CN103647769B - A kind of coding encrypting and application process of human ear information - Google Patents

A kind of coding encrypting and application process of human ear information Download PDF

Info

Publication number
CN103647769B
CN103647769B CN201310664349.0A CN201310664349A CN103647769B CN 103647769 B CN103647769 B CN 103647769B CN 201310664349 A CN201310664349 A CN 201310664349A CN 103647769 B CN103647769 B CN 103647769B
Authority
CN
China
Prior art keywords
information
human ear
password
ear
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310664349.0A
Other languages
Chinese (zh)
Other versions
CN103647769A (en
Inventor
张继中
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southeast University
Original Assignee
Southeast University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southeast University filed Critical Southeast University
Priority to CN201310664349.0A priority Critical patent/CN103647769B/en
Publication of CN103647769A publication Critical patent/CN103647769A/en
Application granted granted Critical
Publication of CN103647769B publication Critical patent/CN103647769B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Collating Specific Patterns (AREA)

Abstract

The coding encrypting and application process of a kind of human ear information are related to information safety system, by by human ear or so profile information it is determined that being encoded according to binary system in the case of order, then constructed based on binary password with the different coding using left and right ear by more than spy ear once, so as to the password for building the fixed biological information of human ear profile and people or so ear contour encoding combines the security relative high for being not only able to performance human body biological characteristics identification, reliability, convenience and the behavioral characteristics of password can be played and avoided because of stolen the triggered safety problem of biological information, simultaneously because the complexity of password can decline therefore can also mitigate the burden of authentication person's cipher memory so as to be favorably improved information security and promote the further genralrlization application of identity validation technology.

Description

A kind of coding encrypting and application process of human ear information
Technical field
The present invention relates to the coding encrypting mode and its application process of a kind of human ear information, particularly the ear of people or so two is led to Cross binary mode to be encoded to build password, carried so as to realize biological characteristic and the combination of variable cipher that human ear fixes The security that height is recognized or verified based on biometric identity.
Background technology
Progress into 21st century science and technology causes class society quick stepped into information epoch, the information technology of high speed development The information interchange of people is allowed to become more convenient, fast, operating efficiency obtains huge lifting, and reinvents us in all its bearings Society.However, the development band stolen, falsely use or distort also to our societies of thing followed information security issue such as information Stern challenge is carried out.Estimate according to Federal Trade Commission, in recent years, about 10,000,000 American individual every year Information is stolen or abuses, and 5,000,000,000 dollars of loss is caused to consumer, and the loss of annual commercial undertaking is then up to 48,000,000,000 U.S.s Unit.It is the important channel for ensuring information safety to carry out personal verification, how personal identification is rapidly and accurately identified, with true Protect information security and safeguard civil order, it has also become modern society's important topic urgently to be resolved hurrily.
Traditional authentication identifying method mainly has two kinds:Knowledge based engineering method and the method based on keepsake.Knowledge based Method determine personal identification by checking " what you know ", i.e., person to be verified uses grasped knowledge such as password, individual People's identification code (PIN) or password etc. prove the identity of oneself.Method based on keepsake then by check " what you possess " come Determine personal identification, i.e., person to be verified proves the identity of oneself using the keepsake held such as certificate, seal or key etc..It is aobvious So, above two method has obvious defect, and " knowledge " exists easily to forget or obscure, be stolen by others or crack etc. and asks Topic, " keepsake " then there are problems that it is inconvenient to carry, can lose or be stolen, easily.Therefore, traditional identity discrimination method Defect causes its development for being increasingly not suitable with science and technology and the progress of society, is that this people has turned to sight with not reproducible The biological identification technology of feature human body biological characteristics.So-called bio-identification, i.e., determine personal identification according to characteristics of human body.With biography " knowledge " that system technology is used is compared with " keepsake ", and the characteristics of human body that biological identification technology is used has and is not afraid of forgetting, no Can lose, be difficult to forge, it is irreplaceable, be not required to the outstanding advantages such as extra carrying.Therefore, bio-identification is not only safe and reliable, and And it is easy to operate, with significant superiority.
The feature that human body is used for bio-identification can be divided into two classes:Physiological characteristic and behavioural characteristic.Physiological characteristic mainly has: Fingerprint, palm shape, iris, retina, face, facial thermal imagery etc.;Behavioural characteristic mainly has:Signature, voice, gait, keystroke etc..Grind Study carefully and experiment shows, the features described above of human body all meets generality, uniqueness, stability and collection property etc. to varying degrees Four requirements of fundamental property.Based on these features, people have developed various biological identification technologies, wherein application is relatively wide or studies Deeper has:Fingerprint recognition, the identification of palm shape, iris recognition, retina identification, recognition of face, facial thermal imagery identification, human ear are known Not, signature recognition, speech recognition etc..
Ear recognition is a kind of emerging biometrics identification technology recent years, and human ear possesses abundant physical arrangement, With generality, uniqueness and persistence.Compare with recognition of face, age, facial expression, cosmetics and Hu are not received in ear recognition The influence of palpus, while also with IMAQ conveniently, advantage susceptible to user acceptance, the solid colour of human ear, picture size is small, Data processing amount is also smaller.Therefore its application in authentication system is just paid high attention to by people.
But biological characteristic is fixed in actual application be stolen the safety problem of initiation and limit living things feature recognition The large-scale promotion application of technology.For example on the one hand on the internet by trojan horse usurp other people including ID card No., Fingerprint, face information and the report committed a crime happens occasionally, or even there occurs prison inmates after prison guard is murdered with the fingerprint of prison guard The felony opened prison gate and sneak away.These problems generation cause people to biometrics identification technology can Query is proposed by property and security.There is problem during biometrics identification technology can effectively be overcome in therefore urgent need development now New method, system advantageously promoting the development of social economy and the raising of living standards of the people.
Therefore, the application propose first in the world by people difference ear profile encoded by binary system it is close to build Code, improved so as to realize the combination of biological characteristic and variable cipher that human ear profile is fixed based on biometric identity identification or The security of person's checking, contributes to the further development for information security and social civilization.
The content of the invention
Technical problem:Encoded by binary system it is an object of the invention to provide a kind of profile information by people's difference ear To build password, so as to realize that the biological characteristic that human ear profile is fixed exists with the combination of variable cipher to play biological information Convenience in authentication, it is effective the advantages of and coding encrypting dynamic advantage, with ensure authentication conveniently, safely with can Lean on.
Technical scheme:The present invention is in the world first encoded with structure the profile information of people's difference ear by binary system Password is built, fixed human ear profile biological characteristic is believed so as to realize the combination of biological characteristic and variable cipher that human ear is fixed Ceasing the password built from variable different ear profile informations coding and combining is used for authentication, so as to play biological information knowledge Not with the advantage of password identification, to advance the further development and application of identity validation technology.
The coding encrypting method of human ear information of the invention, set first people or so ear put in order and according to 0-1 i.e. Binary system is encoded, then visit ear by obtain human ear profile information coding based on password segment, repeat visit ear process with Synthesize built by each password segment that is formed of spy ear binary coded.
It is described spy ear refer to stretch out selected ear and by ear profile information collecting device collection human ear contour images with Obtain relevant people ear profile information, coding information onestep extraction of going forward side by side and be based on the password segment of coding information;And repeatedly visiting ear is Refer to after the completion of once ear is visited, the selected ear of ear will be once visited in addition and is leant out and is gathered by ear profile information collecting device Human ear contour images with obtain relevant people ear profile information, coding information go forward side by side onestep extraction be based on coding information cipher chips It is disconnected.
The human ear contour images are obtained by picture pick-up device.
The human ear contour images obtain the people's helix that can be used for information comparison by feature extraction and template extraction Wide information;
The application process of human ear information of the invention is:The password is used for authentication system;The authentication system System includes client and server, and client also possesses in addition to authentication person can be allowed to log in can obtain authentication Person's human ear contour images and further obtained by feature extraction and template extraction and can enter the human ear profile of row information comparison The information extracting system of information;Server end includes application server and database, has the energy of authentication person in database Enough enter the human ear profile information of row information comparison, the sequence of left-right ear and coding information and compiled by selected human ear profile information The password that code is constituted, and application server then undertakes connection client with database and carries out the function of computational service;Using clothes Business device and client by ciphertext communication realize authentication person user log in, authentication;The computational service of application server Function refers to that the human ear profile information that application server will be visited in human ear profile information and database that ear is obtained passes through search, letter Breath is compared to primarily determine that authentication person, and then application server calls the left and right ear of authentication person to encode from database Information simultaneously further incorporates more than human ear profile information and coding information cipher chips of the extraction based on coding information for once visiting ear Authentication person's input identification password that disconnected combination is formed, subsequent application server tests the identity that authentication person is input into Card password is compared to determine authentication person's identity by searching for the identification password in database into row information;Work as client When end can not carry out feature extraction and the template extraction of acquired human ear contour images, the application server of server end undertakes institute Obtain feature extraction and the template extraction of human ear contour images.
The authentication flow of authentication system includes that authentication person proposes body by client to application server After part checking request, authentication system starts, and application server sends acquisition checking information to client identity verifier will Ask, then authentication person is extracted more than the human ear profile information for once visiting ear acquisition successively by client-side information extraction system And application server is transferred to, application server will visit the human ear profile information in the human ear profile information and database that ear is obtained Compared to primarily determine that authentication person's identity by search, then application server calls authentication from database The left and right ear coding information of person simultaneously further incorporates more than human ear profile information and the coding information extraction for once visiting ear based on volume The password segment of code information combines the authentication person to be formed input identification password, and subsequent application server is by authentication The identification password of person's input is compared to determine that identity is tested by searching for the identification password in database into row information Card person's identity, when information is compared to be confirmed to coincide, application server feedback client identity verifier authentication success, and work as Information is then failed when comparing continuous three failures by application server feedback client identity verifier authentication.
The password is modified from client after authentication person's authentication success with application server contacts; The password can set multiple, including identification password, alarm password, backup password to same authentication person;Institute Identification password is stated for authentication;The identity that the alarm password is used for when authentication person is coerced by other people is tested Demonstrate,prove, now application server can terminate the authentication taken in conjunction police and seek to assist by the system failure is informed;It is described standby Part password is close for can again be given for change when preventing authentication person from forgetting identification password or reset authentication Code.
The database of the authentication system server is including left and right it is determined that being collected in the case of authentication person's identity The profile information of human ear, the sequence of two ears and coding information and the password of authentication person's setting.
Information that the authentication system is carried out compare refer to by the human ear contour images of collection carry out feature extraction and Information verification is carried out with discriminative information comparison result by search with human ear profile information in database after template extraction, is verified just Step determines the left and right human ear coding information for calling it to set after authentication person, and combines the people of the multiple spy ear of authentication person Ear profile information and coding information are extracted the password segment based on coding information and are combined, and authentication person's input identity of formation is tested Card password simultaneously with the identification password of authentication person in database passes through search comparison with discriminative information comparison result again.
The client of the authentication system applied passes through ciphertext communication with application server;Described ciphertext is by adding Close algorithm realizes that AES includes symmetry algorithm and asymmetric arithmetic;
The client and server may be incorporated in together.
Beneficial effect:The ID cards and cryptographic technique of traditional identity checking and existing human body biological characteristics identification technology are in body The aspect such as safe and accurate, convenient, fast and cheap that part checking is required also there are problems that a lot, be this application by people's helix Wide fixed biological information is combined with human ear profile codified encryption information to be not only able to play human body biological characteristics identification Security relatively high, reliability, convenience and the behavioral characteristics of password can be played and reduced or even avoided because of biology Stolen the triggered safety problem of characteristic information, simultaneously because the complexity of password can decline therefore can also mitigate identity testing The burden of card person's cipher memory is so as to be favorably improved information security and promote the further expansion of authentication application field.
Brief description of the drawings
Fig. 1 is the coding encrypting combination authentication system structure of human ear information.
Fig. 2 is the coding encrypting combination authentication system authentication flow of human ear information.
Specific embodiment
With reference to embodiment, the present invention is further illustrated.
Embodiment one:
User Zhang San sets up account and submits the profile information and oneself selected left and right ear of two ears of left and right in bank first For the sortord and coding of 0-1 and by 1,1,0,0,1,0 six identification password of spy ear formation, 1,1,0 three spy ear The alarm password of formation and 1, visits backup password that ear formed for 0,1,0,1 five time being embodied in the database of bank server. Then mobile phone is passed through after Zhang San logs in bank account when the client shopping on the web that mobile phone is installed needs to pay first Camera absorbs the human ear contour images of its six this spy ear and is converted to ciphertext by symmetric encipherment algorithm and sends to bank service Device, bank server obtains the human ear contour images of six this spy ears by decrypting ciphertext and the feature by image processing techniques is carried Take and template extraction obtains six human ear profile informations of spy ear of Zhang San, the human ear profile information that then will be obtained takes with bank Human ear profile information in business device database is compared to confirm the identity of Zhang San by search and information, then calls Zhang San advance The coding of the left and right ear set in bank server, the coding of the left and right ear for thereafter setting Zhang San and six spy ear acquisitions The identification password that human ear profile information combines determination Zhang San is 1,1,0,0,1,0 and again in the database of bank server In compare whether verify the identification password that Zhang San is input into correct by search, information, compare bank server after coincideing and lead to Cross ciphertext and notify that Zhang San enters its account and is capable of achieving network payment.
If Zhang San feels that its personal information includes that the encrypted message for setting goes wrong, it can be tested by success identity Demonstrate,prove and modify.
If two profile informations of ear of Zhang San are stolen by hacker by network wooden horse, and attempt to log in Zhang San bank account During family, because it can only provide fix information, it is impossible to provide its left and right password that ear coding builds, thus its steal can not be into Work(.When hacker logs in unsuccessfully, system can enroll and log in people's associated picture and used for solving a case below, and simultaneity factor can lead to Short message notification Zhang San is crossed to avoid risk.
If Zhang San is held as a hostage, the profile information and its shape of the left and right ear that Zhang San can be obtained by its three times spy ears Into alarm cipher alarm for example neighbouring by 110 to the police by bank account authentication system, simultaneity factor prompt system failure To protect Zhang San.
Embodiment two:
After certain prison system sets up gate control system network, the profile information for submitting two ears of left and right to of every prison guard is collected first And the sortord and coding of 0 to the 1 of oneself left and right ear, and its selected 1,1,1 identification password, 1,0,1 alarm Password is being embodied in the database of gate control system server.Usually prison guard A workings have shooting by what each firm door in prison was installed The client of head is using the ear profile information of its three times selected spy ear and the identification password of its formation by asymmetric The ciphertext that AES is obtained carries out authentication to pass in and out prison access control system, leads to if prison guard is subject to offender to threaten There is alarm to inform that other prison guards provide support, and door in password prompt of the ear profile information and its formation of crossing three spy ears Then prompt system breaks down to protect prison guard access control system.
Embodiment three:
Li Si is provided with the authentication system of camera on safety box, so as to after only successfully authentication is carried out Can opening safety case.Subsequent Li Si submits the profile information and oneself selected left-to-right of its two ear of left and right to for 0-1 sorts Mode and coding and three times visit ear formed 0,0,1 identification passwords, twice visit ear formed 1,1 alarm password and 5 times 1,0,1,0,1 backup password of ear formation is visited to be embodied in the database of safety box server.Now client and service Device is merged.Can be based on by the profile information of its human ear and its by ear is visited when opening safety case is needed behind Li Si Left and right ear encode the identification password to be formed logged in, authentication and open.
When Li Si forgets its identification password, can encode what is formed by the profile information of its human ear and its spy ear Backup password is logged in and is given for change or reset identification password.Can lead to when Li Si is by stress opening safety case The profile information for crossing human ear and its alarm password for visiting ear formation are logged in, and authentication system is contacted by with the police at that time And alarm, while point out safety box there was a mechanical failure and protect Li Si.
Example IV
User Zhang San sets up account and submits the profile information and oneself selected left and right ear of two ears of left and right in bank first For the sortord and coding of 0-1 and by 1,1,0,0,1,0 six identification password of spy ear formation, 1,1,0 three spy ear The alarm password of formation and 1, visits backup password that ear formed for 0,1,0,1 five time being embodied in the database of bank server. Then mobile phone is passed through after Zhang San logs in bank account when the client shopping on the web that mobile phone is installed needs to pay first Camera absorb its six this visit the human ear contour images of ear and by the image processing software that loads at random by image processing techniques Feature extraction and template extraction obtain its its six this visit the human ear profile information of ear, then changed by asymmetrical encryption algorithm For ciphertext is sent to bank server, bank server obtains the human ear profile information of six this spy ears by decrypting ciphertext, then Human ear profile information in the human ear profile information that will be obtained and bank server database by search for and information compare with Confirm the identity of Zhang San, then call the coding of the advance left and right ear set in bank server of Zhang San, thereafter set Zhang San The coding of fixed left and right ear and the identification password for visiting the human ear profile information combination determination Zhang San that ear is obtained for six times are 1,1, 0,0,1,0 and again in the database of bank server by search, information compare verify Zhang San be input into authentication it is close Whether code is correct, compares bank server after coincideing and notifies that Zhang San enters its account and is capable of achieving network payment by ciphertext.
Embodiment five
King five is input into submission of its household or so in safety door for dwelling installation authentication system and in system database The profile information of two ears and oneself selected left and right ear are the sortord and and selected spy ear human ear profile information coding structure of 0-1 Into identification password, alarm password.Its one family can pass in and out safety door with by authentication system below, both safety It is again convenient.

Claims (8)

1. a kind of coding encrypting method of human ear information, it is characterised in that set first people or so ear put in order and according to 0-1 is that binary system is encoded, then by human ear acquisition of information obtaining the people's helix constituted according to left and right ear sortord Binary-coded password segment based on wide information coding, repeats human ear information access process to synthesize by each human ear letter It is binary coded that breath obtains the password segment of formation and builds.
2. the coding encrypting method of a kind of human ear information according to claim 1, it is characterised in that the human ear information is obtained Take refers to stretch out selected ear and gather human ear contour images to obtain relevant people helix by ear profile information collecting device Wide information, coding information go forward side by side onestep extraction be based on coding information password segment;And it refers to one to repeat human ear acquisition of information After the completion of secondary human ear acquisition of information, the ear that an other human ear acquisition of information is selected is leant out and adopted by ear profile information Collection equipment gathers human ear contour images and goes forward side by side onestep extraction based on coding information to obtain relevant people ear profile information, coding information Password segment.
3. a kind of coding encrypting method of human ear information according to claim 1, it is characterised in that the human ear profile diagram As being obtained by picture pick-up device.
4. a kind of coding encrypting method of human ear information according to claim 1, it is characterised in that the human ear profile diagram Can be used for the human ear profile information of information comparison as being obtained by feature extraction and template extraction.
5. a kind of application process of the coding encrypting method of human ear information as claimed in claim 1, it is characterised in that described close Code is used for authentication system;The authentication system includes client and server, and client is except that can allow identity Verifier log in it is outer also possess can obtain authentication person's human ear contour images and further be carried by feature extraction and template Take and obtain the information extracting system that can enter the human ear profile information that row information is compared;Server end include application server and Database, the human ear profile information that can enter row information comparison for having authentication person in database, the sequence of left-right ear With coding information and by selected human ear profile information coding constitute password, and application server then undertake connection client with Database and carry out the function of computational service;Application server realizes that authentication person user steps on client by ciphertext communication Land, authentication;The computational service function of application server refers to people's helix that application server obtains human ear acquisition of information Human ear profile information in wide information and date storehouse is compared to primarily determine that authentication person by search, information, is then applied Server calls the left and right ear coding information of authentication person from database and further incorporates more than a human ear information and obtains The password segment based on coding information of the human ear profile information and coding information for taking extracting combines to form authentication person's input Identification password, the authentication in the identification password and database that be input into for authentication person by subsequent application server Password is compared to determine authentication person's identity by searching for into row information;When client can not carry out acquired human ear profile diagram When the feature extraction of picture and template extraction, the application server of server end undertakes the feature extraction of acquired human ear contour images And template extraction.
6. the application process of the coding encrypting method of human ear information according to claim 5, it is characterised in that authentication The authentication flow of system include authentication person by client to application server proposition authentication request after, identity Checking system starts, and application server sends acquisition checking information requirement to client identity verifier, then authentication person Human ear profile information more than a human ear acquisition of information acquisition is extracted by client-side information extraction system successively and is transferred to Application server, the human ear profile information in human ear profile information and database that application server obtains human ear acquisition of information Compared to primarily determine that authentication person's identity by search, then application server calls authentication from database The left and right ear coding information of person simultaneously further incorporates more than the human ear profile information and coding information of human ear acquisition of information and carries Take the password segment based on coding information and combine the identification password to form authentication person's input, subsequent application server will The identification password of authentication person's input is compared with true by searching for the identification password in database into row information Determine authentication person's identity, when information is compared to be confirmed to coincide, application server feedback client identity verifier's authentication Success, and then lost by application server feedback client identity verifier authentication when information compares continuous three failures Lose.
7. the application process of the coding encrypting method of human ear information according to claim 5, it is characterised in that the password After authentication person's authentication success, it is modified with application server contacts from client;The password is to same Authentication person sets multiple, including identification password, alarm password, backup password;The identification password is used for body Part checking;The alarm password is used for authentication of authentication person when being coerced by other people, and now application server can be with Terminate the authentication taken in conjunction police and seek to assist by the system failure is informed;The backup password is used to prevent authentication Person can again give for change when forgetting identification password or reset identification password.
8. the application process of the coding encrypting method of human ear information according to claim 5, it is characterised in that the identity The database of verification system server is including the profile information of left and right human ear, two it is determined that being collected in the case of authentication person's identity The sequence of individual ear and coding information and the password of authentication person's setting.
CN201310664349.0A 2013-12-09 2013-12-09 A kind of coding encrypting and application process of human ear information Expired - Fee Related CN103647769B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310664349.0A CN103647769B (en) 2013-12-09 2013-12-09 A kind of coding encrypting and application process of human ear information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310664349.0A CN103647769B (en) 2013-12-09 2013-12-09 A kind of coding encrypting and application process of human ear information

Publications (2)

Publication Number Publication Date
CN103647769A CN103647769A (en) 2014-03-19
CN103647769B true CN103647769B (en) 2017-06-23

Family

ID=50252925

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310664349.0A Expired - Fee Related CN103647769B (en) 2013-12-09 2013-12-09 A kind of coding encrypting and application process of human ear information

Country Status (1)

Country Link
CN (1) CN103647769B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105139254A (en) * 2015-08-11 2015-12-09 中山大学 Earprint recognition-based bank remote identity authentication method and system
TWI696141B (en) * 2019-04-17 2020-06-11 彰化商業銀行股份有限公司 Feature coding system and method and online banking service system and method thereof using the same

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101214150A (en) * 2007-12-27 2008-07-09 重庆大学 Method for recognizing human ear characteristic by gravitational field conversion algorithm
CN101552830A (en) * 2008-04-03 2009-10-07 乐金电子(中国)研究开发中心有限公司 Mobile terminal ID authentication method based on user ear identification and mobile terminal thereof
CN101809581A (en) * 2007-09-24 2010-08-18 苹果公司 Embedded authentication systems in an electronic device
CN102831390A (en) * 2012-07-02 2012-12-19 北京科技大学 Human ear authenticating system and method
CN103400436A (en) * 2013-08-17 2013-11-20 慈溪市科创电子科技有限公司 Access control system and control method thereof

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101635743B (en) * 2009-04-02 2014-11-26 杭州亚泽信息科技有限公司 System and method using biologic characteristic certification result to validate identity of mobile terminal holder

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101809581A (en) * 2007-09-24 2010-08-18 苹果公司 Embedded authentication systems in an electronic device
CN101214150A (en) * 2007-12-27 2008-07-09 重庆大学 Method for recognizing human ear characteristic by gravitational field conversion algorithm
CN101552830A (en) * 2008-04-03 2009-10-07 乐金电子(中国)研究开发中心有限公司 Mobile terminal ID authentication method based on user ear identification and mobile terminal thereof
CN102831390A (en) * 2012-07-02 2012-12-19 北京科技大学 Human ear authenticating system and method
CN103400436A (en) * 2013-08-17 2013-11-20 慈溪市科创电子科技有限公司 Access control system and control method thereof

Also Published As

Publication number Publication date
CN103647769A (en) 2014-03-19

Similar Documents

Publication Publication Date Title
CN103646201A (en) Verification method achieved by combining human faces with identities
Matyas et al. Toward reliable user authentication through biometrics
US20190013931A1 (en) Biometric verification of a blockchain database transaction contributor
CN103646236B (en) The coding encrypting and application process of a kind of palmprint information
CN103646202A (en) Fingerprint information coding encryption and application method
CN103646200B (en) The coding encrypting of a kind of face information and application process
US11716330B2 (en) Mobile enrollment using a known biometric
CN103699995A (en) Payment authentication method based on fingerprints and finger veins
Yusuf et al. A survey of biometric approaches of authentication
Ayoup et al. Cancellable Multi-Biometric Template Generation Based on Arnold Cat Map and Aliasing.
Wahab et al. Utilizing Keystroke Dynamics as Additional Security Measure to Protect Account Recovery Mechanism.
JP5903257B2 (en) Authentication system, registration device, and authentication device
CN103647769B (en) A kind of coding encrypting and application process of human ear information
CN111723595A (en) Personnel identity identification method and system
CN116886315A (en) Authentication method based on biological characteristics and zero knowledge proof under web3.0
Stokkenes et al. Biometric transaction authentication using smartphones
KR100701583B1 (en) Method of biomass authentication for reducing FAR
CN108959894A (en) A kind of implementation method and device, computer readable storage medium, terminal of fingerprint control booting
US20230059887A1 (en) Authentication device, authentication method, and recording medium
Gladkikh et al. Development of biometric systems for passenger identification based on noise-resistant coding means
CN113705410A (en) Face image desensitization processing and verifying method and system
Cimato et al. Biometrics and privacy
Vorobyeva et al. Benefits and issues of biometric technologies. Are biometrics worth using?
Kanagalakshmi et al. A cancellable and irrevocable approach for fingerprint template protection using optimal iterative solubility algorithm and secure point BASE
Chenni et al. Enhancing Person Identification with Score Fusion of Biometric Modalities

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170623