CN105227562B - The key business data transmission mediation device and its application method of identity-based verifying - Google Patents

The key business data transmission mediation device and its application method of identity-based verifying Download PDF

Info

Publication number
CN105227562B
CN105227562B CN201510662901.1A CN201510662901A CN105227562B CN 105227562 B CN105227562 B CN 105227562B CN 201510662901 A CN201510662901 A CN 201510662901A CN 105227562 B CN105227562 B CN 105227562B
Authority
CN
China
Prior art keywords
key
client computer
business data
shared key
biological characteristic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510662901.1A
Other languages
Chinese (zh)
Other versions
CN105227562A (en
Inventor
张瑜
吴松洋
张涛
王磐
曹伟
李勋
张勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Third Research Institute of the Ministry of Public Security
Original Assignee
Third Research Institute of the Ministry of Public Security
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Third Research Institute of the Ministry of Public Security filed Critical Third Research Institute of the Ministry of Public Security
Priority to CN201510662901.1A priority Critical patent/CN105227562B/en
Publication of CN105227562A publication Critical patent/CN105227562A/en
Application granted granted Critical
Publication of CN105227562B publication Critical patent/CN105227562B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Abstract

The present invention relates to the key business data transmission mediation devices and its application method of a kind of verifying of identity-based, equipment realizes the transmission of key business data to be inserted in client computer, main control module, to control physical characteristics collecting module, storage chip, shared key encryption memory block and the work of self-destruction shell;Physical characteristics collecting module to acquire the biological characteristic of user, and calculates biometric keys;Storage chip and shared key encrypt memory block, to store the first shared key key;The first shared key key is corresponding with the second shared key key in the certificate server;Self-destruction shell, to when the self-destruction shell is destroyed, the main control module of Xiang Suoshu sends the information that self-destruction shell is destroyed.The key business data transmission mediation device and its application method verified using identity-based of the invention, improve the safety of data, easy to use, have wide range of applications.

Description

The key business data transmission mediation device and its application method of identity-based verifying
Technical field
The present invention relates to the passes that field of communication technology more particularly to information security, in particular to a kind of identity-based are verified Key business data transmission mediation device and its application method.
Background technique
In recent years, with computer technology high speed development, a large amount of data need by USB flash disk, hard disk, mobile hard disk or its His mediation device transmits.Some are working document or significant data to these data, some are related to individual privacy.If keeping Improper or equipment is artificially lost, and is often touched by stranger, and data leak and privacy compromise are caused.Therefore, this is protected Class data generally require to carry out identification to the people of contact data, and traditional identification method is generally by way of ID+ password. But this mode is often easier to crack, and carries out Brute Force, warp to ID and password by the software of dictionary and Brute Force Success can be cracked after a period of time, so that the owner for the data that disguise oneself as obtains data.The present invention utilizes opposite at present The fingerprint identification technology of one of biological feature encryption mode of comparative maturity carries out identity to the mediation device that data are transmitted Verifying, for the fingerprint of people due to biologically, the difference repetitive rate that there is individual is extremely low, therefore the present invention is known using fingerprint Other technology progress authentication has the characteristics that easy to use, safe.
Summary of the invention
The purpose of the present invention is overcoming the above-mentioned prior art, provides a kind of raising Information Security, uses The key business data transmission mediation device and its application method of convenient identity-based verifying.
To achieve the goals above, the key business data of identity-based of the invention verifying transmits mediation device and its makes There is following constitute with method:
The identity-based verifying key business data transmit mediation device, be mainly characterized by, the equipment to It is inserted in the transmission that key business data is realized in client computer, the equipment includes:
Main control module, to control physical characteristics collecting module, storage chip, shared key encryption memory block and self-destruction The work of shell;
Physical characteristics collecting module to acquire the biological characteristic of user, and calculates biometric keys, and transmit Memory block is encrypted to shared key;
Storage chip, to store key business data;
Shared key encrypts memory block, to store the first shared key key;The first shared key key and institute The second shared key key in the certificate server stated is corresponding, to encrypt or decrypt the biological characteristic of user, and sends To the certificate server;
Self-destruction shell, to when the self-destruction shell is destroyed, the main control module of Xiang Suoshu sends self-destruction shell quilt The information of breaking-up.
Further, the physical characteristics collecting module is fingerprint capturer.
Further, the equipment further includes USB interface.
It is main special the invention further relates to a kind of method for reading key business data to mediation device from service server Point is that client computer is connected with the service server, and the service server is connected with the certificate server, The method the following steps are included:
(1) client computer described in reads key business data to the service server request;
(2) mediation device whether is inserted in client computer described in the client computer judgement described in;
(3) if being not inserted into the mediation device in the client computer, the client computer prompt user is inserted Enter mediation device, then proceedes to step (1);
(4) if inserting the mediation device in the client computer, the mediation device acquires user Biological characteristic;
(5) physical characteristics collecting module described in generates biometric keys according to the biological characteristic, and is sent to The shared key encrypts memory block;
(6) main control module described in is decrypted according to the biometric keys from the shared key encryption memory block To obtain the first shared key key, and first shared key and the biological characteristic are sent to the client Machine;
(7) client computer described in encrypts the biological characteristic according to the first shared key key, and will be after encryption Result be transmitted to the certificate server;
(8) certificate server described in passes through encrypted as a result, simultaneously described in the second shared key key decryption Whether the biological characteristic after the judgement decryption is correct;
(9) if the biological characteristic after the decryption is correct, the service server is by the key business Data are transmitted to the storage chip, then terminate and exit;
(10) if the biological characteristic after the decryption is incorrect, terminate and exit.
It is main special the invention further relates to a kind of method for reading key business data to service server from mediation device Point is that client computer is connected with the service server, and the service server is connected with the certificate server, The method the following steps are included:
(a) client computer described in requests return data to the service server;
(b) mediation device whether is inserted in client computer described in the client computer judgement described in;
If (c) being not inserted into the mediation device in the client computer, the client computer prompt user is inserted Enter mediation device, then proceedes to step (a);
If (d) inserting the mediation device in the client computer, the mediation device acquires user Biological characteristic;
(e) physical characteristics collecting module described in generates biometric keys according to the biological characteristic, and is sent to The shared key encrypts memory block;
(f) main control module described in is decrypted according to the biometric keys from the shared key encryption memory block To obtain the first shared key key, and the first shared key key and the biological characteristic be sent to described Client computer;
(g) client computer described in encrypts the biological characteristic according to the first shared key key, and will be after encryption Result be transmitted to the certificate server;
(h) certificate server described in passes through encrypted as a result, simultaneously described in the second shared key key decryption Whether the biological characteristic after the judgement decryption is correct;
If the biological characteristic (i) after the decryption is correct, the service server is by the key business Data are transmitted to the storage chip, then terminate and exit;
If the biological characteristic (j) after the decryption is incorrect, terminates and exit.
Further, further comprising the steps of between the step (h) and the step (i):
(h.1) service server judging described in returns the user of the key business data and reads the key business number According to user it is whether consistent;
(h.2) if the user for returning the key business data is consistent with the user of the key business data is read, Then continue step (i);
(h.3) if return the key business data user and read the key business data user it is different It causes, then continues step (j).
Mediation device and its application method are transmitted using the key business data of the identity-based verifying in the invention, with The prior art is compared, and has technical effect beneficial below:
(1) data safety;The preservation and reading of data are required through authentication, and be ensure that and read data and guarantor The user of deposit data is the same user, and finger print identifying is compared again safer with traditional password authentication;
(2) easy to use;Traditional password authentication mode constantly replaces password for security needs, and is easy quilt It cracks, passes through the operation of the finger print identifying person of being convenient to use.
Detailed description of the invention
Fig. 1 is the structural schematic diagram for the key business data transmission that identity-based of the invention is verified.
Fig. 2 is the structural schematic diagram of mediation device of the invention.
Fig. 3 is the step process of the invention for reading key business data from service server and being transmitted to mediation device Figure.
Fig. 4 is the step process of the invention for reading key business data from mediation device and being transmitted to service server Figure.
Specific embodiment
It is further to carry out combined with specific embodiments below in order to more clearly describe technology contents of the invention Description.
Please refer to shown in Fig. 1 to Fig. 2, the key business data transmission mediation device of identity-based verifying of the invention to It is inserted in the transmission that key business data is realized in client computer, equipment realizes key business number to be inserted in client computer According to transmission, equipment includes main control module, to control physical characteristics collecting module, storage chip, shared key encryption storage The work of area and self-destruction shell;Physical characteristics collecting module, storage chip;Equipment and server all have shared key key. In equipment end, key (is generated) encryption by the fingerprint key s of user using certain public algorithm, is then stored in depositing for equipment end In shared key encryption memory block.In use, equipment end acquires user fingerprints, fingerprint key s is calculated, then with s from altogether It enjoys in key encryption memory block and decrypts key, user fingerprints are then encrypted by key again, and be sent to certificate server, serviced After device receives, user fingerprints information is obtained using the shared key key decryption of the user, verifies user identity;Self-destruction shell is used With when the self-destruction shell is destroyed, the main control module of Xiang Suoshu sends the information that self-destruction shell is destroyed.
In a preferred embodiment, the physical characteristics collecting module is fingerprint capturer.Draw in the present invention Enter fingerprint identification technology, is encrypted using the mediation device that fingerprint identification technology transmits data, it is ensured that data are in Safety in medium, apparatus.
In a preferred embodiment, the equipment further includes USB interface.
Referring to shown in Fig. 2, the key business data of identity-based verifying of the invention transmits mediation device, including Following part:
The inside of equipment is made of a storage chip and a fingerprint capturer.Storage chip is used to store key business Data, fingerprint capturer are verified to the identity to user.Self-destruction shell has the function of Anti-dismantling, tamper-proof.In Medium, apparatus is externally the interface of a USB.
Transmission intermediary can be only inserted into dedicated client computer, and being inserted on other machines is a unrecognized equipment, only There is the client computer equipped with special driving that could identify mediation device.Fingerprint capturer of mediation device itself does not store user Finger print information, client computer will be passed to after being collected finger print information, finger print information is passed to operation system again by client computer, thus The personal finger print information of protection will not leak.
The service server of key business and the certificate server of fingerprint are attached, and are needing to transfer data to intermediary When equipment, mediation device and business operation client computer are attached first.And number is issued to service server by client computer It is requested according to transmission.Prompt client computer carries out authentication after service server receives request, and user passes through on mediation device Fingerprint capturer is read out the feature of the fingerprint of user, and passes feature back the business service phase.Certificate server by this Characteristic information is compared with the identification system in certificate server, if compared successfully i.e. by the certification of identity, if not Matching user is found, that is, thinks authentification failure.The result of certification is returned to service server, service server by certificate server Decided whether to allow user that key business data is transferred to mediation device according to authentication result.
When passing data back service server from mediation device, mediation device is first equally inserted into client computer, Prompt client carries out authentication after client computer receives request, passes on certificate server and is authenticated after acquisition finger print information, And judge returned data user and former data consumer whether the same person, key business data could be passed to after Service server.
In terms of safety guarantee, user needs to generate shared key when registering, respectively storage and certificate server and intermediary In equipment.By biometric keys generation technique, key is generated using user's fingerprint, to being stored in being total on mediation device Key is enjoyed to be encrypted.The second shared key encrypting module at certificate server end stores, but is not required to fingerprint characteristic key.Make User is protected with the communication between certificate server by shared key.
It please refers to shown in Fig. 2, the key business data transmission mediation device of identity-based verifying of the invention gives one Kind is easy to popularize, is high-efficient, highly-safe data transmit mediation device, and internal structure is as shown in Fig. 2, by a master control mould Block, a finger print acquisition module, the first shared key encryption memory block and a storage chip composition, main control module connect fingerprint Module and storage chip and control fingerprint module switch and storage chip read-write, while also be responsible for read shared key encryption Memory block executes task of shared key is decrypted by fingerprint bio key.Also, in order to avoid irrelevant people passes through disassembly Mode obtains the content in storage chip, and the shell of mediation device uses the disassembly self-destruction shell of Anti-dismantling.As long as self-destruction shell The main control device that is opened will automatically damage storage chip, to achieve the purpose that content is not revealed.
Key business data is read to the method for mediation device from service server the invention further relates to a kind of, please refers to figure Shown in 4, client computer is connected with the service server, and the service server is connected with the certificate server Connect, the method the following steps are included:
(1) client computer described in reads key business data to the service server request;
(2) mediation device whether is inserted in client computer described in the client computer judgement described in;
(3) if being not inserted into the mediation device in the client computer, the client computer prompt user is inserted Enter mediation device, then proceedes to step (1);
(4) if inserting the mediation device in the client computer, the mediation device acquires user Biological characteristic;
(5) physical characteristics collecting module described in generates biometric keys according to the biological characteristic, and is sent to The shared key encrypts memory block;
(6) main control module described in is decrypted according to the biometric keys from the shared key encryption memory block To obtain the first shared key key, and first shared key and the biological characteristic are sent to the client Machine;
(7) client computer described in encrypts the biological characteristic according to the first shared key key, and will be after encryption Result be transmitted to the certificate server;
(8) certificate server described in passes through encrypted as a result, simultaneously described in the second shared key key decryption Whether the biological characteristic after the judgement decryption is correct;
(9) if the biological characteristic after the decryption is correct, the service server is by the key business Data are transmitted to the storage chip, then terminate and exit;
(10) if the biological characteristic after the decryption is incorrect, terminate and exit.
That is, when reading crucial business data transmission to mediation device from service server, it is necessary to pass through finger Fixed client computer carries out, and the transmission intermediary of authentication is first inserted into client computer, is then sent out by client computer to service server It requests out, client's machine check data simultaneously require client computer to provide authenticating identity, and judgement transmission intermediary is after client computer is instructed It is no to be already inserted into, if being not inserted into prompt user is inserted into equipment, then restart;If be already inserted into, user is prompted to carry out Authentication, finger print information when user needs to provide registration, after transmission mediation device acquires the finger print information of user, according to The information such as Customs Assigned Number read the key storage entry of respective client in key storage area, are shared using fingerprint key decryption close Finger print information and shared key are returned to client computer after success by key.Client computer encrypts finger print information using shared key, so After transfer to certificate server to be compared, identify user identity, if identify successfully, operation system will after data encryption be stored in Medium, apparatus, if terminating process after authentication failed prompt user.
Key business data is read to the method for service server from mediation device the invention further relates to a kind of, please refers to figure Shown in 4, client computer is connected with the service server, and the service server is connected with the certificate server Connect, the method the following steps are included:
(a) client computer described in requests return data to the service server;
(b) mediation device whether is inserted in client computer described in the client computer judgement described in;
If (c) being not inserted into the mediation device in the client computer, the client computer prompt user is inserted Enter mediation device, then proceedes to step (a);
If (d) inserting the mediation device in the client computer, the mediation device acquires user Biological characteristic;
(e) physical characteristics collecting module described in generates biometric keys according to the biological characteristic, and is sent to The shared key encrypts memory block;
(f) main control module described in is decrypted according to the biometric keys from the shared key encryption memory block To obtain the first shared key key, and the first shared key key and the biological characteristic be sent to described Client computer;
(g) client computer described in encrypts the biological characteristic according to the first shared key key, and will be after encryption Result be transmitted to the certificate server;
(h) certificate server described in passes through encrypted as a result, simultaneously described in the second shared key key decryption Whether the biological characteristic after the judgement decryption is correct;
If the biological characteristic (i) after the decryption is correct, the service server is by the key business Data are transmitted to the storage chip, then terminate and exit;
If the biological characteristic (j) after the decryption is incorrect, terminates and exit.
It in a preferred embodiment, further include following step between the step (h) and the step (i) It is rapid:
(h.1) service server judging described in returns the user of the key business data and reads the key business number According to user it is whether consistent;
(h.2) if the user for returning the key business data is consistent with the user of the key business data is read, Then continue step (i);
(h.3) if return the key business data user and read the key business data user it is different It causes, then continues step (j).
After certificate server verifies identity, service server also needs to judge that the user is with the user for exporting data No is to belong to the same person, can equally prompt verifying not pass through if not the same person, only the export of data and is passed back same When belonging to a people, verifying could pass through, to ensure that the uniqueness of key business data to greatest extent.
Mediation device and its application method are transmitted using the key business data of the identity-based verifying in the invention, with The prior art is compared, and has technical effect beneficial below:
(1) data safety;The preservation and reading of data are required through authentication, and be ensure that and read data and guarantor The user of deposit data is the same user, and finger print identifying is compared again safer with traditional password authentication;
(2) easy to use;Traditional password authentication mode constantly replaces password for security needs, and is easy quilt It cracks, passes through the operation of the finger print identifying person of being convenient to use.
In this description, the present invention is described with reference to its specific embodiment.But it is clear that can still make Various modifications and alterations are without departing from the spirit and scope of the invention.Therefore, the description and the appended drawings should be considered as illustrative And not restrictive.

Claims (5)

1. a kind of key business data of identity-based verifying transmits mediation device, which is characterized in that the equipment is to insert The transmission of key business data is realized in client computer, the equipment includes:
Main control module, to control physical characteristics collecting module, storage chip, shared key encryption memory block and self-destruction shell Work;
Physical characteristics collecting module to acquire the biological characteristic of user, and calculates biometric keys, and is transmitted to altogether Enjoy key encryption memory block;
Storage chip, to store key business data;
Shared key encrypts memory block, to store the first shared key key;The first shared key key and certification takes The second shared key key being engaged in device is corresponding;
Self-destruction shell, to when the self-destruction shell is destroyed, the main control module of Xiang Suoshu sends self-destruction shell and is destroyed Information;
Wherein, service server is used for after the certificate server verifies identity, is also used to judge the key business data Reading user it is whether consistent with the passback user of the key business data;
The main control module is decrypted according to the biometric keys from the shared key encryption memory block to obtain First shared key key, and first shared key and the biological characteristic are sent to the client computer;
The client computer biological characteristic according to the described first shared key key encryption, and by encrypted result It is transmitted to the certificate server;
The certificate server passes through encrypted as a result, and judging institute described in the second shared key key decryption Whether the biological characteristic after the decryption stated is correct.
2. the key business data of identity-based verifying according to claim 1 transmits mediation device, which is characterized in that institute The physical characteristics collecting module stated is fingerprint capturer.
3. the key business data of identity-based verifying according to claim 1 transmits mediation device, which is characterized in that institute The equipment stated further includes USB interface.
4. a kind of slave service server based on equipment described in claim 1 reads key business data to the side of mediation device Method, which is characterized in that client computer is connected with the service server, the service server and the authentication service Device is connected, the method the following steps are included:
(1) client computer described in reads key business data to the service server request;
(2) mediation device whether is inserted in client computer described in the client computer judgement described in;
(3) if being not inserted into the mediation device in the client computer, in client computer prompt user's insertion Medium, apparatus then proceedes to step (1);
(4) if inserting the mediation device in the client computer, the life of the mediation device acquisition user Object feature;
(5) physical characteristics collecting module described in generates biometric keys according to the biological characteristic, and is sent to described Shared key encrypt memory block;
(6) main control module described in is decrypted according to the biometric keys from the shared key encryption memory block to obtain The first shared key key is taken, and first shared key and the biological characteristic are sent to the client computer;
(7) client computer described in the biological characteristic according to the first shared key key encryption, and by encrypted knot Fruit is transmitted to the certificate server;
(8) certificate server described in passes through encrypted as a result, and judging described in the second shared key key decryption Whether the biological characteristic after the decryption is correct;
(9) if the biological characteristic after the decryption is correct, the service server is by the key business data It is transmitted to the storage chip, then terminates and exits;
(10) if the biological characteristic after the decryption is incorrect, terminate and exit.
5. a kind of slave mediation device based on equipment described in claim 1 reads key business data to the side of service server Method, which is characterized in that client computer is connected with the service server, the service server and the authentication service Device is connected, the method the following steps are included:
(a) client computer described in requests return data to the service server;
(b) mediation device whether is inserted in client computer described in the client computer judgement described in;
If (c) being not inserted into the mediation device in the client computer, in client computer prompt user's insertion Medium, apparatus then proceedes to step (a);
If (d) inserting the mediation device in the client computer, the life of the mediation device acquisition user Object feature;
(e) physical characteristics collecting module described in generates biometric keys according to the biological characteristic, and is sent to described Shared key encrypt memory block;
(f) main control module described in is decrypted according to the biometric keys from the shared key encryption memory block to obtain The first shared key key is taken, and the first shared key key and the biological characteristic are sent to the client Machine;
(g) client computer described in the biological characteristic according to the first shared key key encryption, and by encrypted knot Fruit is transmitted to the certificate server;
(h) certificate server described in passes through encrypted as a result, and judging described in the second shared key key decryption Whether the biological characteristic after the decryption is correct;
If the biological characteristic (i) after the decryption is correct, the storage chip passes the key business data The service server is transported to, then terminates and exits;
If the biological characteristic (j) after the decryption is incorrect, terminates and exit;
It is further comprising the steps of between the step (h) and the step (i):
(h.1) service server judging described in returns the user of the key business data and reads the key business data Whether user is consistent;
(h.2) if the user for returning the key business data is consistent with the user of the key business data is read, after Continuous step (i);
(h.3) if return the key business data user and read the key business data user it is inconsistent, Continue step (j).
CN201510662901.1A 2015-10-14 2015-10-14 The key business data transmission mediation device and its application method of identity-based verifying Active CN105227562B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510662901.1A CN105227562B (en) 2015-10-14 2015-10-14 The key business data transmission mediation device and its application method of identity-based verifying

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510662901.1A CN105227562B (en) 2015-10-14 2015-10-14 The key business data transmission mediation device and its application method of identity-based verifying

Publications (2)

Publication Number Publication Date
CN105227562A CN105227562A (en) 2016-01-06
CN105227562B true CN105227562B (en) 2019-05-24

Family

ID=54996241

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510662901.1A Active CN105227562B (en) 2015-10-14 2015-10-14 The key business data transmission mediation device and its application method of identity-based verifying

Country Status (1)

Country Link
CN (1) CN105227562B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106570417A (en) * 2016-10-28 2017-04-19 郑建钦 Data security storage method
CN108694313A (en) * 2018-05-07 2018-10-23 襄阳市尚贤信息科技有限公司 A kind of computer user's identification system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6122737A (en) * 1997-11-14 2000-09-19 Digital Persona, Inc. Method for using fingerprints to distribute information over a network
CN101631020A (en) * 2008-07-16 2010-01-20 上海方立数码科技有限公司 Identity authentication system combining fingerprint identification and PKI system
CN101727561A (en) * 2009-12-04 2010-06-09 强敏 File security management system and file security management method
CN102394896A (en) * 2011-12-13 2012-03-28 甘肃农业大学 Privacy-protection fingerprint authentication method and system based on token
CN202424738U (en) * 2011-12-16 2012-09-05 四川久远新方向智能科技有限公司 Identity authentication safety management system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010132928A1 (en) * 2009-05-18 2010-11-25 Mikoh Corporation Biometric identification method
AU2013347993B2 (en) * 2012-11-21 2016-09-15 Apple Inc. Policy-based techniques for managing access control

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6122737A (en) * 1997-11-14 2000-09-19 Digital Persona, Inc. Method for using fingerprints to distribute information over a network
CN101631020A (en) * 2008-07-16 2010-01-20 上海方立数码科技有限公司 Identity authentication system combining fingerprint identification and PKI system
CN101727561A (en) * 2009-12-04 2010-06-09 强敏 File security management system and file security management method
CN102394896A (en) * 2011-12-13 2012-03-28 甘肃农业大学 Privacy-protection fingerprint authentication method and system based on token
CN202424738U (en) * 2011-12-16 2012-09-05 四川久远新方向智能科技有限公司 Identity authentication safety management system

Also Published As

Publication number Publication date
CN105227562A (en) 2016-01-06

Similar Documents

Publication Publication Date Title
JP6882254B2 (en) Safety verification methods based on biological characteristics, client terminals, and servers
CN108683509B (en) Block chain-based secure transaction method, device and system
KR100876003B1 (en) User Authentication Method Using Biological Information
KR101226651B1 (en) User authentication method based on the utilization of biometric identification techniques and related architecture
CN201181472Y (en) Hardware key device and movable memory system
KR101284481B1 (en) Authentication method and device using OTP including biometric data
US20140093144A1 (en) More-Secure Hardware Token
US20070237366A1 (en) Secure biometric processing system and method of use
WO2017044554A1 (en) Biometric verification of a blockchain database transaction contributor
US9280650B2 (en) Authenticate a fingerprint image
CN101420301A (en) Human face recognizing identity authentication system
CN1921395B (en) Method for improving security of network software
WO2006067739A2 (en) Method and device for key generation and proving authenticity
CN103067390A (en) User registration authentication method and system based on facial features
CN103888429B (en) Virtual machine starts method, relevant device and system
CN105207776A (en) Fingerprint authentication method and system
WO2014141263A1 (en) Asymmetric otp authentication system
CN106789024A (en) A kind of remote de-locking method, device and system
TWI476629B (en) Data security and security systems and methods
CN112039665A (en) Key management method and device
CN105227562B (en) The key business data transmission mediation device and its application method of identity-based verifying
CN113761488A (en) Content network copyright tracing encryption system and encryption method
KR20040082674A (en) System and Method for Authenticating a Living Body Doubly
CN109961542A (en) A kind of entrance guard device, verifying device, verifying system and its verification method
CN101883357A (en) Method, device and system for mutual authentication between terminal and intelligent card

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant