CN105323072A - Identity authentication method based on secret graphic code sharing mechanism - Google Patents

Identity authentication method based on secret graphic code sharing mechanism Download PDF

Info

Publication number
CN105323072A
CN105323072A CN201510470403.7A CN201510470403A CN105323072A CN 105323072 A CN105323072 A CN 105323072A CN 201510470403 A CN201510470403 A CN 201510470403A CN 105323072 A CN105323072 A CN 105323072A
Authority
CN
China
Prior art keywords
graphic code
code
secret
verified
people
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510470403.7A
Other languages
Chinese (zh)
Other versions
CN105323072B (en
Inventor
袁德砦
张景中
蔡红亮
袁琦钊
滕鹏国
陈亮
王子伟
钟勇
王晓京
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Information Technology Co Ltd of CAS
Original Assignee
Chengdu Information Technology Co Ltd of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Information Technology Co Ltd of CAS filed Critical Chengdu Information Technology Co Ltd of CAS
Priority to CN201510470403.7A priority Critical patent/CN105323072B/en
Publication of CN105323072A publication Critical patent/CN105323072A/en
Application granted granted Critical
Publication of CN105323072B publication Critical patent/CN105323072B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention relates to an identity authentication method based on a secret graphic code sharing mechanism. The identity authentication method comprises the following steps: extracting first biological characteristic information of a first authenticated person; converting the first biological characteristic information into a first graphic code having a symbol logic form; mapping the first graphic code into n shadow secrets, and respectively storing the shadow secrets in different places; extracting second biological characteristic information of a second authenticated person; converting the second biological characteristic information into a second graphic code having a symbol logic form; selecting t shadow secrets from the n shadow secrets so as to reconstruct a graphic code; judging whether the second graphic code accords with the reconstructed graphic code or not; if so, determining that the first authenticated person and the second authenticated person are the same person; or else, determining that the first authenticated person and the second authenticated person are two different persons. According to the invention, the problem that real-name identity information is tampered, forged and stolen can be effectively prevented.

Description

The identity identifying method of graphic based code secret sharing mechanism
Technical field
The present invention relates to field of identity authentication, particularly a kind of identity identifying method of graphic based code secret sharing mechanism.
Background technology
Identity real name certification is the process utilizing the proprietary Verification System having information of registered users the individuality wanting to conduct interviews to be carried out to the judgement process of identity.System of real name authentication is to provide the certification to system access person true identity, is mainly used in stoping unauthorized user to the access of system resource.Generally with electronic technology, biotechnology or electronic technology and the authenticity of biotechnology in conjunction with Certificate Authority user identity.Divide from the relation of certification voucher used and user, authentication can be divided three classes: certification known to user, user hold mark certification and user biological feature verification.
Conventional identity real name authentication techniques mainly contain the combination of following a few class or wherein a few class:
1. carry out certification by known things
Knowledge based engineering method determines one's identity.Such as: password and PIN code, the password of user's use and the confidentiality of PIN code are the necessary guarantees carrying out authentication that can be safe.
2. carry out certification with the article had
Method based on password board determines one's identity.Such as: user various can prove the certificate of identity, passport, smart card (Static and dynamic), digital certificate, USBKey certification or identity card etc.The shortcoming of this method is when accidentally losing when token or copied by malicious person and usurp, just cannot the stability of guarantee information system and fail safe.
3. the certification of identity is carried out by itself distinctive feature biological
Method based on biological characteristic determines one's identity.Biological characteristic for certification generally has palmmprint, fingerprint, face and iris etc.The generality of biological characteristic, consistency and irreplaceability all make the system utilizing biological characteristic to carry out certification have high security and high security.
It is more than Integrated comparative that three class system of real name identity identifying methods, utilize biological information to carry out authentication the tightest.Because the features such as the carry-on property of biological characteristic, fail safe, uniqueness, stability, popularity, convenience, collection property, acceptability, generality and irreplaceability are all can as the unique identification of bion.Utilize living things feature recognition user identity to be safe and reliable, especially utilize iris to carry out the alternate manner such as odds ratio fingerprint and face of authentication more, the safe and reliable not transreplication of iris, amount of information compares rich fingerprint.Iris also can not be subject to expressing one's feelings as face feature, jewelry blocks and the impact of the multiple factors such as background complexity, and recognition efficiency is higher.
Although the method utilizing biological characteristic to carry out authenticating user identification compares traditional authentication higher fail safe, but guarantee that the fail safe of biological characteristic itself but becomes the emphasis of authentication, once under attack or malice distorts destruction for the biometric templates of authentication, the confidence level of Verification System and accuracy will reduce greatly, and whole system will lose the reliability of authentication.Although existing numerous algorithm for biometric templates protection and scheme, effect is not very desirable, and safety problem still becomes increasingly conspicuous.How to seek a kind of safe and practical protection scheme, be then wherein have challenge and urgent unsettled problem, be also the motivation of this patent and the place of object simultaneously, especially has special significance to the secret protection of financial industry and individual.
In sum, relative to the progress that information technology and the Internet are maked rapid progress, existing identity real name authentication techniques obviously delayed, leak are comparatively large, cause identity to be distorted forging and the activity exception of other people identity document of illegal use rampant, this is just threaten modern society's credit system and sincere safety.How to guarantee that the legitimacy of system of real name authentication (comprising: ensure the integrality of its content-anti-tamper technically; Ensure authenticity and the authority-anti-counterfeiting of its content), the technology decidability of availability (anti-usurp, anti-lost) that system of real name uses and legitimacy, this remains the three large basic problems solved very well in identity real name technology.
Summary of the invention
The object of this invention is to provide and a kind of there is the identity identifying method that cost is low, implement graphic based code secret sharing mechanism easily, be tampered effectively to take precautions against system of real name identity information, be forged, by the problem acted as fraudulent substitute for a person.
The invention provides a kind of identity identifying method of graphic based code secret sharing mechanism, comprising: extract the first biological information that first is verified people; Described first biological information is converted into first graphic code with symbolic logic form; Described first graphic code is mapped to n part shadow secret and respectively by described shadow secure store in different places; Extract the second biological information that second is verified people; Described second biological information is converted into the second graph code with symbolic logic form; T part shadow is chosen secret to reconstruct out described graphic code from described n part shadow secret; Judge whether described second graph code is consistent with the described graphic code reconstructed; If met, then judge that described first is verified people and described second and is verified artificial same people, otherwise judge that described first is verified people and described second and is verified two artificially different people.
Preferably, described first biological information comprises any one or more in fingerprint, iris, DNA, face phase, face, retina, palm type, vocal print, handwritten signature, gait.
Preferably, described graphic code is printable or is printed on the machine recognition mark on soft certificate.
Preferably, described graphic code comprises machine-readable character string, machine-readable character array, bar code, two-dimensional matrix code, two-dimensional bar, any one in three-dimensional colour graphic code.
Preferably, judge whether described second graph code is consistent with the described graphic code reconstructed to comprise: described second graph code is carried out threshold value with the described graphic code reconstructed and compares and decision-making.
Preferably, adopt the euclidean geometry Space Program of the Lagrange interpolation polynomial secret sharing of Shamir mechanism, Blakley or carry out described mapping or reconstruct based on any one in array correcting and eleting codes.
Preferably, be mapped to by described first graphic code in the process of n part shadow secret, the temporary file of generation is not preserved, and destroys immediately after processing is completed, only keeps described n part shadow secret.
Preferably, described different place comprises: the different location being verified people and multiple checking actuator.
Preferably, the different location of described multiple checking actuator is multiple checking actuators with different supervisory level of described checking actuator.
Preferably, described different place also comprises: third party's trusted party.
Owing to have employed technique scheme, the present invention have cost low, implement feature easily, effectively can take precautions against the problem that system of real name identity information was tampered, is forged, was acted as fraudulent substitute for a person (three prevent).
Accompanying drawing explanation
Fig. 1 is flow chart of the present invention.
Embodiment
Below in conjunction with accompanying drawing, embodiments of the invention are described in detail, but the multitude of different ways that the present invention can be defined by the claims and cover is implemented.
The uniqueness of biological characteristic and fail safe are the bases of authentication; the present invention is directed to the technical problems such as the collection of biological information, storage, conversion and protection; propose a kind of identity real name authentication method of graphic based code secret sharing mechanism; the method can protect biological information safely and effectively, makes it have uniqueness and fail safe.
Please refer to Fig. 1, the invention provides a kind of identity identifying method of graphic based code secret sharing mechanism, comprising:
Step 1, extracts the first biological information that first is verified people;
Step 2, is converted into first graphic code with symbolic logic form by described first biological information, wherein, the first graphic code is the password information with strict logical implication;
Step 3, described first graphic code is mapped to n part shadow secret and respectively by described shadow secure store in different places, read for when being verified people's authenticating identity.Adopt distributing storage scheme, by shadow secure store in different location (such as, can comprise and be verified people to hold a shadow secret, for Proactive authentication and passive checking), while the access of guarantee system safety, store the easy loss brought and the too large potential safety hazard of power to prevent to greatest extent concentrating.
Step 4, extracts the second biological information that second is verified people; Described second biological information is converted into the second graph code with symbolic logic form; T part shadow is chosen secret to reconstruct out described graphic code from described n part shadow secret;
Step 5, judge whether described second graph code is consistent with the described graphic code reconstructed, be only no less than t part shadow secret time just can obtain original graphic code, no person can not restructuring graph shape code, therefore, the loss of the privacy information of people be verified to protection and stolen special effect;
Step 6, if met, then judges that described first is verified people and described second and is verified artificial same people, otherwise judges that described first is verified people and described second and is verified two artificially different people.
In one embodiment, first, checking actuator utilizes physical characteristics collecting device to gather the first biological information that first is verified people, and carries out feature extraction and preliminary treatment to collected biological information, to be translated into the graphic code of symbolic logic form.Then, generate scheme according to selected graphic code, the biological information of extraction is converted to the graphic code with symbolic logic form, adopt graphic code to have many facilities, be easy to process, preserve, identify and share, and numerous being convenient to of application is promoted.Then, utilize selected (t, n) threshold secret sharing scheme, become by the graphic code information MAP of generation n part shadow secret, again by the different location that n part shadow of generation secret is stored in respectively, read and reconstruct when being verified people's authentication for first.Like this, collection and the protection stage of biological information is completed.
Upon the authentication, first, it is secret that checking actuator chooses arbitrarily t part shadow from n part shadow secret, utilizes secret sharing recovery scheme, reconstructs the password information with strict logical implication existed with graphic code form before sharing; Then utilize physical characteristics collecting device to gather the biological information that second is verified people, extract the second feature information of relevant position and carry out analyzing and preliminary treatment, and converting thereof into graphic code by graphic code conversion plan; Last carry out threshold value with the graphic code of reconstruct again and compare, if the two is not identical, then judge to be verified people verify invalid; If identical, by passing through checking.
Owing to have employed technique scheme, the present invention have cost low, implement feature easily, effectively can take precautions against the problem that system of real name identity information was tampered, is forged, was acted as fraudulent substitute for a person (three prevent).
In prior art, the biological information (such as finger print information etc.) being directly stored in verifying end is easy to lose or maliciously stolen, stealer can act as fraudulent substitute for a person to be verified people whereby, cause heavy losses, and the finger print information of authenticatee is limited, frequent replacing can not tackle the problem at its root.As can be seen here, the availability of original scheme, fail safe and operability are all very poor.
Below, for finger print information as a kind of biological information, technique scheme of the present invention is further described.
The present invention utilizes fingerprint collecting and transducer to be converted to by the finger print information being verified people to be easy to the graphic code reading and store; Adopt Hierarchical storage scheme on this basis, utilize secret sharing mechanism graphic code to be shared into the different location that n part shadow information is stored in checking actuator, when possessing t part shadow and being secret, the logical symbol information before secret sharing can be recovered completely.When needing to verify, more optional t part shadow is secret from n part storage location, and the graphic code information recovering fingerprint contrasts.Like this, when stealer's acquisition is less than t part shadow secret, it cannot obtain any information about graphic code, fundamentally ensure that the safety of the biometric templates being verified people, ensure that its reliability and security from the angle of secret sharing principle.Further, even if some stores, and catastrophic damage occurs, as long as still retain at least t part time, final restoration result would not be affected, thus, it stores system safely and efficiently and achieves highly reliable demand for security, can also ensure round-the-clock granted access, realize high security and high reliability develops simultaneously while guarantee system safety.
The invention reside in and the finger print information being verified people is carried out secret sharing, fully ensured the personal secrets of biological information etc., by it can more effectively solve privacy information lose, stolen, the security hidden trouble that causes such as to act as fraudulent substitute for a person.(various popular password, digital certificate, IC-card technology, USBKey, smart card, general biological characteristic comparison technology etc. is comprised) compared with existing identity identifying technology, the present invention instead of the equipment and material of high cost and the technology path of physical technology complexity with the secret sharing of low cost and graphic code technology path, so verification mode all has convenient cheap and precisely strict profit concurrently: particularly its fail safe aspect, can from the safety of guarantee information principle.Therefore, the present invention is particularly suitable for the high-level authentication application of system of real name authentication class, and it is low, widely applicable to realize cost.The dominant cost that beneficial effect of the present invention is paid is secret sharing expense in authentication mechanism, but due to finger print information amount general all little, so this cost possesses feasibility just for what application of fingerprint.
Preferably, described first biological information comprises any one or more in fingerprint, iris, DNA, face phase, face, retina, palm type, vocal print, handwritten signature, gait.
Preferably, described graphic code is printable or is printed on the machine recognition mark on soft certificate.Preferably, described graphic code comprises machine-readable character string, machine-readable character array, bar code, two-dimensional matrix code, two-dimensional bar, any one in three-dimensional colour graphic code.The present invention can according to the difference of amount of information size contained by concrete certificate classification, adopt the machine recognition mark with appropriate information capacity and recognition speed as the graphic code of indication of the present invention, be particularly suitable for when amount of information is larger adopting three-dimensional colour graphic code, not only memory capacity is large, and there is safety attractive in appearance, information is hidden etc. good characteristic.
Preferably, judge whether described second graph code is consistent with the described graphic code reconstructed and comprise: described second graph code is carried out threshold value with the described graphic code reconstructed and compares and decision-making, thus probability that can be certain accepts or refusal.
Preferably, adopt the euclidean geometry Space Program of the Lagrange interpolation polynomial secret sharing of Shamir mechanism, Blakley or carry out described mapping or reconstruct based on any one in array correcting and eleting codes.Especially, according to the difference of amount of information size and the difference of demand speed contained by concrete system of real name certification classification, the secret sharing mechanism adapted to most can be selected.
Such as, in (t, n) threshold secret sharing scheme of Shamir, it is made up of two parts: secret distribution protocol and secret reconstruct protocol.Wherein, secret distribution protocol, is undertaken sharing common n part shadow secret, issues n participant respectively by secret.Secret reconstruct protocol, then need to be no less than arbitrarily t participant and cooperate together, secret as input using the shadow of oneself, reconstructs original secret.Therefore, even if t-1 participant relies on the shadow secret oneself had to be conspired at the most, any information about original private cannot also be obtained.
Preferably, be mapped to by described first graphic code in the process of n part shadow secret, the temporary file of generation is not preserved, and destroys immediately after processing is completed, only keeps described n part shadow secret.Like this, can the fail safe of safeguards system.
Preferably, described different place comprises: the different location being verified people and multiple checking actuator.Preferably, described different place also comprises: third party's trusted party.
Preferably, the different location of described multiple checking actuator is multiple checking actuators with different supervisory level of described checking actuator.
Below, for finger print information, exemplary illustration is carried out to employing one embodiment of the present of invention.
One, fingerprint register collection and conversion
First, checking actuator to access mechanism or perform authentication function be verified people, implement the initial acquisition work of finger print information.Utilize fingerprint capturer to gather the finger print information being verified people, collected finger print information is extracted and preliminary treatment, be convenient to the graphic code being converted into symbolic logic message form.
Then, work out a kind of finger print information that can make and fill the coded program changing two-dimensional matrix code into, its input is the common computer code (as binary numeral string) of fingerprint feature information, through graphic code cataloged procedure, its Output rusults is special two-dimensional matrix code, it can be stored on computer disk, or display over the display (as on computer screen), also it can be printed or be printed on paper.
Two, graphic code secret sharing
The password graphic code information MAP of production becomes n part shadow secret by native system, n part shadow of generation secret is stored in respectively n diverse geographic location of checking actuator, reads for when being verified people's identity verification.Just can obtain the two-dimensional matrix code of original fingerprint when being only no less than t part shadow secret, no person can not reconstruct out.The loss of the privacy information of people is verified to protection and has stolen special effect.
Three, the secret distributing of shadow stores
Adopt distributing storage organization scheme, n part shadow secret is stored in respectively the different location of checking actuator, achieve highly reliable demand for security and store system safely and efficiently, be stored in different department by the dispersion of shadow secret (to comprise and be verified people and hold 1 part of shadow secret, for Proactive authentication and passive checking), round-the-clock granted access can also be ensured while guarantee system safety.
For bank, we adopt (3,5) threshold secret sharing scheme, the authentication information of depositor can be stored in the different institutions of bank, such as: store a in data center of head office, store a in the upper management mechanism (as: provincial branches) of branch, store a at third party's trusted party (as: Ministry of Public Security), store a in the branch opened an account, last depositor retains portion (can carry out active and passive double authentication, strengthen fail safe) again.Only with when 3 wherein part flock together, could completely recover, no person can not get any information about depositor.
Four, system of real name checking
First, checking actuator utilizes fingerprint capturer to gather the finger print information being verified people, extract individual features information, convert corresponding fingerprint two-dimensional matrix code information to, to carry out analyzing with the fingerprint two-dimensional matrix code information of preserving in database and to contrast.
Then, utilize (t, n) threshold secret sharing reconfiguration scheme, t part shadow is chosen arbitrarily secret from n part shadow secret, wherein comprise and be verified the hand-held a secret shadow of people, recover the password information with strict logical implication existed with two-dimensional matrix code form before sharing; Then graphic code is converted thereof into by graphic code conversion plan; Finally carry out threshold value with the graphic code of reconstruct again to compare, carry out authorizing or refusing with certain probability.
The present invention can utilize common PC computer, fingerprint capturer, graphic code message handler and multiple stage memory device to connect composition, can provide special product by equipment vendors.Wherein, graphic code message handler also or can have the universal products such as the mobile phone of data processing function to replace by palm PDA or computer or programmable calculator.
The invention has the beneficial effects as follows: the fail safe and the availability that ensure that fingerprint template (comprising other feature templates being verified people), and this fail safe and availability are decided by the principle of secret sharing mechanism, and have nothing to do with technical equipment.Therefore, accreditation of the present invention and verification technique are open, the soft hardware equipment adopted and technology implementation specification are all disclosed, this is more conducive to engineering construction and applies, and need not worry that outsider utilizes same equipment and technology illegally to make certificate or carries out checking deception, eliminate the negative effect caused by technology path (management not easily, high in cost of production) of " close could safety ".Therefore, the present invention is for improving normalization, the fail safe of soft certificate false proof system and being easy to operability and having very positive meaning.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. an identity identifying method for graphic based code secret sharing mechanism, is characterized in that, comprising:
Extract the first biological information that first is verified people;
Described first biological information is converted into first graphic code with symbolic logic form;
Described first graphic code is mapped to n part shadow secret and respectively by described shadow secure store in different places;
Extract the second biological information that second is verified people;
Described second biological information is converted into the second graph code with symbolic logic form;
T part shadow is chosen secret to reconstruct out described graphic code from described n part shadow secret;
Judge whether described second graph code is consistent with the described graphic code reconstructed;
If met, then judge that described first is verified people and described second and is verified artificial same people, otherwise judge that described first is verified people and described second and is verified two artificially different people.
2. method according to claim 1, is characterized in that, described first biological information comprises any one or more in fingerprint, iris, DNA, face phase, face, retina, palm type, vocal print, handwritten signature, gait.
3. according to the method described in claim 1 to 2, it is characterized in that, described graphic code is printable or is printed on the machine recognition mark on soft certificate.
4. the method according to claims 1 to 3, is characterized in that, described graphic code comprises machine-readable character string, machine-readable character array, bar code, two-dimensional matrix code, two-dimensional bar, any one in three-dimensional colour graphic code.
5. the method according to Claims 1-4, is characterized in that, judges whether described second graph code is consistent with the described graphic code reconstructed and comprises: described second graph code is carried out threshold value with the described graphic code reconstructed and compares and decision-making.
6. according to the method described in claim 1 to 5, it is characterized in that, adopt the euclidean geometry Space Program of the Lagrange interpolation polynomial secret sharing of Shamir mechanism, Blakley or carry out described mapping or reconstruct based on any one in array correcting and eleting codes.
7. according to the method described in claim 1 to 6, it is characterized in that, be mapped to by described first graphic code in the process of n part shadow secret, the temporary file of generation is not preserved, and destroys immediately after processing is completed, only keeps described n part shadow secret.
8. according to the method described in claim 1 to 6, it is characterized in that, described different place comprises: the different location being verified people and multiple checking actuator.
9. method according to claim 7, is characterized in that, the different location of described multiple checking actuator is multiple checking actuators with different supervisory level of described checking actuator.
10. method according to claim 7, is characterized in that, described different place also comprises: third party's trusted party.
CN201510470403.7A 2015-08-04 2015-08-04 Identity identifying method based on graphic code secret sharing mechanism Active CN105323072B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510470403.7A CN105323072B (en) 2015-08-04 2015-08-04 Identity identifying method based on graphic code secret sharing mechanism

