CN105245529A - User biological characteristic code-based distributed authentication method, terminal and system - Google Patents

User biological characteristic code-based distributed authentication method, terminal and system Download PDF

Info

Publication number
CN105245529A
CN105245529A CN201510686617.8A CN201510686617A CN105245529A CN 105245529 A CN105245529 A CN 105245529A CN 201510686617 A CN201510686617 A CN 201510686617A CN 105245529 A CN105245529 A CN 105245529A
Authority
CN
China
Prior art keywords
information
cipher
user biological
condition code
biological condition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510686617.8A
Other languages
Chinese (zh)
Inventor
胥寅
张采荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Financial Cloud Service Group Security Technology Co., Ltd.
Original Assignee
SICHUAN NINGCHAO TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SICHUAN NINGCHAO TECHNOLOGY Co Ltd filed Critical SICHUAN NINGCHAO TECHNOLOGY Co Ltd
Priority to CN201510686617.8A priority Critical patent/CN105245529A/en
Publication of CN105245529A publication Critical patent/CN105245529A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • General Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Storage Device Security (AREA)

Abstract

The invention belongs to the information security technical field and relates to a user biological characteristic code-based distributed authentication method, terminal and system. According to the user biological characteristic code-based distributed authentication method, special user biological characteristic codes for a user are saved and transmitted in an incomplete manner, so that authentication between the user and a terminal and authentication between the user and an authentication server can be completed, and therefore, safety authentication between two sides of communication can be accelerated, and an authentication principle that who I am, I am the answer can be actually realized, and information security issues in user information which are caused by leakage occurs on the server can be avoided, and the interests of the user can be ensured.

Description

A kind of distributed authentication method based on user biological condition code, terminal and system
Technical field
The present invention relates to field of information security technology, particularly, relate to a kind of distributed authentication method based on user biological condition code, terminal and system.
Background technology
In order to ensure the safety between communicating pair, need before a communication to carry out unidirectional identity information certification (such as mobile phone terminal and Mobile Communication Service business) or two-way identity information certification (in such as WiFi network site STA and focus AP), the legitimacy of the other side for confirmation and fail safe.Traditional identity information authentication mode mainly authentication storage mode, namely service provider sets up the corresponding relation of user profile and account information when user registers, then user profile and account information are stored in corresponding server respectively, user's correct input account information on the electronic equipments such as such as computer can realize the safety certification of service provider to user, then communicates.If but information leakage appears in the server of service provider side, will cause the serious consequence occurring that account is usurped and user profile is revealed, the legitimate interests of infringement user, therefore traditional authentication storage mode, well can not ensure the interests of user.
For the problem of above-mentioned conventional store authentication mode, be necessary to provide a kind of novel authentication method in conjunction with user biological condition code technology, terminal and system, by carrying out incomplete preservation and transmission to user's distinctive user biological condition code information, come completing user and terminal and certification between user and certificate server, thus the safety certification not only can accelerated between communicating pair, real realization " Who Am I? I is exactly answer " certification theory, can also guarantee that user profile can not cause information security issue because server occurs leaking, ensure the interests of user.
Summary of the invention
For the problem of aforementioned conventional authentication storage mode, the invention provides a kind of distributed authentication method based on user biological condition code, terminal and system, by carrying out incomplete preservation and transmission to user's distinctive user biological condition code information, come completing user and terminal and certification between user and certificate server, thus the safety certification not only can accelerated between communicating pair, real realization " Who Am I? I is exactly answer " certification theory, can also guarantee that user profile can not cause information security issue because server occurs leaking, ensure the interests of user.
The technical solution used in the present invention, provides a kind of distributed authentication method based on user biological condition code on the one hand, comprises the steps: that S101. gathers first user biological condition code information; S102. by the first hash algorithm, described first user biological condition code information is encrypted, generates the first cipher-text information; S103. described first cipher-text information and local the second cipher-text information stored are mated, if the match is successful, then first time authentication success, continue to perform step S104, otherwise authentification failure for the first time; S104. the second user biological condition code information is gathered; S105. by the second hash algorithm, described second user biological condition code information is encrypted, generates the 3rd cipher-text information; S106. the information to be certified comprising described 3rd cipher-text information is sent to certificate server, if receive from certificate server, for the authentication success message of described information to be certified, then second time authentication success, if receive from certificate server, for the authentication failure message of described information to be certified, then second time authentification failure.Described step S101 to S103 relates to and utilizes described first user biological condition code information to carry out the certification between user and terminal, described step S104 to S106 relates to the certification utilizing described second user biological condition code information to carry out between user and certificate server, by this distributed authentication method, not only can accelerate the safety certification between communicating pair, real realization " Who Am I? I is exactly answer " certification understand, simultaneously owing to having carried out transmission and the encrypting storing of incomplete property in verification process to user biological condition code information, can also guarantee that user profile can not cause information security issue because server occurs leaking, ensure the interests of user.
Concrete, before described step S102, also comprise the steps: that S201. is encrypted described first user biological information by the first hash algorithm, generate described second cipher-text information; S202. described second cipher-text information is saved in local memory cell.Described step S201 to S202 is used for the information encryption of described first user biological condition code being kept at end side, to utilize described first user biological condition code information to carry out the certification between user and terminal in step s 103.Concrete further, described memory cell is key string unit.
Concrete, before described step S105, also comprise the steps: that S301. is encrypted described second user biological characteristic information by the second hash algorithm, generate the 4th cipher-text information; S302. the log-on message comprising described 4th cipher-text information is sent to described certificate server, and accepts the information that succeeds in registration from described certificate server.Described step S301 to S302 is used for described second user biological condition code information encryption to be saved in certificate server side, utilizes described second user biological condition code information to carry out the certification between user and certificate server so that follow-up in certificate server side.Concrete further, described log-on message and described information to be certified also comprise local device hardware information.By uploading described device hardware information to certificate server, can also when carrying out the certification between user and certificate server, utilize the certification that described device hardware information is carried out between terminal and certificate server, improve the fail safe of described authentication method further.
Concrete, described first user biological condition code information or described second user biological condition code information are the combination in any of any one or they in finger print information, voiceprint and face information.
Concrete, described first user biological condition code information is identical with described second user biological condition code information.
The technical solution used in the present invention, provides a kind of distributed authentication terminal based on user biological condition code on the other hand, comprises collecting unit, the first ciphering unit, the second ciphering unit, memory cell, local authentication unit and Transmit-Receive Unit; Described collecting unit, for gathering first user biological condition code information and the second user biological condition code information, and described first user biological condition code information is delivered to the first ciphering unit, described second user biological condition code information is delivered to described second ciphering unit; Described first ciphering unit, for being encrypted described first user biological information by the first hash algorithm, and is delivered to described local authentication unit by the first cipher-text information generated, or the second cipher-text information generated is delivered to described memory cell; Described second ciphering unit, for being encrypted described second user biological characteristic information by the second hash algorithm, and is delivered to described Transmit-Receive Unit by the 3rd cipher-text information generated, or the 4th cipher-text information generated is delivered to described Transmit-Receive Unit; Described memory cell, for storing described second cipher-text information; Described local authentication unit, for reading described second cipher-text information from described storage element, and mates described second cipher-text information with described first cipher-text information, if the match is successful, then first time authentication success, otherwise first time authentification failure; Described Transmit-Receive Unit, for communicating with certificate server, the log-on message comprising described 4th cipher-text information is sent to certificate server, and the information that succeeds in registration received from certificate server, with the information to be certified comprising described 3rd cipher-text information to certificate server transmission, and receive from certificate server, for the authentication success message of described information to be certified or authentication failure message, if receive described authentication success message, then second time authentication success, if receive described authentication failure message, then second time authentification failure.
Concrete, described memory cell is key string unit.
The technical solution used in the present invention, additionally provides a kind of distributed authentication system based on user biological condition code on the other hand, comprising: collecting unit, the first ciphering unit, the second ciphering unit, memory cell, local authentication unit and certificate server; Described collecting unit, for gathering first user biological condition code information and the second user biological condition code information, and described first user biological condition code information is delivered to the first ciphering unit, described second user biological condition code information is delivered to described second ciphering unit; Described first ciphering unit, for being encrypted described first user biological information by the first hash algorithm, and is delivered to described local authentication unit by the first cipher-text information generated, or the second cipher-text information generated is delivered to described memory cell; Described second ciphering unit, for being encrypted described second user biological characteristic information by the second hash algorithm, and is delivered to described certificate server by the 3rd cipher-text information generated, or the 4th cipher-text information generated is delivered to described certificate server; Described memory cell, for storing described second cipher-text information; Described local authentication unit, for reading described second cipher-text information from described storage element, and mates described second cipher-text information with described first cipher-text information, if the match is successful, then first time authentication success, otherwise first time authentification failure; Described certificate server, for receiving package containing the log-on message of described 4th cipher-text information and the information to be certified comprising described 3rd cipher-text information, and described log-on message is mated with described information to be certified, if the match is successful, then second time authentication success, otherwise second time authentification failure.
To sum up, adopt a kind of distributed authentication method based on user biological condition code provided by the present invention, terminal and system, there is following beneficial effect: (1) is by the distributed authentication method based on user biological condition code, the safety certification between communicating pair can be accelerated, real to realize " Who Am I? I is exactly answer " certification theory; (2) owing to having carried out transmission and the encrypting storing of incomplete property in verification process to user biological condition code information, can also guarantee that user profile can not cause information security issue because server occurs leaking, ensure the interests of user; (3) can when carrying out the certification between user and certificate server, utilize the certification that described device hardware information is carried out between terminal and certificate server, improve the fail safe of described authentication method further.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the schematic flow sheet of the distributed authentication method based on user biological condition code provided by the invention.
Fig. 2 is the distributed authentication terminal based on user biological condition code provided by the invention.
Fig. 3 is the distributed authentication system based on user biological condition code provided by the invention.
Embodiment
Hereinafter with reference to accompanying drawing, describe the distributed authentication method based on user biological condition code provided by the invention, terminal and system in detail by way of example.It should be noted that at this, the explanation for these way of example understands the present invention for helping, but does not form limitation of the invention.
Various technology described herein may be used for but be not limited to field of information security technology, can also be used for other similar field.
Term "and/or" herein, it is only a kind of incidence relation describing affiliated partner, three kinds of relations can be there are in expression, such as, A and/or B, can represent: individualism A, individualism B, there are A and B tri-kinds of situations simultaneously, term "/and " describes another kind of affiliated partner relation herein, and expression can exist two kinds of relations, such as, A/ and B, can represent: individualism A, individualism A and B two kinds of situations, in addition, character "/" herein, general expression forward-backward correlation is to liking a kind of "or" relation.
Embodiment one
Fig. 1 shows the schematic flow sheet of the distributed authentication method based on user biological condition code provided by the invention.The described distributed authentication method based on user biological condition code, comprises the steps.
S101. first user biological condition code information is gathered.
In step S101, concrete, described first user biological condition code information can be but be not limited to be the combination in any of any one or they in the biological condition code information such as finger print information, voiceprint and face information.Utilize collecting unit terminal with corresponding acquisition function to gather described first user biological condition code information, such as, utilize finger scan unit to gather finger print information, utilize recoding unit to gather voiceprint, utilize image unit to gather face information.Described terminal is the electronic equipment being configured with collecting unit, such as smart mobile phone, intelligent watch, intelligent glasses or panel computer etc.
S102. by the first hash algorithm, described first user biological condition code information is encrypted, generates the first cipher-text information.
Before step S102, the certification between user and terminal is carried out for the ease of first user biological condition code information described in later use, user is needed to input described first user biological condition code information, the information encryption of described first user biological condition code is kept at end side, and then completing user is in the registration of end side.Concrete, before described step S102, also comprise the steps: that S201. is encrypted described first user biological information by the first hash algorithm, generate described second cipher-text information; S202. described second cipher-text information is saved in local memory cell.Described first hash algorithm can be but be not limited to be any one hash algorithm in national regulation SM3, it performs encipheror with the form of soft plug-in unit in terminal, complete and be encrypted described first user biological information, finally obtain high security, have the second cipher-text information of uniqueness.Finally described second cipher-text information be kept at safely in local memory cell, concrete further, described memory cell can be but be not limited to be key string unit.Described key string unit is the Password Management unit in Apple MacOS, has quite high fail safe, can meet technical need of the present invention.
S103. described first cipher-text information and local the second cipher-text information stored are mated, if the match is successful, then first time authentication success, continue to perform step S104, otherwise authentification failure for the first time.
In step s 103, described second cipher-text information is second cipher-text information of to preserve in step S202 in the memory unit.After carrying out coupling contrast, if the match is successful, then user is at the authentication success of end side, and user can obtain the right to use of terminal, and such as user logs in APP in end side, carries out the application operating in end side; If it fails to match, then user can not pass through in the certification of end side, need user to return step S101 and again initiate certification.
S104. the second user biological condition code information is gathered.
In step S104, concrete, described second user biological condition code information can be but be not limited to be the combination in any of any one or they in the biological condition code information such as finger print information, voiceprint and face information.Utilize collecting unit terminal with corresponding acquisition function to gather described second user biological condition code information, such as, utilize finger scan unit to gather finger print information, utilize recoding unit to gather voiceprint, utilize image unit to gather face information.Described second user biological condition code information can be identical with described second user biological condition code information, also can be different, as an example, concrete, in the present embodiment, described first user biological condition code information is identical with described second user biological condition code information.
S105. by the second hash algorithm, described second user biological condition code information is encrypted, generates the 3rd cipher-text information.
Before step S105, utilize described second user biological condition code information to carry out the certification between user and certificate server for the ease of follow-up in certificate server side, user is needed to input described second user biological condition code information, described second user biological condition code information encryption is kept at certificate server, and then completing user is in the registration of certificate server side.Concrete, before described step S105, also comprise the steps: that S301. is encrypted described second user biological characteristic information by the second hash algorithm, generate the 4th cipher-text information; S302. the log-on message comprising described 4th cipher-text information is sent to described certificate server, and accepts the information that succeeds in registration from described certificate server.Described second hash algorithm can be but be not limited to be any one hash algorithm in national regulation SM3, be different from described first hash algorithm when described first user biological condition code information is identical with described second user biological condition code information, it performs encipheror with the form of soft plug-in unit in terminal, complete and be encrypted described second user biological characteristic information, finally obtain high security, have the 4th cipher-text information of uniqueness.Finally described 4th cipher-text information is kept at safely in the certificate server of far-end.
S106. the information to be certified comprising described 3rd cipher-text information is sent to certificate server, if receive from certificate server, for the authentication success message of described information to be certified, then second time authentication success, if receive from certificate server, for the authentication failure message of described information to be certified, then second time authentification failure.
In step s 106, described certificate server receives described information to be certified, it is mated with at described log-on message, if the match is successful, then to end side feedback authentication success message, otherwise to end side feedback authentication failure message.End side is after receiving described authentication success message, then second time authentication success---the certification namely between completing user and certificate server, the communications applications that user can be undertaken between service provider by terminal, what such as user was undertaken by the APP of end side such as transfers accounts, changes the operations such as account password.End side after receiving described authentification failure message, then second time authentification failure---namely there is no the certification between completing user and certificate server, will forbid that user carries out the communications applications between service provider by terminal.Concrete further, described log-on message and described information to be certified also comprise local device hardware information.By uploading described device hardware information to certificate server, can also when carrying out the certification between user and certificate server, utilize the certification that described device hardware information is carried out between terminal and certificate server, improve the fail safe of described authentication method further.
Described step S101 to S103 relates to and utilizes described first user biological condition code information to carry out the certification between user and terminal, described step S104 to S106 relates to the certification utilizing described second user biological condition code information to carry out between user and certificate server, by this distributed authentication method, not only can accelerate the safety certification between communicating pair, real realization " Who Am I? I is exactly answer " certification understand, simultaneously owing to having carried out transmission and the encrypting storing of incomplete property in verification process to user biological condition code information, can also guarantee that user profile can not cause information security issue because server occurs leaking, ensure the interests of user.
To sum up, the distributed authentication method based on user biological condition code that the present embodiment provides, there is following beneficial effect: (1) is by the distributed authentication method based on user biological condition code, the safety certification between communicating pair can be accelerated, real to realize " Who Am I? I is exactly answer " certification theory; (2) owing to having carried out transmission and the encrypting storing of incomplete property in verification process to user biological condition code information, can also guarantee that user profile can not cause information security issue because server occurs leaking, ensure the interests of user; (3) can when carrying out the certification between user and certificate server, utilize the certification that described device hardware information is carried out between terminal and certificate server, improve the fail safe of described authentication method further.
Embodiment two
Fig. 2 shows the distributed authentication terminal based on user biological condition code provided by the invention.The described distributed authentication terminal based on user biological condition code, is characterized in that, comprises collecting unit, the first ciphering unit, the second ciphering unit, memory cell, local authentication unit and Transmit-Receive Unit; Described collecting unit, for gathering first user biological condition code information and the second user biological condition code information, and described first user biological condition code information is delivered to the first ciphering unit, described second user biological condition code information is delivered to described second ciphering unit; Described first ciphering unit, for being encrypted described first user biological information by the first hash algorithm, and is delivered to described local authentication unit by the first cipher-text information generated, or the second cipher-text information generated is delivered to described memory cell; Described second ciphering unit, for being encrypted described second user biological characteristic information by the second hash algorithm, and is delivered to described Transmit-Receive Unit by the 3rd cipher-text information generated, or the 4th cipher-text information generated is delivered to described Transmit-Receive Unit; Described memory cell, for storing described second cipher-text information; Described local authentication unit, for reading described second cipher-text information from described storage element, and mates described second cipher-text information with described first cipher-text information, if the match is successful, then first time authentication success, otherwise first time authentification failure; Described Transmit-Receive Unit, for communicating with certificate server, the log-on message comprising described 4th cipher-text information is sent to certificate server, and the information that succeeds in registration received from certificate server, with the information to be certified comprising described 3rd cipher-text information to certificate server transmission, and receive from certificate server, for the authentication success message of described information to be certified or authentication failure message, if receive described authentication success message, then second time authentication success, if receive described authentication failure message, then second time authentification failure.
Concrete, described memory cell is key string unit.
Embodiment two is for realizing the end side hardware configuration of distributed authentication method described in embodiment one, and its technique effect can obtain based on the technique effect of embodiment one, repeats no more in this.
Embodiment three
Fig. 3 shows the distributed authentication system based on user biological condition code provided by the invention.Based on the distributed authentication system of user biological condition code, comprising: collecting unit, the first ciphering unit, the second ciphering unit, memory cell, local authentication unit and certificate server; Described collecting unit, for gathering first user biological condition code information and the second user biological condition code information, and described first user biological condition code information is delivered to the first ciphering unit, described second user biological condition code information is delivered to described second ciphering unit; Described first ciphering unit, for being encrypted described first user biological information by the first hash algorithm, and is delivered to described local authentication unit by the first cipher-text information generated, or the second cipher-text information generated is delivered to described memory cell; Described second ciphering unit, for being encrypted described second user biological characteristic information by the second hash algorithm, and is delivered to described certificate server by the 3rd cipher-text information generated, or the 4th cipher-text information generated is delivered to described certificate server; Described memory cell, for storing described second cipher-text information; Described local authentication unit, for reading described second cipher-text information from described storage element, and mates described second cipher-text information with described first cipher-text information, if the match is successful, then first time authentication success, otherwise first time authentification failure; Described certificate server, for receiving package containing the log-on message of described 4th cipher-text information and the information to be certified comprising described 3rd cipher-text information, and described log-on message is mated with described information to be certified, if the match is successful, then second time authentication success, otherwise second time authentification failure.
Embodiment three is for realizing the system hardware structure of distributed authentication method described in embodiment one, and its technique effect can obtain based on the technique effect of embodiment one, repeats no more in this.
As mentioned above, the present invention can be realized preferably.For a person skilled in the art, according to instruction of the present invention, designing the multi-form distributed authentication method based on user biological condition code, terminal and system does not need performing creative labour.Without departing from the principles and spirit of the present invention these embodiments changed, revise, replace, integrate and modification still falls within the scope of protection of the present invention.

Claims (10)

1. based on a distributed authentication method for user biological condition code, it is characterized in that, comprise the steps:
S101. first user biological condition code information is gathered;
S102. by the first hash algorithm, described first user biological condition code information is encrypted, generates the first cipher-text information;
S103. described first cipher-text information and local the second cipher-text information stored are mated, if the match is successful, then first time authentication success, continue to perform step S104, otherwise authentification failure for the first time;
S104. the second user biological condition code information is gathered;
S105. by the second hash algorithm, described second user biological condition code information is encrypted, generates the 3rd cipher-text information;
S106. the information to be certified comprising described 3rd cipher-text information is sent to certificate server, if receive from certificate server, for the authentication success message of described information to be certified, then second time authentication success, if receive from certificate server, for the authentication failure message of described information to be certified, then second time authentification failure.
2. a kind of distributed authentication method based on user biological condition code as claimed in claim 1, is characterized in that, also comprised the steps: before described step S102
S201. by the first hash algorithm, described first user biological information is encrypted, generates described second cipher-text information;
S202. described second cipher-text information is saved in local memory cell.
3. a kind of distributed authentication method based on user biological condition code as claimed in claim 2, it is characterized in that, described memory cell is key string unit.
4. a kind of distributed authentication method based on user biological condition code as claimed in claim 1, is characterized in that, also comprised the steps: before described step S105
S301. by the second hash algorithm, described second user biological characteristic information is encrypted, generates the 4th cipher-text information;
S302. the log-on message comprising described 4th cipher-text information is sent to described certificate server, and accepts the information that succeeds in registration from described certificate server.
5. a kind of distributed authentication method based on user biological condition code as claimed in claim 4, is characterized in that, described log-on message and described information to be certified also comprise local device hardware information.
6. a kind of distributed authentication method based on user biological condition code as claimed in claim 1, it is characterized in that, described first user biological condition code information or described second user biological condition code information are the combination in any of any one or they in finger print information, voiceprint and face information.
7. a kind of distributed authentication method based on user biological condition code as claimed in claim 1, it is characterized in that, described first user biological condition code information is identical with described second user biological condition code information.
8. based on a distributed authentication terminal for user biological condition code, it is characterized in that, comprise collecting unit, the first ciphering unit, the second ciphering unit, memory cell, local authentication unit and Transmit-Receive Unit;
Described collecting unit, for gathering first user biological condition code information and the second user biological condition code information, and described first user biological condition code information is delivered to the first ciphering unit, described second user biological condition code information is delivered to described second ciphering unit;
Described first ciphering unit, for being encrypted described first user biological information by the first hash algorithm, and is delivered to described local authentication unit by the first cipher-text information generated, or the second cipher-text information generated is delivered to described memory cell;
Described second ciphering unit, for being encrypted described second user biological characteristic information by the second hash algorithm, and is delivered to described Transmit-Receive Unit by the 3rd cipher-text information generated, or the 4th cipher-text information generated is delivered to described Transmit-Receive Unit;
Described memory cell, for storing described second cipher-text information;
Described local authentication unit, for reading described second cipher-text information from described storage element, and mates described second cipher-text information with described first cipher-text information, if the match is successful, then first time authentication success, otherwise first time authentification failure;
Described Transmit-Receive Unit, for communicating with certificate server, the log-on message comprising described 4th cipher-text information is sent to certificate server, and the information that succeeds in registration received from certificate server, with the information to be certified comprising described 3rd cipher-text information to certificate server transmission, and receive from certificate server, for the authentication success message of described information to be certified or authentication failure message, if receive described authentication success message, then second time authentication success, if receive described authentication failure message, then second time authentification failure.
9. a kind of distributed authentication terminal based on user biological condition code as claimed in claim 8, it is characterized in that, described memory cell is key string unit.
10. based on a distributed authentication system for user biological condition code, it is characterized in that, comprising: collecting unit, the first ciphering unit, the second ciphering unit, memory cell, local authentication unit and certificate server;
Described collecting unit, for gathering first user biological condition code information and the second user biological condition code information, and described first user biological condition code information is delivered to the first ciphering unit, described second user biological condition code information is delivered to described second ciphering unit;
Described first ciphering unit, for being encrypted described first user biological information by the first hash algorithm, and is delivered to described local authentication unit by the first cipher-text information generated, or the second cipher-text information generated is delivered to described memory cell;
Described second ciphering unit, for being encrypted described second user biological characteristic information by the second hash algorithm, and is delivered to described certificate server by the 3rd cipher-text information generated, or the 4th cipher-text information generated is delivered to described certificate server;
Described memory cell, for storing described second cipher-text information;
Described local authentication unit, for reading described second cipher-text information from described storage element, and mates described second cipher-text information with described first cipher-text information, if the match is successful, then first time authentication success, otherwise first time authentification failure;
Described certificate server, for receiving package containing the log-on message of described 4th cipher-text information and the information to be certified comprising described 3rd cipher-text information, and described log-on message is mated with described information to be certified, if the match is successful, then second time authentication success, otherwise second time authentification failure.
CN201510686617.8A 2015-10-21 2015-10-21 User biological characteristic code-based distributed authentication method, terminal and system Pending CN105245529A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510686617.8A CN105245529A (en) 2015-10-21 2015-10-21 User biological characteristic code-based distributed authentication method, terminal and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510686617.8A CN105245529A (en) 2015-10-21 2015-10-21 User biological characteristic code-based distributed authentication method, terminal and system

Publications (1)

Publication Number Publication Date
CN105245529A true CN105245529A (en) 2016-01-13

Family

ID=55043029

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510686617.8A Pending CN105245529A (en) 2015-10-21 2015-10-21 User biological characteristic code-based distributed authentication method, terminal and system

Country Status (1)

Country Link
CN (1) CN105245529A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107256387A (en) * 2017-05-23 2017-10-17 崔俊新 Fingerprint verification method, system and computer-readable recording medium
CN108599957A (en) * 2018-04-16 2018-09-28 Oppo广东移动通信有限公司 Authentication method, information collecting device, authenticating device and Verification System
CN109246133A (en) * 2018-10-19 2019-01-18 清华大学 A kind of network access verifying method based on bio-identification
CN109960915A (en) * 2017-12-22 2019-07-02 苏州迈瑞微电子有限公司 A kind of identity authentication method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2051178A1 (en) * 2006-07-05 2009-04-22 Valley Technologies, LLC. Method, device, server and system for authenticating identity with biological character
CN102945365A (en) * 2012-10-19 2013-02-27 西安凯虹电子科技有限公司 Handheld iris identification device with multiple data transmission modes and method thereof
CN104951680A (en) * 2014-03-27 2015-09-30 阿里巴巴集团控股有限公司 Biological characteristic information processing method, storage method and device
CN104954328A (en) * 2014-03-27 2015-09-30 阿里巴巴集团控股有限公司 On-line registration and authentication method and apparatus

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2051178A1 (en) * 2006-07-05 2009-04-22 Valley Technologies, LLC. Method, device, server and system for authenticating identity with biological character
CN102945365A (en) * 2012-10-19 2013-02-27 西安凯虹电子科技有限公司 Handheld iris identification device with multiple data transmission modes and method thereof
CN104951680A (en) * 2014-03-27 2015-09-30 阿里巴巴集团控股有限公司 Biological characteristic information processing method, storage method and device
CN104954328A (en) * 2014-03-27 2015-09-30 阿里巴巴集团控股有限公司 On-line registration and authentication method and apparatus

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107256387A (en) * 2017-05-23 2017-10-17 崔俊新 Fingerprint verification method, system and computer-readable recording medium
CN107256387B (en) * 2017-05-23 2019-12-10 深圳市优点智联科技有限公司 Fingerprint authentication method, system and computer readable storage medium
CN109960915A (en) * 2017-12-22 2019-07-02 苏州迈瑞微电子有限公司 A kind of identity authentication method
CN108599957A (en) * 2018-04-16 2018-09-28 Oppo广东移动通信有限公司 Authentication method, information collecting device, authenticating device and Verification System
CN109246133A (en) * 2018-10-19 2019-01-18 清华大学 A kind of network access verifying method based on bio-identification

Similar Documents

Publication Publication Date Title
Odelu et al. SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms
US9848320B2 (en) Encrypted communications method and encrypted communications system
CN103886661B (en) Access control management method and system
US11636478B2 (en) Method of performing authentication for a transaction and a system thereof
CN101842795B (en) For carrying out mutual system, the method and apparatus with dynamic security
CN107784499B (en) Secure payment system and method of near field communication mobile terminal
CN104361493A (en) Electronic payment method on basis of biological characteristics
CN104756458A (en) Method and apparatus for securing a connection in a communications network
CN103853950A (en) Authentication method based on mobile terminal and mobile terminal
US20150264570A1 (en) Method and device for proving his identity
CN104901935A (en) Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)
CN105245529A (en) User biological characteristic code-based distributed authentication method, terminal and system
CN104580256A (en) Method and device for logging in through user equipment and verifying user's identity
WO2015109949A1 (en) Network security method and network security system
CN103839160B (en) A kind of network trading digital signature method and device
CN102056077A (en) Method and device for applying smart card by key
CN103905400A (en) Service authentication method, apparatus and system
KR101202245B1 (en) System and Method For Transferring Money Using OTP Generated From Account Number
CN109587100A (en) A kind of cloud computing platform user authentication process method and system
Jarecki et al. Two-factor password-authenticated key exchange with end-to-end security
CN104301886A (en) Short message reading method and system, terminal and wearable device
CN103368831A (en) Anonymous instant messaging system based on frequent visitor recognition
CN103297940A (en) Short message encryption communication system and method
CN102255904A (en) Communication network and terminal authentication method thereof
CN114139176A (en) Industrial internet core data protection method and system based on state secret

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20160608

Address after: 200000, Room 305, 1501-6 Ying Ying Road, Shanghai, Zhabei District

Applicant after: Shanghai Financial Cloud Service Group Security Technology Co., Ltd.

Address before: 610000, No. 1, North 78, purple North Street, Chengdu hi tech Zone, Sichuan, 2

Applicant before: Sichuan Ningchao Technology Co., Ltd.

AD01 Patent right deemed abandoned

Effective date of abandoning: 20191122

AD01 Patent right deemed abandoned