CN103646236B - The coding encrypting and application process of a kind of palmprint information - Google Patents

The coding encrypting and application process of a kind of palmprint information Download PDF

Info

Publication number
CN103646236B
CN103646236B CN201310661847.XA CN201310661847A CN103646236B CN 103646236 B CN103646236 B CN 103646236B CN 201310661847 A CN201310661847 A CN 201310661847A CN 103646236 B CN103646236 B CN 103646236B
Authority
CN
China
Prior art keywords
information
authentication
password
palmprint
palm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310661847.XA
Other languages
Chinese (zh)
Other versions
CN103646236A (en
Inventor
张继中
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southeast University
Original Assignee
Southeast University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southeast University filed Critical Southeast University
Priority to CN201310661847.XA priority Critical patent/CN103646236B/en
Publication of CN103646236A publication Critical patent/CN103646236A/en
Application granted granted Critical
Publication of CN103646236B publication Critical patent/CN103646236B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Collating Specific Patterns (AREA)

Abstract

The coding encrypting and application process of a kind of palmprint information are related to information safety system, particularly the encrypted message that the fixed biological information of people's palmmprint builds with staff palmmprint coding is combined and is not only able to play the security relative high that human body biological characteristics are recognized, reliability, convenience and the behavioral characteristics of password can be played and avoided because of stolen the triggered safety problem of biological information, simultaneously because the complexity of password can decline therefore can also mitigate the burden of authentication person's cipher memory so as to be favorably improved information security and promote the further genralrlization application of identity validation technology.

Description

The coding encrypting and application process of a kind of palmprint information
Technical field
The present invention relates to the coding encrypting mode and application process of a kind of palmprint information, particularly by the right-and-left palm of people Line is encoded to build password by binary mode, so as to realize the combination of biological characteristic and variable cipher that palmmprint is fixed And improve the security for being recognized based on biometric identity or being verified.
Background technology
Progress into 21st century science and technology causes class society quick stepped into information epoch, the information technology of high speed development The information interchange of people is allowed to become more convenient, fast, operating efficiency obtains huge lifting, and reinvents us in all its bearings Society.However, the development band stolen, falsely use or distort also to our societies of thing followed information security issue such as information Stern challenge is carried out.Estimate according to Federal Trade Commission, in recent years, about 10,000,000 American individual every year Information is stolen or abuses, and 5,000,000,000 dollars of loss is caused to consumer, and the loss of annual commercial undertaking is then up to 48,000,000,000 U.S.s Unit.It is the important channel for ensuring information safety to carry out personal verification, how personal identification is rapidly and accurately identified, with true Protect information security and safeguard civil order, it has also become modern society's important topic urgently to be resolved hurrily.
Traditional authentication identifying method mainly has two kinds:Knowledge based engineering method and the method based on keepsake.Knowledge based Method determine personal identification by checking " what you know ", i.e., person to be verified uses grasped knowledge such as password, individual People's identification code (PIN) or password etc. prove the identity of oneself.Method based on keepsake then by check " what you possess " come Determine personal identification, i.e., person to be verified proves the identity of oneself using the keepsake held such as certificate, seal or key etc..It is aobvious So, above two method has obvious defect, and " knowledge " exists easily to forget or obscure, be stolen by others or crack etc. and asks Topic, " keepsake " then there are problems that it is inconvenient to carry, can lose or be stolen, easily.Therefore, traditional identity discrimination method Defect causes its development for being increasingly not suitable with science and technology and the progress of society, is that this people has turned to sight with not reproducible The biological identification technology of feature human body biological characteristics.So-called bio-identification, i.e., determine personal identification according to characteristics of human body.With biography " knowledge " that system technology is used is compared with " keepsake ", and the characteristics of human body that biological identification technology is used has and is not afraid of forgetting, no Can lose, be difficult to forge, it is irreplaceable, be not required to the outstanding advantages such as extra carrying.Therefore, bio-identification is not only safe and reliable, and And it is easy to operate, with significant superiority.
The feature that human body is used for bio-identification can be divided into two classes:Physiological characteristic and behavioural characteristic.Physiological characteristic mainly has: Fingerprint, palm shape, iris, retina, face, facial thermal imagery etc.;Behavioural characteristic mainly has:Signature, voice, gait, keystroke etc..Grind Study carefully and experiment shows, the features described above of human body all meets generality, uniqueness, stability and collection property etc. to varying degrees Four requirements of fundamental property.Based on these features, people have developed various biological identification technologies, wherein application is relatively wide or studies Deeper has:Fingerprint recognition, the identification of palm shape, iris recognition, retina identification, recognition of face, facial thermal imagery identification, human ear are known Not, signature recognition, speech recognition etc..In various biological identification technologies, fingerprint recognition is most widely used with palm shape identification. Compared to other technologies such as fingerprint, face and iris recognitions, the characteristics of personal recognition has its exclusive:(1) palmmprint region is than larger, Contain the features such as abundant grain;(2) current personal recognition mainly uses low-resolution image, and collecting device cost is not Height, especially, with computer camera, the popularization of mobile phone camera, palmmprint can together constitute multi-modal certification with face System;(3) hand contour line is utilized, is easy to position the R01 regions of palmmprint;(4) palmmprint is easily with hand etc. Feature constitute multimodal recognition system, without increase hardware cost, it is often more important that, personal recognition be a kind of discrimination very Biometrics identification technology high, can be as fingerprint and the substitute technology of iris recognition.
But biological characteristic is fixed in actual application be stolen the safety problem of initiation and limit living things feature recognition The large-scale promotion application of technology.For example on the one hand on the internet by trojan horse usurp other people including ID card No., Fingerprint, face information and the report committed a crime happens occasionally, or even there occurs prison inmates after prison guard is murdered with the fingerprint of prison guard The felony opened prison gate and sneak away.These problems generation cause people to biometrics identification technology can Query is proposed by property and security.There is problem during biometrics identification technology can effectively be overcome in therefore urgent need development now New method, system advantageously promoting the development of social economy and the raising of living standards of the people.
Therefore, the application propose to be encoded the palm line of people or so two by binary system in the world first it is close to build Code, improves based on biometric identity identification or tests so as to realize biological characteristic and the combination of variable cipher that palmmprint fixes The security of card, contributes to the further development for information security and social civilization.
The content of the invention
Technical problem:It is an object of the invention to provide the coding encrypting and application process of a kind of palmprint information, by people or so Two palm lines are encoded to build password by binary system, so as to realize the biological characteristic of palmmprint fixation and the group of variable cipher Close with play convenience of the biological information in authentication, it is effective the advantages of and coding encrypting dynamic advantage, to ensure Authentication conveniently, safely with reliability.
Technical scheme:The right-and-left palmmprint of people is encoded to build by the present invention by binary system first in the world Password, so as to realize the combination of biological characteristic and variable cipher that staff palmmprint is fixed and by fixed palmmprint biological information Being combined from variable different palmmprints coding encrypted message is used for authentication, so that it is close with coding to play biological information identification The advantage of code information identification, to advance the further development and application of identity validation technology.A kind of coding encrypting mode of palmmprint And application process is it is characterized in that setting people right-hand man putting in order and encoded according to 0-1 i.e. binary system first, then Password segment of the palm based on obtaining palmmprint coding is stretched, repetition is stretched palm process and can be built and stretches the cipher chips that the palm is formed by each time It is disconnected build it is binary coded.
A kind of coding encrypting method of palmprint information of the present invention, it is characterised in that set putting in order for people right-hand man first And according to 0-1 be that binary system is encoded, password segment of the palm based on obtaining palmmprint coding is then stretched, palm process is stretched in repetition To build the binary coded of the password segment structure that the palm is formed is stretched by each time.
The palm of stretching refers to stretch out selected palm and gathered by palmmprint collecting device to stretch palm palmprint image to obtain correlation Palmprint information, coding information go forward side by side onestep extraction be based on coding information password segment;And it refers to once to stretch the palm to repeat to stretch the palm After the completion of, the selected palm of the palm will be once stretched in addition and is stretched out and is gathered by palmmprint collecting device stretch palm palmprint image to obtain phase Close palmprint information, coding information onestep extraction of going forward side by side and be based on the password segment of coding information.
The palmprint image is obtained by picture pick-up device, capacitance sensor, inductance sensor, ultrasonic sensor in interior palmmprint Taking equipment is obtained.
The palmprint image obtains the palmprint information that can be used for information comparison by feature extraction and template extraction;
A kind of application process of palmprint information of the invention is:The password is used for authentication system;The identity is tested Card system includes client and server, and client also possesses in addition to authentication person can be allowed to log in can obtain identity Verifier is based on the palmprint information of palmprint image and is further obtained by feature extraction and template extraction that row information can be entered The information extracting system of the palmprint information of comparison;Server end includes application server and database, has identity in database The palmprint information of the right-hand man that can enter row information comparison of verifier, the sequence of left and right palmmprint and coding information and password, and Application server then undertakes connection client with database and carries out the function of computational service;Application server passes through with client Ciphertext communication realize authentication person user log in, authentication;The computational service function of application server refers to computational service The palmprint information that device will be stretched in the palmprint information and database that the palm is obtained is compared to primarily determine that authentication by search, information Person, application server calls the left and right palmmprint coding information of authentication person from database and further incorporates more than after success The palmprint information and coding information for once stretching the palm extract the password segment based on coding information to combine the authentication person to be formed defeated Enter identification password, the identification password that be input into for authentication person by subsequent application server is tested with the identity in database Card password is compared to determine authentication person's identity by searching for into row information;When client can not carry out acquired palmprint image Feature extraction and during template extraction, the application server of server end undertakes feature extraction and the template of acquired palmprint image Extract.
The authentication flow of authentication system includes that authentication person proposes body by client to application server After part checking request, authentication system starts, and application server sends acquisition checking information to client identity verifier will Ask, then authentication person is extracted more than the palmprint information for once stretching palm acquisition and passed successively by client-side information extraction system Application server is handed to, application server compares with preliminary palmprint information with the palmprint information in database by search Determine authentication person's identity, application server calls the coding of the left and right palmmprint of authentication person to believe from database after success Cease and further incorporate more than the palmprint information for once stretching the palm and password segment combination of the coding information extraction based on coding information Authentication person's input identification password of formation, the identification password that be input into for authentication person by subsequent application server Compared into row information to determine authentication person's identity by searching for the identification password in database, when information is compared really When recognizing identical, application server feedback client identity verifier authentication success, and work as information and compare continuous three failures Shi Ze is failed by application server feedback client identity verifier authentication.
The password is modified from client after authentication person's authentication success with application server contacts; The password can set multiple, including identification password, alarm password, backup password to same authentication person;Institute Identification password is stated for authentication;The identity that the alarm password is used for when authentication person is coerced by other people is tested Demonstrate,prove, now application server can terminate the authentication taken in conjunction police and seek to assist by the system failure is informed;It is described standby Part password is close for can again be given for change when preventing authentication person from forgetting identification password or reset authentication Code.
The database of the authentication system server is including left and right it is determined that being collected in the case of authentication person's identity The password of the palmprint information of hand, the coding information of right-hand man's palmmprint and authentication person's setting.
It refers to that the palmprint image of collection is carried out into feature extraction and template that the information that the authentication system is carried out is compared Information verification is carried out with discriminative information comparison result by search with palmprint information in database after extraction, verification primarily determines that body Its right-hand man's palmmprint coding information for setting is called after part verifier and with reference to authentication person more than the palmmprint for once stretching the palm Information and coding information extract the password segment based on coding information and combine the authentication person to be formed input identification password And the identification password with authentication person in database passes through to search for discriminative information comparison result again.
The client of authentication system passes through ciphertext communication with application server;Described ciphertext passes through AES reality Existing, AES includes symmetry algorithm and asymmetric arithmetic;
The client and server may be incorporated in together.
Beneficial effect:The ID cards and cryptographic technique of traditional identity checking and existing human body biological characteristics identification technology are in body The aspect such as safe and accurate, convenient, fast and cheap that part checking is required also there are problems that a lot, be this application by people's palmmprint The encrypted message that builds of fixed biological information and staff palmmprint coding is combined and is not only able to play human body biological characteristics knowledge Other security relatively high, reliability, convenience and the behavioral characteristics of password can be played and reduced or even avoided because of life Stolen the triggered safety problem of thing characteristic information, simultaneously because the complexity of password can decline therefore can also mitigate identity The burden of verifier's cipher memory is so as to be favorably improved information security and promote the further expansion of authentication application field.
Brief description of the drawings
Fig. 1 is staff palmprint information coding encrypting combination authentication system structure.
Fig. 2 is staff palmprint information coding encrypting combination authentication system authentication flow.
Specific embodiment
With reference to embodiment, the present invention is further illustrated.
Embodiment one:
User Zhang San sets up account and submits palmprint information and oneself selected right-hand man of two hands in bank first 0-1 sorts and coded system and by 1, stretches the identification password that palm coding is formed 1,0,0,1,0 six time, stretches the palm 1,1,0 three time The alarm password of formation and 1, stretches backup password that the palm formed for 0,1,0,1 five time to be embodied in the database of bank server. Then mobile phone is passed through after Zhang San logs in bank account when the client shopping on the web that mobile phone is installed needs to pay first Camera is absorbed six times and stretches palm image and sent to bank server, bank server by the ciphertext that symmetric encipherment algorithm is obtained Its six times are stretched with the palmprint information that the image of the palm stretches the palm for its six times by being obtained after feature extraction and template extraction, bank server Number by these palmprint informations with to be compared by search according to the palmprint information in storehouse to primarily determine that be Zhang San, bank after success Zhang San's right-hand man's palmmprint coding information set in advance is in conjunction with the palmprint information for stretching the palm for its six times in server calls database The identification password of Zhang San's input is determined for 1,0,1, and bank server is by the identity in the identification password and database Checking password is compared, and is compared bank server after coincideing and is notified Zhang San's authentication success by ciphertext, and Zhang San can enter Enter its account and realize network payment.
If Zhang San feels that its personal information includes that the encrypted message for setting goes wrong, it can be tested by success identity Demonstrate,prove and modify.
If two palmprint informations of hand of Zhang San are stolen by hacker by network wooden horse, and attempt to log in Zhang San bank account During family, because it can only provide fix information, it is impossible to provide palmmprint coding encrypted message, therefore it is stolen and can not succeed. System can enroll and log in people's associated picture and used for solving a case below when hacker logs in unsuccessfully, and simultaneity factor can be by short message Breath notifies Zhang San to avoid risk.
If Zhang San is held as a hostage, Zhang San can be stretched by its three times and be slapped and the palmprint information of acquisition and its alarm of formation Password alarms for example neighbouring by 110 to the police by bank account authentication system, and simultaneity factor prompt system failure is opened with protecting Three.
Embodiment two:
After the gate control system network that certain prison system is set up, two palmprint informations of hand of submission of every prison guard are collected first And sequence and the coded system of 0 to the 1 of oneself left and right palm, and its selected 1,1,1 identification password, 1,0,1 three time Palm alarm password is stretched to be embodied in the database of gate control system server.Usually prison guard A workings are installed by each firm door in prison Have the client of electric capacity palmprint sensor close using the palmprint information for stretching the palm for its selected three times and authentication of its formation Code carries out authentication to pass in and out prison access control system by the ciphertext that rivest, shamir, adelman is obtained, if prison guard is subject to crime Molecule threatens the palmprint information and its password prompt for being formed of then stretching the palm by three times alarm occur to inform that other prison guards provide Support, and gate control system then prompt system breaks down protecting prison guard.
Embodiment three:
Li Si is provided with ultrasonic wave palmprint sensor authentication system on safety box, only successfully to carry out body Can opening safety case after part checking.It is 0- that subsequent Li Si submits the palmprint information and oneself selected right-to-left of two hand to 1 sortord and stretch for three times the palm formed 0,0,1 identification password, stretch twice the palm formed 1,1 alarm password and stretch the palm 5 times 1,0,1,0, the 1 backup password for being formed is being embodied in the database of safety box server.Now client merges with server Together.Can be entered by the encrypted message of the palmprint information of its selected hand and its formation when opening safety case is needed behind Li Si Row log in, authentication and open.
When Li Si forgets its identification password, can be by selecting the palmprint information of hand and backup password of its formation Logged in and given for change or reset identification password.Can be by selecting hand when Li Si is by stress opening safety case Palmmprint and its alarm password of formation logged in, authentication system is alarmed by being contacted with the police at that time, while carrying There was a mechanical failure and protects Li Si to show safety box.
Example IV:
King five is input into two hands of its household in safety door for dwelling installation authentication system and in system database Palmprint information and its selected left and right are 0-1 sortords and the selected identification password for stretching out one's hand palmmprint coding composition, alarm Password.Its one family can pass in and out safety door with by authentication system below, safe and convenient.
Embodiment five:
User Zhang San sets up account and submits palmprint information and oneself selected right-hand man of two hands in bank first 0-1 sorts and coded system and by 1, stretches the identification password that palm coding is formed 1,0,0,1,0 six time, stretches the palm 1,1,0 three time The alarm password of formation and 1, stretches backup password that the palm formed for 0,1,0,1 five time to be embodied in the database of bank server. Then mobile phone is passed through after Zhang San logs in bank account when the client shopping on the web that mobile phone is installed needs to pay first The image processing software that camera intake is stretched palm image for six times and loaded by mobile phone login account passes through feature extraction and template Its three face informations in no time are obtained after extraction, and are sent to bank server by the ciphertext that symmetric encipherment algorithm is obtained, Bank server number by these palmprint informations with to be compared by search according to the palmprint information in storehouse to primarily determine that be Zhang San, Zhang San's right-hand man's palmmprint coding information set in advance stretches the palm in conjunction with its six times during bank server calls database after success Palmprint information determine the identification password of Zhang San's input for 1,0,1, bank server is by the identification password and data Identification password in storehouse is compared, and is compared bank server after coincideing and is notified Zhang San's authentication success by ciphertext, Zhang San can enter its account and realize network payment.

Claims (8)

1. a kind of coding encrypting method of palmprint information, it is characterised in that set putting in order and according to 0- for people right-hand man first 1 i.e. binary system encoded, then stretch the palm by obtain palmmprint coding based on password segment, repetition stretch palm process with build by Stretch the binary coded of the password segment structure that the palm is formed for each time;
The palm of stretching refers to stretch out selected palm and gathered by palmmprint collecting device to stretch palm palmprint image to obtain related palmmprint Information, coding information go forward side by side onestep extraction be based on coding information password segment;And it refers to once to stretch palm completion to repeat to stretch the palm Afterwards, the selected palm of the palm will be once stretched in addition and is stretched out and is gathered by palmmprint collecting device stretch palm palmprint image to obtain the related palm Line information, coding information go forward side by side onestep extraction be based on coding information password segment.
2. the coding encrypting method of palmprint information according to claim 1, it is characterised in that the palmprint image is by imaging Equipment, capacitance sensor, inductance sensor, ultrasonic sensor obtain equipment and obtain in interior palmmprint.
3. the coding encrypting method of a kind of palmprint information according to claim 1, it is characterised in that the palmprint image leads to Cross feature extraction and template extraction and obtain and can be used for the palmprint information that information is compared.
4. a kind of a kind of application process of palmprint information as claimed in claim 1, it is characterised in that the password is used for identity Checking system;The authentication system includes client and server, and client is logged in except that can allow authentication person It is outer also possess can obtain authentication person and be based on the palmprint information of palmprint image and further carried by feature extraction and template Take and obtain the information extracting system that can enter the palmprint information that row information is compared;Server end includes application server and data Storehouse, the palmprint information for having the right-hand man that can enter row information comparison of authentication person in database, the sequence of left and right palmmprint With coding information and password, and application server then undertakes connection client and database and carries out the function of computational service;Should With server and client by ciphertext communication realize authentication person user log in, authentication;The computing of application server Service function refers to that the palmprint information that calculation server will be stretched in palmprint information and database that the palm is obtained passes through search, information ratio To primarily determine that authentication person, application server calls the left and right palmmprint of authentication person to encode from database after success Information simultaneously further incorporates more than the palmprint information for once stretching the palm and coding information password segment group of the extraction based on coding information The authentication person's input identification password for being formed is closed, the authentication that be input into for authentication person by subsequent application server is close Code is compared to determine authentication person's identity by searching for the identification password in database into row information;When client not When can carry out feature extraction and the template extraction of acquired palmprint image, the application server of server end undertakes acquired palmmprint The feature extraction of image and template extraction.
5. a kind of application process of palmprint information according to claim 4, it is characterised in that the identity of authentication system Checking flow includes authentication person after client proposes authentication request to application server, and authentication system is opened Dynamic, application server sends acquisition checking information requirement to client identity verifier, and then authentication person passes through client Information extracting system is extracted more than the palmprint information for once stretching palm acquisition and is transferred to application server successively, and application server will Palmprint information is compared to primarily determine that authentication person's identity with the palmprint information in database by search, should after success The coding information of the left and right palmmprint of authentication person is called from database with server and is further incorporated more than and once stretch the palm Palmprint information and coding information extract based on coding information password segment combine to be formed authentication person input identity test Card password, the identification password that be input into for authentication person by subsequent application server leads to the identification password in database Cross to search for and compared to determine authentication person's identity into row information, when information is compared to be confirmed to coincide, application server feedback visitor The authentication person's authentication success of family end, and when information compares continuous three failures then by application server feedback client Authentication person's authentication fails.
6. the application process of a kind of palmprint information according to claim 4, it is characterised in that the password is in authentication After person's authentication success, it is modified with application server contacts from client;The password is to same authentication person Multiple, including identification password, alarm password, backup password can be set;The identification password is used for authentication; The alarm password is used for authentication of authentication person when being coerced by other people, and now application server can be by informing The system failure and terminate the authentication taken in conjunction police seek assist;The backup password is used to prevent authentication person from forgetting body Can again give for change or reset identification password during part checking password.
7. a kind of application process of palmprint information according to claim 4, it is characterised in that the authentication system clothes The database of business device is including the palmprint information of right-hand man, the volume of right-hand man's palmmprint it is determined that being collected in the case of authentication person's identity Code information and the password of authentication person's setting.
8. the application process of a kind of palmprint information according to claim 4, it is characterised in that the authentication system enters It refers to lead to palmprint information in database after the palmprint image of collection is carried out into feature extraction and template extraction that capable information is compared Crossing search carries out information verification with discriminative information comparison result, and verification primarily determines that the left and right for calling it to set after authentication person Palm line coding information and being extracted based on coding more than the palmprint information and coding information for once stretching the palm with reference to authentication person The password segment of information combine to be formed authentication person input identification password and again with authentication person in database Identification password by search with discriminative information comparison result.
CN201310661847.XA 2013-12-09 2013-12-09 The coding encrypting and application process of a kind of palmprint information Expired - Fee Related CN103646236B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310661847.XA CN103646236B (en) 2013-12-09 2013-12-09 The coding encrypting and application process of a kind of palmprint information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310661847.XA CN103646236B (en) 2013-12-09 2013-12-09 The coding encrypting and application process of a kind of palmprint information

Publications (2)

Publication Number Publication Date
CN103646236A CN103646236A (en) 2014-03-19
CN103646236B true CN103646236B (en) 2017-07-07

Family

ID=50251447

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310661847.XA Expired - Fee Related CN103646236B (en) 2013-12-09 2013-12-09 The coding encrypting and application process of a kind of palmprint information

Country Status (1)

Country Link
CN (1) CN103646236B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105323355A (en) * 2015-09-22 2016-02-10 电子科技大学 Android privacy protection system based on palm print recognition
CN106096444B (en) * 2016-06-12 2019-05-14 杨鹏 A kind of identification based on biological information and social information's recording method and system
CN108595933B (en) * 2018-04-25 2019-12-17 维沃移动通信有限公司 Verification information prompting method and mobile terminal
CN109635906A (en) * 2018-12-07 2019-04-16 深圳市集虹鼎源科技有限公司 Two-dimensional code generation method and device
TWI696141B (en) * 2019-04-17 2020-06-11 彰化商業銀行股份有限公司 Feature coding system and method and online banking service system and method thereof using the same
CN116405211B (en) * 2023-06-07 2023-09-01 深圳市乐凡信息科技有限公司 Multiple encryption method, device, equipment and storage medium based on biological characteristics

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1971582A (en) * 2005-11-24 2007-05-30 中国科学院自动化研究所 Identity identification method based on palmprint image recognition
CN101093626A (en) * 2007-07-27 2007-12-26 哈尔滨工业大学 Palm print cipher key system
CN103400436A (en) * 2013-08-17 2013-11-20 慈溪市科创电子科技有限公司 Access control system and control method thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1971582A (en) * 2005-11-24 2007-05-30 中国科学院自动化研究所 Identity identification method based on palmprint image recognition
CN101093626A (en) * 2007-07-27 2007-12-26 哈尔滨工业大学 Palm print cipher key system
CN103400436A (en) * 2013-08-17 2013-11-20 慈溪市科创电子科技有限公司 Access control system and control method thereof

Also Published As

Publication number Publication date
CN103646236A (en) 2014-03-19

Similar Documents

Publication Publication Date Title
CN103646236B (en) The coding encrypting and application process of a kind of palmprint information
CN103646201A (en) Verification method achieved by combining human faces with identities
US9704051B2 (en) Method and system for verifying identities
CN103646202A (en) Fingerprint information coding encryption and application method
Amin et al. Biometric and traditional mobile authentication techniques: Overviews and open issues
CN103646200B (en) The coding encrypting of a kind of face information and application process
US11503021B2 (en) Mobile enrollment using a known biometric
CN107124283A (en) A kind of physical characteristics collecting system and physical characteristics collecting method
Prakash et al. A biometric approach for continuous user authentication by fusing hard and soft traits.
Kaur A study of biometric identification and verification system
Teh et al. Improving keystroke dynamics authentication system via multiple feature fusion scheme
Wang et al. Towards DTW-based unlock scheme using handwritten graphics on smartphones
CN103647769B (en) A kind of coding encrypting and application process of human ear information
Sharma et al. Encryption of text using fingerprints as input to various algorithms
Wang et al. Multi-modal biometric authentication fusing iris and palmprint based on GMM
KR100701583B1 (en) Method of biomass authentication for reducing FAR
Kalsoom et al. Iris recognition: existing methods and open issues
Vinothkanna et al. A multimodal biometric approach for the recognition of finger print, palm print and hand vein using fuzzy vault
Ilugbusi et al. Development of a multi-intance fingerprint based authentication system
Gladkikh et al. Development of biometric systems for passenger identification based on noise-resistant coding means
Sahana et al. Multi Biometric Recognition System
Dadakhanov Analyze and development system with multiple biometric identification
Bedi Design of a Secure Fingerprint Bank Locker for Bank Security
Pradhan et al. Authentication using 3 tier biometric modalities
Singh et al. Smart cards with biometric influences: an enhanced id authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170707