CN103647769B - A kind of coding encrypting and application process of human ear information - Google Patents
A kind of coding encrypting and application process of human ear information Download PDFInfo
- Publication number
- CN103647769B CN103647769B CN201310664349.0A CN201310664349A CN103647769B CN 103647769 B CN103647769 B CN 103647769B CN 201310664349 A CN201310664349 A CN 201310664349A CN 103647769 B CN103647769 B CN 103647769B
- Authority
- CN
- China
- Prior art keywords
- information
- human ear
- password
- ear
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 29
- 229910002056 binary alloy Inorganic materials 0.000 claims abstract description 6
- 238000000605 extraction Methods 0.000 claims description 28
- 230000015572 biosynthetic process Effects 0.000 claims description 10
- 238000004891 communication Methods 0.000 claims description 3
- 238000012795 verification Methods 0.000 claims description 3
- 238000010586 diagram Methods 0.000 claims 3
- 238000005516 engineering process Methods 0.000 abstract description 15
- 230000003542 behavioural effect Effects 0.000 abstract description 4
- 230000007423 decrease Effects 0.000 abstract description 2
- 230000001960 triggered effect Effects 0.000 abstract description 2
- 238000010200 validation analysis Methods 0.000 abstract description 2
- 210000005069 ears Anatomy 0.000 description 9
- 238000011161 development Methods 0.000 description 7
- 238000012545 processing Methods 0.000 description 3
- 230000007547 defect Effects 0.000 description 2
- 230000001815 facial effect Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 210000001525 retina Anatomy 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 239000002537 cosmetic Substances 0.000 description 1
- 238000012850 discrimination method Methods 0.000 description 1
- 238000012407 engineering method Methods 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 230000008921 facial expression Effects 0.000 description 1
- 230000005021 gait Effects 0.000 description 1
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 1
- 210000003128 head Anatomy 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000002688 persistence Effects 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 201000009032 substance abuse Diseases 0.000 description 1
- 230000003245 working effect Effects 0.000 description 1
Landscapes
- Collating Specific Patterns (AREA)
Abstract
The coding encrypting and application process of a kind of human ear information are related to information safety system, by by human ear or so profile information it is determined that being encoded according to binary system in the case of order, then constructed based on binary password with the different coding using left and right ear by more than spy ear once, so as to the password for building the fixed biological information of human ear profile and people or so ear contour encoding combines the security relative high for being not only able to performance human body biological characteristics identification, reliability, convenience and the behavioral characteristics of password can be played and avoided because of stolen the triggered safety problem of biological information, simultaneously because the complexity of password can decline therefore can also mitigate the burden of authentication person's cipher memory so as to be favorably improved information security and promote the further genralrlization application of identity validation technology.
Description
Technical field
The present invention relates to the coding encrypting mode and its application process of a kind of human ear information, particularly the ear of people or so two is led to
Cross binary mode to be encoded to build password, carried so as to realize biological characteristic and the combination of variable cipher that human ear fixes
The security that height is recognized or verified based on biometric identity.
Background technology
Progress into 21st century science and technology causes class society quick stepped into information epoch, the information technology of high speed development
The information interchange of people is allowed to become more convenient, fast, operating efficiency obtains huge lifting, and reinvents us in all its bearings
Society.However, the development band stolen, falsely use or distort also to our societies of thing followed information security issue such as information
Stern challenge is carried out.Estimate according to Federal Trade Commission, in recent years, about 10,000,000 American individual every year
Information is stolen or abuses, and 5,000,000,000 dollars of loss is caused to consumer, and the loss of annual commercial undertaking is then up to 48,000,000,000 U.S.s
Unit.It is the important channel for ensuring information safety to carry out personal verification, how personal identification is rapidly and accurately identified, with true
Protect information security and safeguard civil order, it has also become modern society's important topic urgently to be resolved hurrily.
Traditional authentication identifying method mainly has two kinds:Knowledge based engineering method and the method based on keepsake.Knowledge based
Method determine personal identification by checking " what you know ", i.e., person to be verified uses grasped knowledge such as password, individual
People's identification code (PIN) or password etc. prove the identity of oneself.Method based on keepsake then by check " what you possess " come
Determine personal identification, i.e., person to be verified proves the identity of oneself using the keepsake held such as certificate, seal or key etc..It is aobvious
So, above two method has obvious defect, and " knowledge " exists easily to forget or obscure, be stolen by others or crack etc. and asks
Topic, " keepsake " then there are problems that it is inconvenient to carry, can lose or be stolen, easily.Therefore, traditional identity discrimination method
Defect causes its development for being increasingly not suitable with science and technology and the progress of society, is that this people has turned to sight with not reproducible
The biological identification technology of feature human body biological characteristics.So-called bio-identification, i.e., determine personal identification according to characteristics of human body.With biography
" knowledge " that system technology is used is compared with " keepsake ", and the characteristics of human body that biological identification technology is used has and is not afraid of forgetting, no
Can lose, be difficult to forge, it is irreplaceable, be not required to the outstanding advantages such as extra carrying.Therefore, bio-identification is not only safe and reliable, and
And it is easy to operate, with significant superiority.
The feature that human body is used for bio-identification can be divided into two classes:Physiological characteristic and behavioural characteristic.Physiological characteristic mainly has:
Fingerprint, palm shape, iris, retina, face, facial thermal imagery etc.;Behavioural characteristic mainly has:Signature, voice, gait, keystroke etc..Grind
Study carefully and experiment shows, the features described above of human body all meets generality, uniqueness, stability and collection property etc. to varying degrees
Four requirements of fundamental property.Based on these features, people have developed various biological identification technologies, wherein application is relatively wide or studies
Deeper has:Fingerprint recognition, the identification of palm shape, iris recognition, retina identification, recognition of face, facial thermal imagery identification, human ear are known
Not, signature recognition, speech recognition etc..
Ear recognition is a kind of emerging biometrics identification technology recent years, and human ear possesses abundant physical arrangement,
With generality, uniqueness and persistence.Compare with recognition of face, age, facial expression, cosmetics and Hu are not received in ear recognition
The influence of palpus, while also with IMAQ conveniently, advantage susceptible to user acceptance, the solid colour of human ear, picture size is small,
Data processing amount is also smaller.Therefore its application in authentication system is just paid high attention to by people.
But biological characteristic is fixed in actual application be stolen the safety problem of initiation and limit living things feature recognition
The large-scale promotion application of technology.For example on the one hand on the internet by trojan horse usurp other people including ID card No.,
Fingerprint, face information and the report committed a crime happens occasionally, or even there occurs prison inmates after prison guard is murdered with the fingerprint of prison guard
The felony opened prison gate and sneak away.These problems generation cause people to biometrics identification technology can
Query is proposed by property and security.There is problem during biometrics identification technology can effectively be overcome in therefore urgent need development now
New method, system advantageously promoting the development of social economy and the raising of living standards of the people.
Therefore, the application propose first in the world by people difference ear profile encoded by binary system it is close to build
Code, improved so as to realize the combination of biological characteristic and variable cipher that human ear profile is fixed based on biometric identity identification or
The security of person's checking, contributes to the further development for information security and social civilization.
The content of the invention
Technical problem:Encoded by binary system it is an object of the invention to provide a kind of profile information by people's difference ear
To build password, so as to realize that the biological characteristic that human ear profile is fixed exists with the combination of variable cipher to play biological information
Convenience in authentication, it is effective the advantages of and coding encrypting dynamic advantage, with ensure authentication conveniently, safely with can
Lean on.
Technical scheme:The present invention is in the world first encoded with structure the profile information of people's difference ear by binary system
Password is built, fixed human ear profile biological characteristic is believed so as to realize the combination of biological characteristic and variable cipher that human ear is fixed
Ceasing the password built from variable different ear profile informations coding and combining is used for authentication, so as to play biological information knowledge
Not with the advantage of password identification, to advance the further development and application of identity validation technology.
The coding encrypting method of human ear information of the invention, set first people or so ear put in order and according to 0-1 i.e.
Binary system is encoded, then visit ear by obtain human ear profile information coding based on password segment, repeat visit ear process with
Synthesize built by each password segment that is formed of spy ear binary coded.
It is described spy ear refer to stretch out selected ear and by ear profile information collecting device collection human ear contour images with
Obtain relevant people ear profile information, coding information onestep extraction of going forward side by side and be based on the password segment of coding information;And repeatedly visiting ear is
Refer to after the completion of once ear is visited, the selected ear of ear will be once visited in addition and is leant out and is gathered by ear profile information collecting device
Human ear contour images with obtain relevant people ear profile information, coding information go forward side by side onestep extraction be based on coding information cipher chips
It is disconnected.
The human ear contour images are obtained by picture pick-up device.
The human ear contour images obtain the people's helix that can be used for information comparison by feature extraction and template extraction
Wide information;
The application process of human ear information of the invention is:The password is used for authentication system;The authentication system
System includes client and server, and client also possesses in addition to authentication person can be allowed to log in can obtain authentication
Person's human ear contour images and further obtained by feature extraction and template extraction and can enter the human ear profile of row information comparison
The information extracting system of information;Server end includes application server and database, has the energy of authentication person in database
Enough enter the human ear profile information of row information comparison, the sequence of left-right ear and coding information and compiled by selected human ear profile information
The password that code is constituted, and application server then undertakes connection client with database and carries out the function of computational service;Using clothes
Business device and client by ciphertext communication realize authentication person user log in, authentication;The computational service of application server
Function refers to that the human ear profile information that application server will be visited in human ear profile information and database that ear is obtained passes through search, letter
Breath is compared to primarily determine that authentication person, and then application server calls the left and right ear of authentication person to encode from database
Information simultaneously further incorporates more than human ear profile information and coding information cipher chips of the extraction based on coding information for once visiting ear
Authentication person's input identification password that disconnected combination is formed, subsequent application server tests the identity that authentication person is input into
Card password is compared to determine authentication person's identity by searching for the identification password in database into row information;Work as client
When end can not carry out feature extraction and the template extraction of acquired human ear contour images, the application server of server end undertakes institute
Obtain feature extraction and the template extraction of human ear contour images.
The authentication flow of authentication system includes that authentication person proposes body by client to application server
After part checking request, authentication system starts, and application server sends acquisition checking information to client identity verifier will
Ask, then authentication person is extracted more than the human ear profile information for once visiting ear acquisition successively by client-side information extraction system
And application server is transferred to, application server will visit the human ear profile information in the human ear profile information and database that ear is obtained
Compared to primarily determine that authentication person's identity by search, then application server calls authentication from database
The left and right ear coding information of person simultaneously further incorporates more than human ear profile information and the coding information extraction for once visiting ear based on volume
The password segment of code information combines the authentication person to be formed input identification password, and subsequent application server is by authentication
The identification password of person's input is compared to determine that identity is tested by searching for the identification password in database into row information
Card person's identity, when information is compared to be confirmed to coincide, application server feedback client identity verifier authentication success, and work as
Information is then failed when comparing continuous three failures by application server feedback client identity verifier authentication.
The password is modified from client after authentication person's authentication success with application server contacts;
The password can set multiple, including identification password, alarm password, backup password to same authentication person;Institute
Identification password is stated for authentication;The identity that the alarm password is used for when authentication person is coerced by other people is tested
Demonstrate,prove, now application server can terminate the authentication taken in conjunction police and seek to assist by the system failure is informed;It is described standby
Part password is close for can again be given for change when preventing authentication person from forgetting identification password or reset authentication
Code.
The database of the authentication system server is including left and right it is determined that being collected in the case of authentication person's identity
The profile information of human ear, the sequence of two ears and coding information and the password of authentication person's setting.
Information that the authentication system is carried out compare refer to by the human ear contour images of collection carry out feature extraction and
Information verification is carried out with discriminative information comparison result by search with human ear profile information in database after template extraction, is verified just
Step determines the left and right human ear coding information for calling it to set after authentication person, and combines the people of the multiple spy ear of authentication person
Ear profile information and coding information are extracted the password segment based on coding information and are combined, and authentication person's input identity of formation is tested
Card password simultaneously with the identification password of authentication person in database passes through search comparison with discriminative information comparison result again.
The client of the authentication system applied passes through ciphertext communication with application server;Described ciphertext is by adding
Close algorithm realizes that AES includes symmetry algorithm and asymmetric arithmetic;
The client and server may be incorporated in together.
Beneficial effect:The ID cards and cryptographic technique of traditional identity checking and existing human body biological characteristics identification technology are in body
The aspect such as safe and accurate, convenient, fast and cheap that part checking is required also there are problems that a lot, be this application by people's helix
Wide fixed biological information is combined with human ear profile codified encryption information to be not only able to play human body biological characteristics identification
Security relatively high, reliability, convenience and the behavioral characteristics of password can be played and reduced or even avoided because of biology
Stolen the triggered safety problem of characteristic information, simultaneously because the complexity of password can decline therefore can also mitigate identity testing
The burden of card person's cipher memory is so as to be favorably improved information security and promote the further expansion of authentication application field.
Brief description of the drawings
Fig. 1 is the coding encrypting combination authentication system structure of human ear information.
Fig. 2 is the coding encrypting combination authentication system authentication flow of human ear information.
Specific embodiment
With reference to embodiment, the present invention is further illustrated.
Embodiment one:
User Zhang San sets up account and submits the profile information and oneself selected left and right ear of two ears of left and right in bank first
For the sortord and coding of 0-1 and by 1,1,0,0,1,0 six identification password of spy ear formation, 1,1,0 three spy ear
The alarm password of formation and 1, visits backup password that ear formed for 0,1,0,1 five time being embodied in the database of bank server.
Then mobile phone is passed through after Zhang San logs in bank account when the client shopping on the web that mobile phone is installed needs to pay first
Camera absorbs the human ear contour images of its six this spy ear and is converted to ciphertext by symmetric encipherment algorithm and sends to bank service
Device, bank server obtains the human ear contour images of six this spy ears by decrypting ciphertext and the feature by image processing techniques is carried
Take and template extraction obtains six human ear profile informations of spy ear of Zhang San, the human ear profile information that then will be obtained takes with bank
Human ear profile information in business device database is compared to confirm the identity of Zhang San by search and information, then calls Zhang San advance
The coding of the left and right ear set in bank server, the coding of the left and right ear for thereafter setting Zhang San and six spy ear acquisitions
The identification password that human ear profile information combines determination Zhang San is 1,1,0,0,1,0 and again in the database of bank server
In compare whether verify the identification password that Zhang San is input into correct by search, information, compare bank server after coincideing and lead to
Cross ciphertext and notify that Zhang San enters its account and is capable of achieving network payment.
If Zhang San feels that its personal information includes that the encrypted message for setting goes wrong, it can be tested by success identity
Demonstrate,prove and modify.
If two profile informations of ear of Zhang San are stolen by hacker by network wooden horse, and attempt to log in Zhang San bank account
During family, because it can only provide fix information, it is impossible to provide its left and right password that ear coding builds, thus its steal can not be into
Work(.When hacker logs in unsuccessfully, system can enroll and log in people's associated picture and used for solving a case below, and simultaneity factor can lead to
Short message notification Zhang San is crossed to avoid risk.
If Zhang San is held as a hostage, the profile information and its shape of the left and right ear that Zhang San can be obtained by its three times spy ears
Into alarm cipher alarm for example neighbouring by 110 to the police by bank account authentication system, simultaneity factor prompt system failure
To protect Zhang San.
Embodiment two:
After certain prison system sets up gate control system network, the profile information for submitting two ears of left and right to of every prison guard is collected first
And the sortord and coding of 0 to the 1 of oneself left and right ear, and its selected 1,1,1 identification password, 1,0,1 alarm
Password is being embodied in the database of gate control system server.Usually prison guard A workings have shooting by what each firm door in prison was installed
The client of head is using the ear profile information of its three times selected spy ear and the identification password of its formation by asymmetric
The ciphertext that AES is obtained carries out authentication to pass in and out prison access control system, leads to if prison guard is subject to offender to threaten
There is alarm to inform that other prison guards provide support, and door in password prompt of the ear profile information and its formation of crossing three spy ears
Then prompt system breaks down to protect prison guard access control system.
Embodiment three:
Li Si is provided with the authentication system of camera on safety box, so as to after only successfully authentication is carried out
Can opening safety case.Subsequent Li Si submits the profile information and oneself selected left-to-right of its two ear of left and right to for 0-1 sorts
Mode and coding and three times visit ear formed 0,0,1 identification passwords, twice visit ear formed 1,1 alarm password and 5 times
1,0,1,0,1 backup password of ear formation is visited to be embodied in the database of safety box server.Now client and service
Device is merged.Can be based on by the profile information of its human ear and its by ear is visited when opening safety case is needed behind Li Si
Left and right ear encode the identification password to be formed logged in, authentication and open.
When Li Si forgets its identification password, can encode what is formed by the profile information of its human ear and its spy ear
Backup password is logged in and is given for change or reset identification password.Can lead to when Li Si is by stress opening safety case
The profile information for crossing human ear and its alarm password for visiting ear formation are logged in, and authentication system is contacted by with the police at that time
And alarm, while point out safety box there was a mechanical failure and protect Li Si.
Example IV
User Zhang San sets up account and submits the profile information and oneself selected left and right ear of two ears of left and right in bank first
For the sortord and coding of 0-1 and by 1,1,0,0,1,0 six identification password of spy ear formation, 1,1,0 three spy ear
The alarm password of formation and 1, visits backup password that ear formed for 0,1,0,1 five time being embodied in the database of bank server.
Then mobile phone is passed through after Zhang San logs in bank account when the client shopping on the web that mobile phone is installed needs to pay first
Camera absorb its six this visit the human ear contour images of ear and by the image processing software that loads at random by image processing techniques
Feature extraction and template extraction obtain its its six this visit the human ear profile information of ear, then changed by asymmetrical encryption algorithm
For ciphertext is sent to bank server, bank server obtains the human ear profile information of six this spy ears by decrypting ciphertext, then
Human ear profile information in the human ear profile information that will be obtained and bank server database by search for and information compare with
Confirm the identity of Zhang San, then call the coding of the advance left and right ear set in bank server of Zhang San, thereafter set Zhang San
The coding of fixed left and right ear and the identification password for visiting the human ear profile information combination determination Zhang San that ear is obtained for six times are 1,1,
0,0,1,0 and again in the database of bank server by search, information compare verify Zhang San be input into authentication it is close
Whether code is correct, compares bank server after coincideing and notifies that Zhang San enters its account and is capable of achieving network payment by ciphertext.
Embodiment five
King five is input into submission of its household or so in safety door for dwelling installation authentication system and in system database
The profile information of two ears and oneself selected left and right ear are the sortord and and selected spy ear human ear profile information coding structure of 0-1
Into identification password, alarm password.Its one family can pass in and out safety door with by authentication system below, both safety
It is again convenient.
Claims (8)
1. a kind of coding encrypting method of human ear information, it is characterised in that set first people or so ear put in order and according to
0-1 is that binary system is encoded, then by human ear acquisition of information obtaining the people's helix constituted according to left and right ear sortord
Binary-coded password segment based on wide information coding, repeats human ear information access process to synthesize by each human ear letter
It is binary coded that breath obtains the password segment of formation and builds.
2. the coding encrypting method of a kind of human ear information according to claim 1, it is characterised in that the human ear information is obtained
Take refers to stretch out selected ear and gather human ear contour images to obtain relevant people helix by ear profile information collecting device
Wide information, coding information go forward side by side onestep extraction be based on coding information password segment;And it refers to one to repeat human ear acquisition of information
After the completion of secondary human ear acquisition of information, the ear that an other human ear acquisition of information is selected is leant out and adopted by ear profile information
Collection equipment gathers human ear contour images and goes forward side by side onestep extraction based on coding information to obtain relevant people ear profile information, coding information
Password segment.
3. a kind of coding encrypting method of human ear information according to claim 1, it is characterised in that the human ear profile diagram
As being obtained by picture pick-up device.
4. a kind of coding encrypting method of human ear information according to claim 1, it is characterised in that the human ear profile diagram
Can be used for the human ear profile information of information comparison as being obtained by feature extraction and template extraction.
5. a kind of application process of the coding encrypting method of human ear information as claimed in claim 1, it is characterised in that described close
Code is used for authentication system;The authentication system includes client and server, and client is except that can allow identity
Verifier log in it is outer also possess can obtain authentication person's human ear contour images and further be carried by feature extraction and template
Take and obtain the information extracting system that can enter the human ear profile information that row information is compared;Server end include application server and
Database, the human ear profile information that can enter row information comparison for having authentication person in database, the sequence of left-right ear
With coding information and by selected human ear profile information coding constitute password, and application server then undertake connection client with
Database and carry out the function of computational service;Application server realizes that authentication person user steps on client by ciphertext communication
Land, authentication;The computational service function of application server refers to people's helix that application server obtains human ear acquisition of information
Human ear profile information in wide information and date storehouse is compared to primarily determine that authentication person by search, information, is then applied
Server calls the left and right ear coding information of authentication person from database and further incorporates more than a human ear information and obtains
The password segment based on coding information of the human ear profile information and coding information for taking extracting combines to form authentication person's input
Identification password, the authentication in the identification password and database that be input into for authentication person by subsequent application server
Password is compared to determine authentication person's identity by searching for into row information;When client can not carry out acquired human ear profile diagram
When the feature extraction of picture and template extraction, the application server of server end undertakes the feature extraction of acquired human ear contour images
And template extraction.
6. the application process of the coding encrypting method of human ear information according to claim 5, it is characterised in that authentication
The authentication flow of system include authentication person by client to application server proposition authentication request after, identity
Checking system starts, and application server sends acquisition checking information requirement to client identity verifier, then authentication person
Human ear profile information more than a human ear acquisition of information acquisition is extracted by client-side information extraction system successively and is transferred to
Application server, the human ear profile information in human ear profile information and database that application server obtains human ear acquisition of information
Compared to primarily determine that authentication person's identity by search, then application server calls authentication from database
The left and right ear coding information of person simultaneously further incorporates more than the human ear profile information and coding information of human ear acquisition of information and carries
Take the password segment based on coding information and combine the identification password to form authentication person's input, subsequent application server will
The identification password of authentication person's input is compared with true by searching for the identification password in database into row information
Determine authentication person's identity, when information is compared to be confirmed to coincide, application server feedback client identity verifier's authentication
Success, and then lost by application server feedback client identity verifier authentication when information compares continuous three failures
Lose.
7. the application process of the coding encrypting method of human ear information according to claim 5, it is characterised in that the password
After authentication person's authentication success, it is modified with application server contacts from client;The password is to same
Authentication person sets multiple, including identification password, alarm password, backup password;The identification password is used for body
Part checking;The alarm password is used for authentication of authentication person when being coerced by other people, and now application server can be with
Terminate the authentication taken in conjunction police and seek to assist by the system failure is informed;The backup password is used to prevent authentication
Person can again give for change when forgetting identification password or reset identification password.
8. the application process of the coding encrypting method of human ear information according to claim 5, it is characterised in that the identity
The database of verification system server is including the profile information of left and right human ear, two it is determined that being collected in the case of authentication person's identity
The sequence of individual ear and coding information and the password of authentication person's setting.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310664349.0A CN103647769B (en) | 2013-12-09 | 2013-12-09 | A kind of coding encrypting and application process of human ear information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310664349.0A CN103647769B (en) | 2013-12-09 | 2013-12-09 | A kind of coding encrypting and application process of human ear information |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103647769A CN103647769A (en) | 2014-03-19 |
CN103647769B true CN103647769B (en) | 2017-06-23 |
Family
ID=50252925
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310664349.0A Expired - Fee Related CN103647769B (en) | 2013-12-09 | 2013-12-09 | A kind of coding encrypting and application process of human ear information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103647769B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105139254A (en) * | 2015-08-11 | 2015-12-09 | 中山大学 | Earprint recognition-based bank remote identity authentication method and system |
TWI696141B (en) * | 2019-04-17 | 2020-06-11 | 彰化商業銀行股份有限公司 | Feature coding system and method and online banking service system and method thereof using the same |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101214150A (en) * | 2007-12-27 | 2008-07-09 | 重庆大学 | Method for recognizing human ear characteristic by gravitational field conversion algorithm |
CN101552830A (en) * | 2008-04-03 | 2009-10-07 | 乐金电子(中国)研究开发中心有限公司 | Mobile terminal ID authentication method based on user ear identification and mobile terminal thereof |
CN101809581A (en) * | 2007-09-24 | 2010-08-18 | 苹果公司 | Embedded authentication systems in an electronic device |
CN102831390A (en) * | 2012-07-02 | 2012-12-19 | 北京科技大学 | Human ear authenticating system and method |
CN103400436A (en) * | 2013-08-17 | 2013-11-20 | 慈溪市科创电子科技有限公司 | Access control system and control method thereof |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101635743B (en) * | 2009-04-02 | 2014-11-26 | 杭州亚泽信息科技有限公司 | System and method using biologic characteristic certification result to validate identity of mobile terminal holder |
-
2013
- 2013-12-09 CN CN201310664349.0A patent/CN103647769B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101809581A (en) * | 2007-09-24 | 2010-08-18 | 苹果公司 | Embedded authentication systems in an electronic device |
CN101214150A (en) * | 2007-12-27 | 2008-07-09 | 重庆大学 | Method for recognizing human ear characteristic by gravitational field conversion algorithm |
CN101552830A (en) * | 2008-04-03 | 2009-10-07 | 乐金电子(中国)研究开发中心有限公司 | Mobile terminal ID authentication method based on user ear identification and mobile terminal thereof |
CN102831390A (en) * | 2012-07-02 | 2012-12-19 | 北京科技大学 | Human ear authenticating system and method |
CN103400436A (en) * | 2013-08-17 | 2013-11-20 | 慈溪市科创电子科技有限公司 | Access control system and control method thereof |
Also Published As
Publication number | Publication date |
---|---|
CN103647769A (en) | 2014-03-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103646201A (en) | Verification method achieved by combining human faces with identities | |
Matyas et al. | Toward reliable user authentication through biometrics | |
US20190013931A1 (en) | Biometric verification of a blockchain database transaction contributor | |
CN103646236B (en) | The coding encrypting and application process of a kind of palmprint information | |
CN103646202A (en) | Fingerprint information coding encryption and application method | |
CN103646200B (en) | The coding encrypting of a kind of face information and application process | |
US11716330B2 (en) | Mobile enrollment using a known biometric | |
CN103699995A (en) | Payment authentication method based on fingerprints and finger veins | |
Yusuf et al. | A survey of biometric approaches of authentication | |
Ayoup et al. | Cancellable Multi-Biometric Template Generation Based on Arnold Cat Map and Aliasing. | |
Wahab et al. | Utilizing Keystroke Dynamics as Additional Security Measure to Protect Account Recovery Mechanism. | |
JP5903257B2 (en) | Authentication system, registration device, and authentication device | |
CN103647769B (en) | A kind of coding encrypting and application process of human ear information | |
CN111723595A (en) | Personnel identity identification method and system | |
CN116886315A (en) | Authentication method based on biological characteristics and zero knowledge proof under web3.0 | |
Stokkenes et al. | Biometric transaction authentication using smartphones | |
KR100701583B1 (en) | Method of biomass authentication for reducing FAR | |
CN108959894A (en) | A kind of implementation method and device, computer readable storage medium, terminal of fingerprint control booting | |
US20230059887A1 (en) | Authentication device, authentication method, and recording medium | |
Gladkikh et al. | Development of biometric systems for passenger identification based on noise-resistant coding means | |
CN113705410A (en) | Face image desensitization processing and verifying method and system | |
Cimato et al. | Biometrics and privacy | |
Vorobyeva et al. | Benefits and issues of biometric technologies. Are biometrics worth using? | |
Kanagalakshmi et al. | A cancellable and irrevocable approach for fingerprint template protection using optimal iterative solubility algorithm and secure point BASE | |
Chenni et al. | Enhancing Person Identification with Score Fusion of Biometric Modalities |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20170623 |