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510470403.7A CN105323072B (en) 2015-08-04 2015-08-04 Identity identifying method based on graphic code secret sharing mechanism

Publications (2)

Publication Number Publication Date
CN105323072A true CN105323072A (en) 2016-02-10
CN105323072B CN105323072B (en) 2018-08-14

Family

ID=55249733

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510470403.7A Active CN105323072B (en) 2015-08-04 2015-08-04 Identity identifying method based on graphic code secret sharing mechanism

Country Status (1)

Country Link
CN (1) CN105323072B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109154802A (en) * 2016-03-31 2019-01-04 江森自控科技公司 HVAC device registration in distributed building management system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040172535A1 (en) * 2002-11-27 2004-09-02 Rsa Security Inc. Identity authentication system and method
CN1570962A (en) * 2004-04-26 2005-01-26 中国科学院成都计算机应用研究所 Soft certification anti-false method based on graphic code primary and secondary signet series information association mechanism
CN101753304A (en) * 2008-12-17 2010-06-23 中国科学院自动化研究所 Method for binding biological specificity and key

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040172535A1 (en) * 2002-11-27 2004-09-02 Rsa Security Inc. Identity authentication system and method
CN1570962A (en) * 2004-04-26 2005-01-26 中国科学院成都计算机应用研究所 Soft certification anti-false method based on graphic code primary and secondary signet series information association mechanism
CN101753304A (en) * 2008-12-17 2010-06-23 中国科学院自动化研究所 Method for binding biological specificity and key

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
唐聃 等: "基于编码理论的图像秘密分享技术研究", 《计算机应用与软件》 *
谢琪 等: "一种安全有效的(t,n)多秘密共享认证方案", 《电子与信息学报》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109154802A (en) * 2016-03-31 2019-01-04 江森自控科技公司 HVAC device registration in distributed building management system
US11768004B2 (en) 2016-03-31 2023-09-26 Johnson Controls Tyco IP Holdings LLP HVAC device registration in a distributed building management system

Also Published As

Publication number Publication date
CN105323072B (en) 2018-08-14

Similar Documents

Publication Publication Date Title
US20230325491A1 (en) Method and System for Securing User Access, Data at Rest and Sensitive Transactions Using Biometrics for Mobile Devices with Protected, Local Templates
Jain et al. Biometrics: a tool for information security
Galbally et al. Iris image reconstruction from binary templates: An efficient probabilistic approach based on genetic algorithms
CN102306305B (en) Method for authenticating safety identity based on organic characteristic watermark
KR20090110026A (en) Apparatus and method for polynomial reconstruction in fuzzy vault system
Malathi An integrated approach of physical biometric authentication system
Prasanalakshmi et al. Biometric cryptosystem involving two traits and palm vein as key
Murugesh Advanced biometric ATM machine with AES 256 and steganography implementation
CN107231240A (en) A kind of higher dual identity recognition methods of security
Goh et al. A framework for multimodal biometric authentication systems with template protection
Shankar et al. Providing security to land record with the computation of iris, blockchain, and one time password
Brindha Biometric template security using dorsal hand vein fuzzy vault
Meenakshi et al. Securing iris templates using combined user and soft biometric based password hardened fuzzy vault
CN202058159U (en) USB key
CN105323072B (en) Identity identifying method based on graphic code secret sharing mechanism
Roslan et al. Character property method for Arabic text steganography with biometric multifactor authentication using liveness detection
Shao et al. Template protection based on chaotic map for finger vein recognition
Sinduja et al. Sheltered iris attestation by means of visual cryptography (sia-vc)
Praseetha et al. Novel Web Service Based Fingerprint Identification Using Steganography and Xml Mining
Ashish et al. Biometric: fingerprints protection
KR100919486B1 (en) Method for aligning concealed fingerprint data using partial geometric hashing, Method for authenticating fingerprint data using partial geometric hashing, Apparatus and System thereof
Aithal A Study on Multifactor Authentication Model Using Fingerprint Hash Code, Password and OTP
Cimato et al. Biometrics and privacy
CN109787775A (en) A kind of safety certifying method based on Chen's chaotic system and finger vein auxiliary data
Kelkboom et al. On the performance of helper data template protection schemes

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant