CN105227562B - The key business data transmission mediation device and its application method of identity-based verifying - Google Patents
The key business data transmission mediation device and its application method of identity-based verifying Download PDFInfo
- Publication number
- CN105227562B CN105227562B CN201510662901.1A CN201510662901A CN105227562B CN 105227562 B CN105227562 B CN 105227562B CN 201510662901 A CN201510662901 A CN 201510662901A CN 105227562 B CN105227562 B CN 105227562B
- Authority
- CN
- China
- Prior art keywords
- key
- client computer
- business data
- shared key
- biological characteristic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
Abstract
The present invention relates to the key business data transmission mediation devices and its application method of a kind of verifying of identity-based, equipment realizes the transmission of key business data to be inserted in client computer, main control module, to control physical characteristics collecting module, storage chip, shared key encryption memory block and the work of self-destruction shell;Physical characteristics collecting module to acquire the biological characteristic of user, and calculates biometric keys;Storage chip and shared key encrypt memory block, to store the first shared key key;The first shared key key is corresponding with the second shared key key in the certificate server;Self-destruction shell, to when the self-destruction shell is destroyed, the main control module of Xiang Suoshu sends the information that self-destruction shell is destroyed.The key business data transmission mediation device and its application method verified using identity-based of the invention, improve the safety of data, easy to use, have wide range of applications.
Description
Technical field
The present invention relates to the passes that field of communication technology more particularly to information security, in particular to a kind of identity-based are verified
Key business data transmission mediation device and its application method.
Background technique
In recent years, with computer technology high speed development, a large amount of data need by USB flash disk, hard disk, mobile hard disk or its
His mediation device transmits.Some are working document or significant data to these data, some are related to individual privacy.If keeping
Improper or equipment is artificially lost, and is often touched by stranger, and data leak and privacy compromise are caused.Therefore, this is protected
Class data generally require to carry out identification to the people of contact data, and traditional identification method is generally by way of ID+ password.
But this mode is often easier to crack, and carries out Brute Force, warp to ID and password by the software of dictionary and Brute Force
Success can be cracked after a period of time, so that the owner for the data that disguise oneself as obtains data.The present invention utilizes opposite at present
The fingerprint identification technology of one of biological feature encryption mode of comparative maturity carries out identity to the mediation device that data are transmitted
Verifying, for the fingerprint of people due to biologically, the difference repetitive rate that there is individual is extremely low, therefore the present invention is known using fingerprint
Other technology progress authentication has the characteristics that easy to use, safe.
Summary of the invention
The purpose of the present invention is overcoming the above-mentioned prior art, provides a kind of raising Information Security, uses
The key business data transmission mediation device and its application method of convenient identity-based verifying.
To achieve the goals above, the key business data of identity-based of the invention verifying transmits mediation device and its makes
There is following constitute with method:
The identity-based verifying key business data transmit mediation device, be mainly characterized by, the equipment to
It is inserted in the transmission that key business data is realized in client computer, the equipment includes:
Main control module, to control physical characteristics collecting module, storage chip, shared key encryption memory block and self-destruction
The work of shell;
Physical characteristics collecting module to acquire the biological characteristic of user, and calculates biometric keys, and transmit
Memory block is encrypted to shared key;
Storage chip, to store key business data;
Shared key encrypts memory block, to store the first shared key key;The first shared key key and institute
The second shared key key in the certificate server stated is corresponding, to encrypt or decrypt the biological characteristic of user, and sends
To the certificate server;
Self-destruction shell, to when the self-destruction shell is destroyed, the main control module of Xiang Suoshu sends self-destruction shell quilt
The information of breaking-up.
Further, the physical characteristics collecting module is fingerprint capturer.
Further, the equipment further includes USB interface.
It is main special the invention further relates to a kind of method for reading key business data to mediation device from service server
Point is that client computer is connected with the service server, and the service server is connected with the certificate server,
The method the following steps are included:
(1) client computer described in reads key business data to the service server request;
(2) mediation device whether is inserted in client computer described in the client computer judgement described in;
(3) if being not inserted into the mediation device in the client computer, the client computer prompt user is inserted
Enter mediation device, then proceedes to step (1);
(4) if inserting the mediation device in the client computer, the mediation device acquires user
Biological characteristic;
(5) physical characteristics collecting module described in generates biometric keys according to the biological characteristic, and is sent to
The shared key encrypts memory block;
(6) main control module described in is decrypted according to the biometric keys from the shared key encryption memory block
To obtain the first shared key key, and first shared key and the biological characteristic are sent to the client
Machine;
(7) client computer described in encrypts the biological characteristic according to the first shared key key, and will be after encryption
Result be transmitted to the certificate server;
(8) certificate server described in passes through encrypted as a result, simultaneously described in the second shared key key decryption
Whether the biological characteristic after the judgement decryption is correct;
(9) if the biological characteristic after the decryption is correct, the service server is by the key business
Data are transmitted to the storage chip, then terminate and exit;
(10) if the biological characteristic after the decryption is incorrect, terminate and exit.
It is main special the invention further relates to a kind of method for reading key business data to service server from mediation device
Point is that client computer is connected with the service server, and the service server is connected with the certificate server,
The method the following steps are included:
(a) client computer described in requests return data to the service server;
(b) mediation device whether is inserted in client computer described in the client computer judgement described in;
If (c) being not inserted into the mediation device in the client computer, the client computer prompt user is inserted
Enter mediation device, then proceedes to step (a);
If (d) inserting the mediation device in the client computer, the mediation device acquires user
Biological characteristic;
(e) physical characteristics collecting module described in generates biometric keys according to the biological characteristic, and is sent to
The shared key encrypts memory block;
(f) main control module described in is decrypted according to the biometric keys from the shared key encryption memory block
To obtain the first shared key key, and the first shared key key and the biological characteristic be sent to described
Client computer;
(g) client computer described in encrypts the biological characteristic according to the first shared key key, and will be after encryption
Result be transmitted to the certificate server;
(h) certificate server described in passes through encrypted as a result, simultaneously described in the second shared key key decryption
Whether the biological characteristic after the judgement decryption is correct;
If the biological characteristic (i) after the decryption is correct, the service server is by the key business
Data are transmitted to the storage chip, then terminate and exit;
If the biological characteristic (j) after the decryption is incorrect, terminates and exit.
Further, further comprising the steps of between the step (h) and the step (i):
(h.1) service server judging described in returns the user of the key business data and reads the key business number
According to user it is whether consistent;
(h.2) if the user for returning the key business data is consistent with the user of the key business data is read,
Then continue step (i);
(h.3) if return the key business data user and read the key business data user it is different
It causes, then continues step (j).
Mediation device and its application method are transmitted using the key business data of the identity-based verifying in the invention, with
The prior art is compared, and has technical effect beneficial below:
(1) data safety;The preservation and reading of data are required through authentication, and be ensure that and read data and guarantor
The user of deposit data is the same user, and finger print identifying is compared again safer with traditional password authentication;
(2) easy to use;Traditional password authentication mode constantly replaces password for security needs, and is easy quilt
It cracks, passes through the operation of the finger print identifying person of being convenient to use.
Detailed description of the invention
Fig. 1 is the structural schematic diagram for the key business data transmission that identity-based of the invention is verified.
Fig. 2 is the structural schematic diagram of mediation device of the invention.
Fig. 3 is the step process of the invention for reading key business data from service server and being transmitted to mediation device
Figure.
Fig. 4 is the step process of the invention for reading key business data from mediation device and being transmitted to service server
Figure.
Specific embodiment
It is further to carry out combined with specific embodiments below in order to more clearly describe technology contents of the invention
Description.
Please refer to shown in Fig. 1 to Fig. 2, the key business data transmission mediation device of identity-based verifying of the invention to
It is inserted in the transmission that key business data is realized in client computer, equipment realizes key business number to be inserted in client computer
According to transmission, equipment includes main control module, to control physical characteristics collecting module, storage chip, shared key encryption storage
The work of area and self-destruction shell;Physical characteristics collecting module, storage chip;Equipment and server all have shared key key.
In equipment end, key (is generated) encryption by the fingerprint key s of user using certain public algorithm, is then stored in depositing for equipment end
In shared key encryption memory block.In use, equipment end acquires user fingerprints, fingerprint key s is calculated, then with s from altogether
It enjoys in key encryption memory block and decrypts key, user fingerprints are then encrypted by key again, and be sent to certificate server, serviced
After device receives, user fingerprints information is obtained using the shared key key decryption of the user, verifies user identity;Self-destruction shell is used
With when the self-destruction shell is destroyed, the main control module of Xiang Suoshu sends the information that self-destruction shell is destroyed.
In a preferred embodiment, the physical characteristics collecting module is fingerprint capturer.Draw in the present invention
Enter fingerprint identification technology, is encrypted using the mediation device that fingerprint identification technology transmits data, it is ensured that data are in
Safety in medium, apparatus.
In a preferred embodiment, the equipment further includes USB interface.
Referring to shown in Fig. 2, the key business data of identity-based verifying of the invention transmits mediation device, including
Following part:
The inside of equipment is made of a storage chip and a fingerprint capturer.Storage chip is used to store key business
Data, fingerprint capturer are verified to the identity to user.Self-destruction shell has the function of Anti-dismantling, tamper-proof.In
Medium, apparatus is externally the interface of a USB.
Transmission intermediary can be only inserted into dedicated client computer, and being inserted on other machines is a unrecognized equipment, only
There is the client computer equipped with special driving that could identify mediation device.Fingerprint capturer of mediation device itself does not store user
Finger print information, client computer will be passed to after being collected finger print information, finger print information is passed to operation system again by client computer, thus
The personal finger print information of protection will not leak.
The service server of key business and the certificate server of fingerprint are attached, and are needing to transfer data to intermediary
When equipment, mediation device and business operation client computer are attached first.And number is issued to service server by client computer
It is requested according to transmission.Prompt client computer carries out authentication after service server receives request, and user passes through on mediation device
Fingerprint capturer is read out the feature of the fingerprint of user, and passes feature back the business service phase.Certificate server by this
Characteristic information is compared with the identification system in certificate server, if compared successfully i.e. by the certification of identity, if not
Matching user is found, that is, thinks authentification failure.The result of certification is returned to service server, service server by certificate server
Decided whether to allow user that key business data is transferred to mediation device according to authentication result.
When passing data back service server from mediation device, mediation device is first equally inserted into client computer,
Prompt client carries out authentication after client computer receives request, passes on certificate server and is authenticated after acquisition finger print information,
And judge returned data user and former data consumer whether the same person, key business data could be passed to after
Service server.
In terms of safety guarantee, user needs to generate shared key when registering, respectively storage and certificate server and intermediary
In equipment.By biometric keys generation technique, key is generated using user's fingerprint, to being stored in being total on mediation device
Key is enjoyed to be encrypted.The second shared key encrypting module at certificate server end stores, but is not required to fingerprint characteristic key.Make
User is protected with the communication between certificate server by shared key.
It please refers to shown in Fig. 2, the key business data transmission mediation device of identity-based verifying of the invention gives one
Kind is easy to popularize, is high-efficient, highly-safe data transmit mediation device, and internal structure is as shown in Fig. 2, by a master control mould
Block, a finger print acquisition module, the first shared key encryption memory block and a storage chip composition, main control module connect fingerprint
Module and storage chip and control fingerprint module switch and storage chip read-write, while also be responsible for read shared key encryption
Memory block executes task of shared key is decrypted by fingerprint bio key.Also, in order to avoid irrelevant people passes through disassembly
Mode obtains the content in storage chip, and the shell of mediation device uses the disassembly self-destruction shell of Anti-dismantling.As long as self-destruction shell
The main control device that is opened will automatically damage storage chip, to achieve the purpose that content is not revealed.
Key business data is read to the method for mediation device from service server the invention further relates to a kind of, please refers to figure
Shown in 4, client computer is connected with the service server, and the service server is connected with the certificate server
Connect, the method the following steps are included:
(1) client computer described in reads key business data to the service server request;
(2) mediation device whether is inserted in client computer described in the client computer judgement described in;
(3) if being not inserted into the mediation device in the client computer, the client computer prompt user is inserted
Enter mediation device, then proceedes to step (1);
(4) if inserting the mediation device in the client computer, the mediation device acquires user
Biological characteristic;
(5) physical characteristics collecting module described in generates biometric keys according to the biological characteristic, and is sent to
The shared key encrypts memory block;
(6) main control module described in is decrypted according to the biometric keys from the shared key encryption memory block
To obtain the first shared key key, and first shared key and the biological characteristic are sent to the client
Machine;
(7) client computer described in encrypts the biological characteristic according to the first shared key key, and will be after encryption
Result be transmitted to the certificate server;
(8) certificate server described in passes through encrypted as a result, simultaneously described in the second shared key key decryption
Whether the biological characteristic after the judgement decryption is correct;
(9) if the biological characteristic after the decryption is correct, the service server is by the key business
Data are transmitted to the storage chip, then terminate and exit;
(10) if the biological characteristic after the decryption is incorrect, terminate and exit.
That is, when reading crucial business data transmission to mediation device from service server, it is necessary to pass through finger
Fixed client computer carries out, and the transmission intermediary of authentication is first inserted into client computer, is then sent out by client computer to service server
It requests out, client's machine check data simultaneously require client computer to provide authenticating identity, and judgement transmission intermediary is after client computer is instructed
It is no to be already inserted into, if being not inserted into prompt user is inserted into equipment, then restart;If be already inserted into, user is prompted to carry out
Authentication, finger print information when user needs to provide registration, after transmission mediation device acquires the finger print information of user, according to
The information such as Customs Assigned Number read the key storage entry of respective client in key storage area, are shared using fingerprint key decryption close
Finger print information and shared key are returned to client computer after success by key.Client computer encrypts finger print information using shared key, so
After transfer to certificate server to be compared, identify user identity, if identify successfully, operation system will after data encryption be stored in
Medium, apparatus, if terminating process after authentication failed prompt user.
Key business data is read to the method for service server from mediation device the invention further relates to a kind of, please refers to figure
Shown in 4, client computer is connected with the service server, and the service server is connected with the certificate server
Connect, the method the following steps are included:
(a) client computer described in requests return data to the service server;
(b) mediation device whether is inserted in client computer described in the client computer judgement described in;
If (c) being not inserted into the mediation device in the client computer, the client computer prompt user is inserted
Enter mediation device, then proceedes to step (a);
If (d) inserting the mediation device in the client computer, the mediation device acquires user
Biological characteristic;
(e) physical characteristics collecting module described in generates biometric keys according to the biological characteristic, and is sent to
The shared key encrypts memory block;
(f) main control module described in is decrypted according to the biometric keys from the shared key encryption memory block
To obtain the first shared key key, and the first shared key key and the biological characteristic be sent to described
Client computer;
(g) client computer described in encrypts the biological characteristic according to the first shared key key, and will be after encryption
Result be transmitted to the certificate server;
(h) certificate server described in passes through encrypted as a result, simultaneously described in the second shared key key decryption
Whether the biological characteristic after the judgement decryption is correct;
If the biological characteristic (i) after the decryption is correct, the service server is by the key business
Data are transmitted to the storage chip, then terminate and exit;
If the biological characteristic (j) after the decryption is incorrect, terminates and exit.
It in a preferred embodiment, further include following step between the step (h) and the step (i)
It is rapid:
(h.1) service server judging described in returns the user of the key business data and reads the key business number
According to user it is whether consistent;
(h.2) if the user for returning the key business data is consistent with the user of the key business data is read,
Then continue step (i);
(h.3) if return the key business data user and read the key business data user it is different
It causes, then continues step (j).
After certificate server verifies identity, service server also needs to judge that the user is with the user for exporting data
No is to belong to the same person, can equally prompt verifying not pass through if not the same person, only the export of data and is passed back same
When belonging to a people, verifying could pass through, to ensure that the uniqueness of key business data to greatest extent.
Mediation device and its application method are transmitted using the key business data of the identity-based verifying in the invention, with
The prior art is compared, and has technical effect beneficial below:
(1) data safety;The preservation and reading of data are required through authentication, and be ensure that and read data and guarantor
The user of deposit data is the same user, and finger print identifying is compared again safer with traditional password authentication;
(2) easy to use;Traditional password authentication mode constantly replaces password for security needs, and is easy quilt
It cracks, passes through the operation of the finger print identifying person of being convenient to use.
In this description, the present invention is described with reference to its specific embodiment.But it is clear that can still make
Various modifications and alterations are without departing from the spirit and scope of the invention.Therefore, the description and the appended drawings should be considered as illustrative
And not restrictive.
Claims (5)
1. a kind of key business data of identity-based verifying transmits mediation device, which is characterized in that the equipment is to insert
The transmission of key business data is realized in client computer, the equipment includes:
Main control module, to control physical characteristics collecting module, storage chip, shared key encryption memory block and self-destruction shell
Work;
Physical characteristics collecting module to acquire the biological characteristic of user, and calculates biometric keys, and is transmitted to altogether
Enjoy key encryption memory block;
Storage chip, to store key business data;
Shared key encrypts memory block, to store the first shared key key;The first shared key key and certification takes
The second shared key key being engaged in device is corresponding;
Self-destruction shell, to when the self-destruction shell is destroyed, the main control module of Xiang Suoshu sends self-destruction shell and is destroyed
Information;
Wherein, service server is used for after the certificate server verifies identity, is also used to judge the key business data
Reading user it is whether consistent with the passback user of the key business data;
The main control module is decrypted according to the biometric keys from the shared key encryption memory block to obtain
First shared key key, and first shared key and the biological characteristic are sent to the client computer;
The client computer biological characteristic according to the described first shared key key encryption, and by encrypted result
It is transmitted to the certificate server;
The certificate server passes through encrypted as a result, and judging institute described in the second shared key key decryption
Whether the biological characteristic after the decryption stated is correct.
2. the key business data of identity-based verifying according to claim 1 transmits mediation device, which is characterized in that institute
The physical characteristics collecting module stated is fingerprint capturer.
3. the key business data of identity-based verifying according to claim 1 transmits mediation device, which is characterized in that institute
The equipment stated further includes USB interface.
4. a kind of slave service server based on equipment described in claim 1 reads key business data to the side of mediation device
Method, which is characterized in that client computer is connected with the service server, the service server and the authentication service
Device is connected, the method the following steps are included:
(1) client computer described in reads key business data to the service server request;
(2) mediation device whether is inserted in client computer described in the client computer judgement described in;
(3) if being not inserted into the mediation device in the client computer, in client computer prompt user's insertion
Medium, apparatus then proceedes to step (1);
(4) if inserting the mediation device in the client computer, the life of the mediation device acquisition user
Object feature;
(5) physical characteristics collecting module described in generates biometric keys according to the biological characteristic, and is sent to described
Shared key encrypt memory block;
(6) main control module described in is decrypted according to the biometric keys from the shared key encryption memory block to obtain
The first shared key key is taken, and first shared key and the biological characteristic are sent to the client computer;
(7) client computer described in the biological characteristic according to the first shared key key encryption, and by encrypted knot
Fruit is transmitted to the certificate server;
(8) certificate server described in passes through encrypted as a result, and judging described in the second shared key key decryption
Whether the biological characteristic after the decryption is correct;
(9) if the biological characteristic after the decryption is correct, the service server is by the key business data
It is transmitted to the storage chip, then terminates and exits;
(10) if the biological characteristic after the decryption is incorrect, terminate and exit.
5. a kind of slave mediation device based on equipment described in claim 1 reads key business data to the side of service server
Method, which is characterized in that client computer is connected with the service server, the service server and the authentication service
Device is connected, the method the following steps are included:
(a) client computer described in requests return data to the service server;
(b) mediation device whether is inserted in client computer described in the client computer judgement described in;
If (c) being not inserted into the mediation device in the client computer, in client computer prompt user's insertion
Medium, apparatus then proceedes to step (a);
If (d) inserting the mediation device in the client computer, the life of the mediation device acquisition user
Object feature;
(e) physical characteristics collecting module described in generates biometric keys according to the biological characteristic, and is sent to described
Shared key encrypt memory block;
(f) main control module described in is decrypted according to the biometric keys from the shared key encryption memory block to obtain
The first shared key key is taken, and the first shared key key and the biological characteristic are sent to the client
Machine;
(g) client computer described in the biological characteristic according to the first shared key key encryption, and by encrypted knot
Fruit is transmitted to the certificate server;
(h) certificate server described in passes through encrypted as a result, and judging described in the second shared key key decryption
Whether the biological characteristic after the decryption is correct;
If the biological characteristic (i) after the decryption is correct, the storage chip passes the key business data
The service server is transported to, then terminates and exits;
If the biological characteristic (j) after the decryption is incorrect, terminates and exit;
It is further comprising the steps of between the step (h) and the step (i):
(h.1) service server judging described in returns the user of the key business data and reads the key business data
Whether user is consistent;
(h.2) if the user for returning the key business data is consistent with the user of the key business data is read, after
Continuous step (i);
(h.3) if return the key business data user and read the key business data user it is inconsistent,
Continue step (j).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510662901.1A CN105227562B (en) | 2015-10-14 | 2015-10-14 | The key business data transmission mediation device and its application method of identity-based verifying |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510662901.1A CN105227562B (en) | 2015-10-14 | 2015-10-14 | The key business data transmission mediation device and its application method of identity-based verifying |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105227562A CN105227562A (en) | 2016-01-06 |
CN105227562B true CN105227562B (en) | 2019-05-24 |
Family
ID=54996241
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510662901.1A Active CN105227562B (en) | 2015-10-14 | 2015-10-14 | The key business data transmission mediation device and its application method of identity-based verifying |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105227562B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106570417A (en) * | 2016-10-28 | 2017-04-19 | 郑建钦 | Data security storage method |
CN108694313A (en) * | 2018-05-07 | 2018-10-23 | 襄阳市尚贤信息科技有限公司 | A kind of computer user's identification system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6122737A (en) * | 1997-11-14 | 2000-09-19 | Digital Persona, Inc. | Method for using fingerprints to distribute information over a network |
CN101631020A (en) * | 2008-07-16 | 2010-01-20 | 上海方立数码科技有限公司 | Identity authentication system combining fingerprint identification and PKI system |
CN101727561A (en) * | 2009-12-04 | 2010-06-09 | 强敏 | File security management system and file security management method |
CN102394896A (en) * | 2011-12-13 | 2012-03-28 | 甘肃农业大学 | Privacy-protection fingerprint authentication method and system based on token |
CN202424738U (en) * | 2011-12-16 | 2012-09-05 | 四川久远新方向智能科技有限公司 | Identity authentication safety management system |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010132928A1 (en) * | 2009-05-18 | 2010-11-25 | Mikoh Corporation | Biometric identification method |
AU2013347993B2 (en) * | 2012-11-21 | 2016-09-15 | Apple Inc. | Policy-based techniques for managing access control |
-
2015
- 2015-10-14 CN CN201510662901.1A patent/CN105227562B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6122737A (en) * | 1997-11-14 | 2000-09-19 | Digital Persona, Inc. | Method for using fingerprints to distribute information over a network |
CN101631020A (en) * | 2008-07-16 | 2010-01-20 | 上海方立数码科技有限公司 | Identity authentication system combining fingerprint identification and PKI system |
CN101727561A (en) * | 2009-12-04 | 2010-06-09 | 强敏 | File security management system and file security management method |
CN102394896A (en) * | 2011-12-13 | 2012-03-28 | 甘肃农业大学 | Privacy-protection fingerprint authentication method and system based on token |
CN202424738U (en) * | 2011-12-16 | 2012-09-05 | 四川久远新方向智能科技有限公司 | Identity authentication safety management system |
Also Published As
Publication number | Publication date |
---|---|
CN105227562A (en) | 2016-01-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6882254B2 (en) | Safety verification methods based on biological characteristics, client terminals, and servers | |
CN108683509B (en) | Block chain-based secure transaction method, device and system | |
KR100876003B1 (en) | User Authentication Method Using Biological Information | |
KR101226651B1 (en) | User authentication method based on the utilization of biometric identification techniques and related architecture | |
CN201181472Y (en) | Hardware key device and movable memory system | |
KR101284481B1 (en) | Authentication method and device using OTP including biometric data | |
US20140093144A1 (en) | More-Secure Hardware Token | |
US20070237366A1 (en) | Secure biometric processing system and method of use | |
WO2017044554A1 (en) | Biometric verification of a blockchain database transaction contributor | |
US9280650B2 (en) | Authenticate a fingerprint image | |
CN101420301A (en) | Human face recognizing identity authentication system | |
CN1921395B (en) | Method for improving security of network software | |
WO2006067739A2 (en) | Method and device for key generation and proving authenticity | |
CN103067390A (en) | User registration authentication method and system based on facial features | |
CN103888429B (en) | Virtual machine starts method, relevant device and system | |
CN105207776A (en) | Fingerprint authentication method and system | |
WO2014141263A1 (en) | Asymmetric otp authentication system | |
CN106789024A (en) | A kind of remote de-locking method, device and system | |
TWI476629B (en) | Data security and security systems and methods | |
CN112039665A (en) | Key management method and device | |
CN105227562B (en) | The key business data transmission mediation device and its application method of identity-based verifying | |
CN113761488A (en) | Content network copyright tracing encryption system and encryption method | |
KR20040082674A (en) | System and Method for Authenticating a Living Body Doubly | |
CN109961542A (en) | A kind of entrance guard device, verifying device, verifying system and its verification method | |
CN101883357A (en) | Method, device and system for mutual authentication between terminal and intelligent card |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |