wang et al. | Towards DTW-based unlock scheme using handwritten graphics on smartphones | |
CN103647769B (en) | A kind of coding encrypting and application process of human ear information | |
Sharma et al. | Encryption of text using fingerprints as input to various algorithms | |
Wang et al. | Multi-modal biometric authentication fusing iris and palmprint based on GMM | |
KR100701583B1 (en) | Method of biomass authentication for reducing FAR | |
Kalsoom et al. | Iris recognition: existing methods and open issues | |
Vinothkanna et al. | A multimodal biometric approach for the recognition of finger print, palm print and hand vein using fuzzy vault | |
Ilugbusi et al. | Development of a multi-intance fingerprint based authentication system | |
Gladkikh et al. | Development of biometric systems for passenger identification based on noise-resistant coding means | |
Sahana et al. | Multi Biometric Recognition System | |
Dadakhanov | Analyze and development system with multiple biometric identification | |
Bedi | Design of a Secure Fingerprint Bank Locker for Bank Security | |
Pradhan et al. | Authentication using 3 tier biometric modalities | |
Singh et al. | Smart cards with biometric influences: an enhanced id authentication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20170707 |