CN105323072B - Identity identifying method based on graphic code secret sharing mechanism - Google Patents

Identity identifying method based on graphic code secret sharing mechanism Download PDF

Info

Publication number
CN105323072B
CN105323072B CN201510470403.7A CN201510470403A CN105323072B CN 105323072 B CN105323072 B CN 105323072B CN 201510470403 A CN201510470403 A CN 201510470403A CN 105323072 B CN105323072 B CN 105323072B
Authority
CN
China
Prior art keywords
graphic code
verified
code
people
parts
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510470403.7A
Other languages
Chinese (zh)
Other versions
CN105323072A (en
Inventor
袁德砦
张景中
蔡红亮
袁琦钊
滕鹏国
陈亮
王子伟
钟勇
王晓京
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Information Technology Co Ltd of CAS
Original Assignee
Chengdu Information Technology Co Ltd of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Information Technology Co Ltd of CAS filed Critical Chengdu Information Technology Co Ltd of CAS
Priority to CN201510470403.7A priority Critical patent/CN105323072B/en
Publication of CN105323072A publication Critical patent/CN105323072A/en
Application granted granted Critical
Publication of CN105323072B publication Critical patent/CN105323072B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

A kind of identity identifying method based on graphic code secret sharing mechanism, including:Extraction first is verified the first biological information of people;Convert first biological information to the first graphic code with symbolic logic form;First graphic code is mapped to n parts of shadows secrets and respectively by the shadow secure store in different places;Extraction second is verified the second biological information of people;Convert second biological information to the second graph code with symbolic logic form;T parts of shadow secrets are chosen from the n parts of shadow secret to be reconstructed into out the graphic code;Judge whether the second graph code is consistent with the graphic code reconstructed;If met, judge that described first is verified people and is verified artificial same people with described second, otherwise judges that described first is verified people and is verified two artificially different people with described second.The present invention effectively guards against the problem of system of real name identity information is tampered, is forged, being acted as fraudulent substitute for a person.

Description

Identity identifying method based on graphic code secret sharing mechanism
Technical field
The present invention relates to field of identity authentication, more particularly to a kind of authentication side based on graphic code secret sharing mechanism Method.
Background technology
Identity real name certification is using the proprietary Verification System for possessing registration user information to wanting to access Individual carries out the process of the judgement processing of identity.System of real name authentication is to provide the certification to system visitor's true identity, It is mainly used for the access for preventing unauthorized user to system resource.Usually with electronic technology, biotechnology or electronic technology With the authenticity of biotechnology combination Certificate Authority user identity.Used in the certification relationship of voucher and user divides, identity Certification can be divided into three classes:Label certification and user biological feature verification are held in certification, user known to user.
Common identity real name authentication techniques mainly have following a few classes or in which classes of combination:
1. being authenticated with known things
Knowledge based engineering method determines identity.Such as:Password and PIN code, the secrecy of password and PIN code that user uses Property be capable of safety progress authentication necessary guarantee.
2. being authenticated with the article possessed
Identity is determined based on the method for password board.Such as:The various certificates, passport, intelligence for being able to demonstrate that identity of user Energy card (static and dynamic), digital certificate, USB Key certifications or identity card etc..The shortcomings that this method is when token is careless Lose or replicated by malicious person and when usurping, just can not guarantee information system stability and safety.
3. carrying out the certification of identity with biological distinctive feature itself
Identity is determined based on the method for biological characteristic.Biological characteristic for certification generally have palmmprint, fingerprint, face with And iris etc..Generality, invariance and the irreplaceability of biological characteristic all make the system being authenticated using biological characteristic With high security and high confidentiality.
It is the tightest to carry out authentication using biological information for the above three classes system of real name identity identifying method of Integrated comparative It is close.Because the carry-on property of biological characteristic, safety, uniqueness, stability, popularity, convenience, can collectivity, acceptability, The features such as generality and irreplaceability, being all can be as the unique mark of bion.Utilize living things feature recognition user Identity be it is safe and reliable, especially with iris carry out authentication odds ratio fingerprint and the other manners such as face it is more, Securely and reliably transreplication, information content do not compare rich fingerprint to iris.Iris will not can be blocked as face feature by expression, jewelry And the influence of the multiple factors such as background complexity, recognition efficiency higher.
Although having higher peace compared to traditional authentication using the method that biological characteristic carries out authenticating user identification Quan Xing but ensures that the safety of biological characteristic itself but becomes the emphasis of authentication, once the life for authentication Object feature templates are under attack or malice distorts destruction, and the confidence level and accuracy of Verification System will substantially reduce, the whole series system System will lose the reliability of authentication.Although having numerous algorithms and scheme for biometric templates protection, effect Fruit is all less desirable, and safety problem still becomes increasingly conspicuous.How to seek a kind of safe and practical protection scheme, is then wherein pole Have challenge and urgent pending project, while being also place of the motivation and purpose of this patent, especially to financial industry with Personal secret protection has special significance.
In conclusion the progress with rapid changepl. never-ending changes and improvements relative to information technology and internet, existing identity real name authentication techniques Apparent lag, loophole are larger, cause identity to be distorted and forge and illegally use abnormal rampant, this positive prestige of the activity of other people identity documents Xie Zhe modern societies credit system and sincerity safety.How technically to ensure system of real name authentication legitimacy (including:It protects The integrality-for demonstrate,proving its content is anti-tamper;Ensure the authenticity and authority-anti-counterfeiting of its content), system of real name use it is available The technology decidability of property (tamper-proof, anti-lost) and legitimacy, this is still not solved very well in identity real name technology Three big basic problems certainly.
Invention content
The object of the present invention is to provide a kind of with body at low cost, that implementation is easily based on graphic code secret sharing mechanism Identity authentication method, the problem of being tampered, be forged with effectively guarding against system of real name identity information, being acted as fraudulent substitute for a person.
The present invention provides a kind of identity identifying methods based on graphic code secret sharing mechanism, including:Extract the first quilt The first biological information of identifier;Convert first biological information to the first figure with symbolic logic form Shape code;First graphic code is mapped to n parts of shadows secrets and respectively by the shadow secure store in different places;It carries Take the second the second biological information for being verified people;Second biological information is converted with symbolic logic form to Second graph code;T parts of shadow secrets are chosen from the n parts of shadow secret to be reconstructed into out the graphic code;Described in judgement Whether second graph code is consistent with the graphic code reconstructed;If met, judge that described first is verified people and institute It states second and is verified artificial same people, otherwise judge that described first is verified people and is verified artificially different two with described second People.
Preferably, first biological information includes fingerprint, iris, DNA, face phase, face, retina, palm shape, sound Line, handwritten signature, gait any one or more of.
Preferably, the graphic code is machine recognition mark that is printable or being printed on soft certificate.
Preferably, the graphic code includes machine-readable character string, machine-readable character array, bar code, two-dimensional matrix code, two-dimensional strip Shape code, any one in three-dimensional colour graphic code.
Preferably, judge the second graph code whether be consistent with the graphic code reconstructed including:By described Two graphic codes and the graphic code reconstructed carry out threshold value comparison and decision.
Preferably, the euclidean geometry using the Lagrange interpolation polynomial secret sharings mechanism of Shamir, Blakley is empty Between scheme or described mapping or reconstruct are carried out based on any one in array correcting and eleting codes.
Preferably, during first graphic code being mapped to n parts of shadow secrets, the temporary file of generation without It preserves, destroys immediately after processing is completed, only keep the n parts of shadow secret.
Preferably, the different place includes:It is verified the different location of people and multiple verification executing agencies.
Preferably, the different location of the multiple verification executing agency is the verification executing agency with different management Multiple verification executing agencies of rank.
Preferably, the different place further includes:Third party's trusted party.
By adopting the above-described technical solution, the present invention has the characteristics that at low cost, implementation is convenient, reality can be effectively guarded against The problem of name identity information processed is tampered, is forged, being acted as fraudulent substitute for a person (three proofings).
Description of the drawings
Fig. 1 is the flow chart of the present invention.
Specific implementation mode
The embodiment of the present invention is described in detail below in conjunction with attached drawing, but the present invention can be defined by the claims Implement with the multitude of different ways of covering.
The uniqueness of biological characteristic and safety are the bases of authentication, and the present invention is adopted for biological information A kind of technical problems such as collection, storage, conversion and protection, it is proposed that identity real name certification based on graphic code secret sharing mechanism Method, this method can safely and effectively protect biological information, make it have uniqueness and safety.
Referring to FIG. 1, the present invention provides a kind of identity identifying methods based on graphic code secret sharing mechanism, including:
Step 1, extraction first is verified the first biological information of people;
Step 2, first biological information is converted to the first graphic code with symbolic logic form, wherein First graphic code is the password information with strict logical meaning;
Step 3, that first graphic code is mapped to n parts of shadows is secret and respectively by the shadow secure store in difference Place, read when people's authenticating identity for being verified.Using distributing storage scheme, i.e., by shadow secure store in differently Point (such as, it may include it is verified people and holds a shadow secret, for Proactive authentication and passive verification), in guarantee system safety While access, with the security risk for preventing the centrally stored easy to be lost and power brought excessively big to greatest extent.
Step 4, extraction second is verified the second biological information of people;It converts second biological information to Second graph code with symbolic logic form;It is described to be reconstructed into out that t parts of shadow secrets are chosen from the n parts of shadow secret Graphic code;
Step 5, judge whether the second graph code is consistent with the graphic code reconstructed, only no less than t parts Original graphic code can be just obtained when shadow secret, no person cannot reconstruct graphic code, therefore, the privacy of people is verified to protection The loss of information and special effect is stolen;
Step 6, if met, judge that described first is verified people and is verified artificial same people with described second, otherwise Judge that described first is verified people and is verified artificial two different people from described second.
In one embodiment, first, verification executing agency is verified the of people using physical characteristics collecting device pair first One biological information is acquired, and carries out feature extraction and pretreatment to collected biological information, so as to by its It is converted into the graphic code of symbolic logic form.Then, scheme is generated according to selected graphic code, by the biological information of extraction It is converted into the graphic code with symbolic logic form, there are many facilities using graphic code, be easily handled, preserve, identify and divide It enjoys, and application field is numerous convenient for popularization etc..Then, using selected (t, n) threshold secret sharing scheme, by the figure of generation Code information MAP is secret at n parts of shadows, then the different location that n part shadow secrets of generation are stored respectively in, and is tested for first It reads and reconstructs when witness's authentication.In this way, completing acquisition and the protection stage of biological information.
Upon the authentication, first, verification executing agency arbitrarily chooses t parts of shadows secrets from n parts of shadow secrets, utilizes secret Share recovery scheme, reconstruct before sharing in the form of graphic code existing for strict logical meaning password information;So The biological information for being verified people using physical characteristics collecting device pair second afterwards is acquired, and extract corresponding position second is special Reference ceases and is analyzed and pre-processed, and converts thereof into graphic code by graphic code conversion plan;Finally again with reconstruct Graphic code carries out threshold value comparison, if the two differs, it is invalid that judgement is verified people's verification;If identical, by passing through verification.
By adopting the above-described technical solution, the present invention has the characteristics that at low cost, implementation is convenient, reality can be effectively guarded against The problem of name identity information processed is tampered, is forged, being acted as fraudulent substitute for a person (three proofings).
In the prior art, the biological information (such as finger print information etc.) for being directly stored in verifying end be easily lost or It is maliciously stolen, stealer can act as fraudulent substitute for a person to be verified people whereby, cause heavy losses, and the finger print information of authenticatee has Limit, frequently replacing cannot tackle the problem at its root.It can be seen that the availability of original scheme, safety and operability are all It is very poor.
In the following, for using finger print information as a kind of biological information, to above-mentioned technical proposal of the present invention into advancing one Walk explanation.
The finger print information for being verified people using fingerprint collecting and converter is converted into being easy to read and be stored by the present invention Graphic code;Hierarchical storage scheme is used on this basis, and graphic code is shared into n parts of shadow informations using secret sharing mechanism It is stored in the different location of verification executing agency, when having t parts of shadow secrets, you can recover patrolling before secret sharing completely Collect symbolic information.When being verified, then optional t parts of shadows are secret from n parts of storage locations, recover the graphic code of fingerprint Information is compared.In this way, when stealer obtains and is less than t parts of shadow secrets, it is unable to get any letter about graphic code Breath, fundamentally ensure that the safety for being verified the biometric templates of people, ensure that it can from the angle of secret sharing principle By property and safety.Further, even if catastrophic damage occurs for certain storages, as long as still retain at least t parts, no Final restoration result can be influenced, thus, safely and efficiently storing system realizes highly reliable demand for security, is ensureing system It can also ensure that round-the-clock mandate accesses while safe, realize that high security develops simultaneously with high reliability.
The invention reside in the finger print informations that will be verified people to carry out secret sharing, has fully ensured biological information etc. Personal secrets can more efficiently solve security risk caused by privacy information is lost, is stolen, acts as fraudulent substitute for a person etc. by it and ask Topic.Compared with existing identity identifying technology (including the password of various prevalences, digital certificate, IC card technology, USB Key, intelligence Card, general biological characteristic comparison technology etc.), the present invention is inherently with the secret sharing of low cost and graphic code technology road Line facilitates inexpensively instead of the technology path of high-cost equipment and material and physical technology complexity so verification mode all has concurrently With accurate stringent profit:Especially in terms of its safety, it can ensure the safety of information from principle.Therefore, the present invention is special It is suitble to the high-level authentication application of system of real name authentication class, and cost of implementation is low, widely applicable.Beneficial effects of the present invention The dominant cost paid is secret sharing expense in authentication mechanism, but generally all less due to finger print information amount, so this For fingerprint, what application has feasibility to cost just.
Preferably, first biological information includes fingerprint, iris, DNA, face phase, face, retina, palm shape, sound Line, handwritten signature, gait any one or more of.
Preferably, the graphic code is machine recognition mark that is printable or being printed on soft certificate.Preferably, the figure Shape code includes machine-readable character string, machine-readable character array, bar code, two-dimensional matrix code, two-dimensional bar, in three-dimensional colour graphic code Any one.The present invention can be according to the difference of specific certificate classification information contained amount size, using with appropriate information capacity Machine recognition mark with recognition rate is particularly suitable for when information content is larger using three-dimensional as signified graphic code of the invention Cromogram shape code, not only memory capacity is big, but also the good characteristic hidden etc. with beautiful safety, information.
Preferably, judge the second graph code whether be consistent with the graphic code reconstructed including:By described Two graphic codes and the graphic code reconstructed carry out threshold value comparison and decision, receive or refuse so as to certain probability Absolutely.
Preferably, the euclidean geometry using the Lagrange interpolation polynomial secret sharings mechanism of Shamir, Blakley is empty Between scheme or described mapping or reconstruct are carried out based on any one in array correcting and eleting codes.It particularly, can be according to specific system of real name The difference of certification classification information contained amount size and the difference of demand speed, select most adaptable secret sharing mechanism.
For example, in (t, n) threshold secret sharing scheme of Shamir, it consists of two parts:Secret distribution protocol and Secret reconstruct agreement.Wherein, secret is carried out sharing total n parts of shadow secret, is respectively issued to n participant by secret distribution protocol. Secret reconstruct agreement, then need arbitrarily be no less than t participant and cooperate together, using the shadow secret of oneself as inputting, reconstructs Go out original secret.It therefore, even if can not at most t-1 participant relies on the shadow secret oneself possessed to be conspired yet Obtain any information about original private.
Preferably, during first graphic code being mapped to n parts of shadow secrets, the temporary file of generation without It preserves, destroys immediately after processing is completed, only keep the n parts of shadow secret.In this way, can safeguards system safety.
Preferably, the different place includes:It is verified the different location of people and multiple verification executing agencies.It is preferred that Ground, the different place further include:Third party's trusted party.
Preferably, the different location of the multiple verification executing agency is the verification executing agency with different management Multiple verification executing agencies of rank.
In the following, by taking finger print information as an example, one embodiment using the present invention is illustrated.
One, fingerprint register acquisition and conversion
First, verification executing agency is verified people to accessing mechanism or executing authentication function, implements finger print information Initial acquisition works.The finger print information for being verified people is acquired using fingerprint capturer, to collected finger print information into Row extraction and pretreatment, convenient for being converted into the graphic code of symbolic logic message form.
Then, a kind of coded program that finger print information dress can be made to change two-dimensional matrix code into is worked out, input is fingerprint spy The common computer code (such as binary number sequence) of reference breath, through graphic code cataloged procedure, output is the result is that special two Square matrix code is tieed up, can be stored it on computer disk, or display can also print it over the display (such as on computer screen) Or it is printed on paper.
Two, graphic code secret sharing
This system is secret at n parts of shadows by the password graphic code information MAP of production, and n part shadow secrets of generation are distinguished It is stored in n diverse geographic location of verification executing agency, is read for being verified when people verifies identity.Only it is no less than t parts of shadows The two-dimensional matrix code of original fingerprint can be just obtained when sub-secret, no person, which cannot reconstruct, to come.The hidden of people is verified to protection The loss and stolen special effect that personal letter ceases.
Three, shadow secret distributing stores
Using distributing storage organization scheme, n parts of shadow secrets are stored respectively in the different location of verification executing agency, Highly reliable demand for security and safe and efficient storage system are realized, i.e., the dispersion of shadow secret is stored in different departments (including be verified people and hold 1 part of shadow secret, for Proactive authentication and passive verification), may be used also while ensureing that system is safe To ensure that round-the-clock mandate accesses.
By taking bank as an example, we use (3,5) threshold secret sharing scheme, can store the authentication information of depositor In the different institutions of bank, such as:Stored in data center of head office it is a, branch upper management mechanism (such as:Save fraction Row) storage is a, third party's trusted party (such as:The Ministry of Public Security) storage portion, a, last depositor is stored in the branch to open an account Retain again a (actively and passively double authentication can be carried out, enhance safety).Only flocked together with when 3 parts therein When, it could completely recover, no person cannot be about any information of depositor.
Four, system of real name is verified
First, verification executing agency is acquired the finger print information for being verified people using fingerprint capturer, and extraction is corresponding Characteristic information is converted into corresponding fingerprint two-dimensional matrix code information, to believe with the fingerprint two-dimensional matrix code preserved in database Breath is analyzed and is compared.
Then, (t, n) threshold secret sharing reconfiguration scheme is utilized, it is secret that t parts of shadows are arbitrarily chosen from n parts of shadow secrets It is close, wherein comprising a secret shadow of human hand held is verified, recover before sharing in the form of two-dimensional matrix code existing for Password information with strict logical meaning;Then graphic code is converted thereof by graphic code conversion plan;Finally again with again The graphic code of structure carries out threshold value comparison, is authorized or is refused with certain probability.
The present invention can utilize common PC computers, fingerprint capturer, graphic code message handler and Duo Tai storage devices to join Knot composition, can provide special product by equipment vendors.Wherein, graphic code message handler can also be by palm PDA or computer Or the universal products such as programmable calculator or the mobile phone that has data processing function replace.
The beneficial effects of the invention are as follows:Ensure the safety of fingerprint template (including being verified other feature templates of people) With availability, and this safety and availability are determined by the principle of secret sharing mechanism, and and technical equipment It is unrelated.Therefore, accreditation of the present invention and verification technique are open, and the soft hardware equipment and technology implementation specification of use all give public affairs It opens, this is more advantageous to engineering construction and popularization and application, and does not have to concern that outsider utilizes same equipment and the non-legal system of technology Make certificate or carry out verification deception, eliminate caused by the technology path of " closing could safety " negative effect (management is not easy, It is of high cost etc.).Therefore, the present invention has improve soft certificate false proof system very much normalization, safety and easily operated property Positive meaning.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, any made by repair Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.

Claims (10)

1. a kind of identity identifying method based on graphic code secret sharing mechanism, which is characterized in that including:
Extraction first is verified the first biological information of people;
Convert first biological information to the first graphic code with symbolic logic form;
First graphic code is mapped to n parts of shadows secrets and respectively by the shadow secure store in different places;
Extraction second is verified the second biological information of people;
Convert second biological information to the second graph code with symbolic logic form;
T parts of shadow secrets are chosen from the n parts of shadow secret to be reconstructed into out the graphic code;
Judge whether the second graph code is consistent with the graphic code reconstructed;
If met, judge that described first is verified people and is verified artificial same people with described second, otherwise judges described the One is verified people is verified artificial two different people from described second.
2. according to the method described in claim 1, it is characterized in that, first biological information include fingerprint, iris, DNA, face phase, face, retina, palm shape, vocal print, handwritten signature, gait any one or more of.
3. according to the method described in claim 1, it is characterized in that, the graphic code is printable or is printed on soft certificate Machine recognition mark.
4. according to the method described in claim 1, it is characterized in that, the graphic code includes machine-readable character string, machine-readable symbol battle array Any one in row, bar code, two-dimensional matrix code, two-dimensional bar, three-dimensional colour graphic code.
5. according to the method described in claim 1, it is characterized in that, the figure for judging the second graph code and reconstructing Code whether be consistent including:The second graph code and the graphic code reconstructed are subjected to threshold value comparison and decision.
6. according to the method described in claim 1, it is characterized in that, the Lagrange interpolation polynomial secrets using Shamir are divided It enjoys mechanism, the euclidean geometry Space Program of Blakley, carry out described mapping based on any one in array correcting and eleting codes or again Structure.
7. according to the method described in claim 1, it is characterized in that, that first graphic code is mapped to n parts of shadows is secret In the process, the temporary file of generation is destroyed without preserving, only keeps the n parts of shadow secret immediately after processing is completed.
8. according to the method described in claim 1, it is characterized in that, the different place includes:It is verified people and multiple tests Demonstrate,prove the different location of executing agency.
9. according to the method described in claim 8, it is characterized in that, the different location of the multiple verification executing agency is described Verify multiple verification executing agencies with different supervisory levels of executing agency.
10. according to the method described in claim 8, it is characterized in that, the different place further includes:During third party is credible The heart.
CN201510470403.7A 2015-08-04 2015-08-04 Identity identifying method based on graphic code secret sharing mechanism Active CN105323072B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510470403.7A CN105323072B (en) 2015-08-04 2015-08-04 Identity identifying method based on graphic code secret sharing mechanism

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510470403.7A CN105323072B (en) 2015-08-04 2015-08-04 Identity identifying method based on graphic code secret sharing mechanism

Publications (2)

Publication Number Publication Date
CN105323072A CN105323072A (en) 2016-02-10
CN105323072B true CN105323072B (en) 2018-08-14

Family

ID=55249733

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510470403.7A Active CN105323072B (en) 2015-08-04 2015-08-04 Identity identifying method based on graphic code secret sharing mechanism

Country Status (1)

Country Link
CN (1) CN105323072B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109154802A (en) * 2016-03-31 2019-01-04 江森自控科技公司 HVAC device registration in distributed building management system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1570962A (en) * 2004-04-26 2005-01-26 中国科学院成都计算机应用研究所 Soft certification anti-false method based on graphic code primary and secondary signet series information association mechanism
CN101753304A (en) * 2008-12-17 2010-06-23 中国科学院自动化研究所 Method for binding biological specificity and key

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1570442A2 (en) * 2002-11-27 2005-09-07 RSA Security Inc. Identity authentication system and method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1570962A (en) * 2004-04-26 2005-01-26 中国科学院成都计算机应用研究所 Soft certification anti-false method based on graphic code primary and secondary signet series information association mechanism
CN101753304A (en) * 2008-12-17 2010-06-23 中国科学院自动化研究所 Method for binding biological specificity and key

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
一种安全有效的(t,n)多秘密共享认证方案;谢琪 等;《电子与信息学报》;20050930;第27卷(第9期);全文 *
基于编码理论的图像秘密分享技术研究;唐聃 等;《计算机应用与软件》;30130930;第30卷(第9期);全文 *

Also Published As

Publication number Publication date
CN105323072A (en) 2016-02-10

Similar Documents

Publication Publication Date Title
Jain et al. Biometrics: a tool for information security
Galbally et al. Iris image reconstruction from binary templates: An efficient probabilistic approach based on genetic algorithms
Zorkadis et al. On biometrics‐based authentication and identification from a privacy‐protection perspective: Deriving privacy‐enhancing requirements
CN103699995A (en) Payment authentication method based on fingerprints and finger veins
Sabena et al. A review of vulnerabilities in identity management using biometrics
CN108960039A (en) A kind of irreversible fingerprint template encryption method based on symmetrical hash
Prasad et al. A study on multifactor authentication model using fingerprint hash code, password and OTP
Lone et al. A novel OTP based tripartite authentication scheme
Smith Biometric solutions to identity-related cybercrime
CN106022037A (en) Financial terminal authentication method and device
Brindha Biometric template security using dorsal hand vein fuzzy vault
Shankar et al. Providing security to land record with the computation of iris, blockchain, and one time password
CN105323072B (en) Identity identifying method based on graphic code secret sharing mechanism
CN202058159U (en) USB key
Pierce et al. A conceptual model for graphical authentication
CN105893819B (en) A kind of follow-on fingerprint identification method and system based on redundancy incorrect order permutation algorithm
Roy et al. Detection of bifurcation angles in a retinal fundus image
Seto Development of personal authentication systems using fingerprint with smart cards and digital signature technologies
Sinduja et al. Sheltered iris attestation by means of visual cryptography (sia-vc)
Ashish et al. Biometric: fingerprints protection
Cimato et al. Biometrics and privacy
CN109787775A (en) A kind of safety certifying method based on Chen's chaotic system and finger vein auxiliary data
Kelkboom et al. On the performance of helper data template protection schemes
Rudrakshi et al. A model for secure information storage and retrieval on cloud using multimodal biometric cryptosystem
Sharma et al. A survey on blockchain deployment for biometric systems

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant