CN105978889B - Biological feature encryption method and device - Google Patents

Biological feature encryption method and device Download PDF

Info

Publication number
CN105978889B
CN105978889B CN201610448166.9A CN201610448166A CN105978889B CN 105978889 B CN105978889 B CN 105978889B CN 201610448166 A CN201610448166 A CN 201610448166A CN 105978889 B CN105978889 B CN 105978889B
Authority
CN
China
Prior art keywords
biological characteristic
encryption
biological
algorithm
plain text
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610448166.9A
Other languages
Chinese (zh)
Other versions
CN105978889A (en
Inventor
张国栋
朱博
高兴波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chipone Technology Beijing Co Ltd
Original Assignee
Chipone Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chipone Technology Beijing Co Ltd filed Critical Chipone Technology Beijing Co Ltd
Priority to CN201610448166.9A priority Critical patent/CN105978889B/en
Publication of CN105978889A publication Critical patent/CN105978889A/en
Application granted granted Critical
Publication of CN105978889B publication Critical patent/CN105978889B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3278Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

Disclose a kind of biological feature encryption method, comprising: obtain the biological information of user;Biological characteristic is generated in plain text according to the biological information;To the biological characteristic, encryption generates biological characteristic ciphertext to biological characteristic plaintext biological characteristic ciphertext in plain text in such a way that hardware encrypts.The present invention also provides a kind of biological feature encryption devices, the biological information of user is realized by hardware encryption circuit and is encrypted, dependence of the algorithm to processor is reduced, realizes encryption, the safety and efficiency of improve data transfer in same chip to realize.

Description

Biological feature encryption method and device
Technical field
The invention belongs to living things feature recognition fields, more particularly, to a kind of biological feature encryption method and device.
Background technique
With the development of electronic technology, biometrics identification technology has been widely used in Intelligent mobile equipment, with intelligence For energy mobile phone, living things feature recognition has become mainstream configuration.Currently, living things feature recognition chip is as an independent module Applied in smart machine.Living things feature recognition chip collects the biological information of user in advance, and biological characteristic is believed Breath is stored in handset processes chip.In Qualify Phase, user inputs biological information, the biological information inputted and Default fingerprint feature information is compared;If be proved to be successful, unlock can be completed.
During current living things feature recognition, the biological information of living things feature recognition chip acquisition is without adding It is close, it is transmitted directly to cell phone processor or third-party application.What this just considerably increased personal biology characteristics information leakage can It can property.
Summary of the invention
The purpose of the present invention is to provide a kind of biological feature encryption method and devices.
According to an aspect of the present invention, a kind of biological feature encryption method is provided, comprising: obtain the biological characteristic letter of user Breath;Biological characteristic is generated in plain text according to the biological information;The biological characteristic is added in plain text in a manner of hardware encryption It is dense at biological characteristic ciphertext.
Preferably, generating biological characteristic in plain text according to the biological information includes: that will carry the biological characteristic to believe The analog signal of breath is converted into digital signal, wherein the digital signal is expressed as character string;The number that analog-to-digital conversion is generated Word signal is verified;The digital signal after verification is subjected to pretreatment and generates biological characteristic in plain text.
Preferably, in a manner of hardware encryption to the biological characteristic in plain text encryption generate biological characteristic ciphertext include: by Biological characteristic is divided into multiple sub- character strings in plain text;Multiple sub- character strings are passed sequentially through into hardware encryption circuit and generate biology spy Levy ciphertext.
Preferably, the Encryption Algorithm for hardware encryption includes algorithm, symmetric cryptography based on physics unclonable function Algorithm, rivest, shamir, adelman, hash algorithm.
Preferably, the Encryption Algorithm for hardware encryption includes national secret algorithm.
According to another aspect of the present invention, a kind of biological feature encryption device is provided, comprising: acquisition module, for obtaining The biological information of user;Processing module, for generating biological characteristic in plain text according to the biological information;Encrypt mould Block generates biological characteristic ciphertext for the biological characteristic to be carried out to encryption in plain text;Wherein, the encrypting module is encrypted with hardware Mode the biological characteristic is encrypted in plain text.
Preferably, the processing module includes: AD conversion unit, for that will carry the simulation of the biological information Signal is converted into digital signal, wherein the digital signal is expressed as character string;Verification unit, for analog-to-digital conversion list The digital signal that member generates is verified;Pretreatment unit generates biology for the digital signal after verification to be carried out pretreatment Feature is in plain text.
Preferably, the encrypting module includes: grouped element, for pretreated digital signal to be divided into multiple sub- words Accord with sequence;Encryption unit generates biological characteristic ciphertext for multiple sub- character strings to be passed sequentially through hardware encryption circuit.
Preferably, the Encryption Algorithm for hardware encryption includes algorithm, symmetric cryptography based on physics unclonable function Algorithm, rivest, shamir, adelman, hash algorithm.
Preferably, the algorithm based on physics unclonable function is real by the unclonable hardware encryption circuit of physics It is existing.
Preferably, the unclonable hardware encryption circuit of the physics includes multiple identical switch units, for according to institute Biological characteristic plaintext gating signal transmission path is stated, and biological characteristic ciphertext is generated according to the signal transmission path of gating.
Preferably, the unclonable hardware encryption circuit of the physics include multiple ring oscillators, selector, counter and Comparator, for according to biological characteristic selection two of them ring oscillator in plain text, and according to two ring oscillators Frequency generates biological characteristic ciphertext.
Preferably, the Encryption Algorithm for hardware encryption includes national secret algorithm.
Biological feature encryption method and device provided by the invention encrypts electricity by hardware to the biological information of user Encryption is realized on road, reduces dependence of the algorithm to processor, and encryption is realized in same chip to realize, is improved data and is passed Defeated safety and efficiency.
Detailed description of the invention
By referring to the drawings to the description of the embodiment of the present invention, above-mentioned and other purposes of the invention, feature and Advantage will be apparent from, in the accompanying drawings:
Fig. 1 shows the flow chart of biological feature encryption method according to an embodiment of the present invention;
Fig. 2 shows the structural schematic diagrams of biological feature encryption device according to an embodiment of the present invention;
Fig. 3 shows the schematic diagram of the arbitration unclonable hardware encryption circuit of type physics according to an embodiment of the present invention;
Fig. 4 shows the principle of the unclonable hardware encryption circuit of ring oscillation type physics according to an embodiment of the present invention Figure.
Specific embodiment
The various embodiments that the present invention will be described in more detail that hereinafter reference will be made to the drawings.In various figures, identical element It is indicated using same or similar appended drawing reference.For the sake of clarity, the various pieces in attached drawing are not necessarily to scale.
The present invention can be presented in a variety of manners, some of them example explained below.
Fig. 1 shows the flow chart of biological feature encryption method according to an embodiment of the present invention.As described in Figure 1, the life Object feature encryption method includes the following steps.
In step S01, the biological information of user is obtained.
In the present embodiment, the biological information of user is acquired by sensitive zones.Wherein, the biological information It is collected with image analoging signal.
The biological attribute data can be single biological attribute data or multi-biological characteristic data, as texture (including fingerprint, Palmmprint, vein and associated satellite feature, such as pore), biomembrane (such as iris, retina), face, ear canal, voice, body Shape, personal habits (such as the dynamics and frequency, signature, gait for tapping keyboard) etc..
In step S02, biological characteristic is generated in plain text according to the biological information.
In the present embodiment, step S02 includes: that the biological information is converted into digital signal by analog signal, Wherein, the digital signal is expressed as character string;The digital signal generated to AD conversion unit verifies;After verifying The digital signal carry out pretreatment generate biological characteristic in plain text.
Specifically, it firstly, collected analog signal is converted into digital signal, stores in memory, the number of storage Word signal is a binary-coded character sequence, the gray value for Characterize fingerprints image.Further, school is carried out to the digital signal It tests, eliminates the error in conversion process.Further, the digital signal after verification is carried out using the operation such as moving to left, move to right, negate Processing eliminates user in typing fingerprint, the excessive or insufficient problem of pressing dynamics.
In step S03, to the biological characteristic, encryption generates biological characteristic ciphertext in plain text in a manner of hardware encryption.
In the present embodiment, by biological characteristic in plain text be divided into multiple sub- character strings, then by multiple sub- character strings according to It is secondary that biological characteristic ciphertext is generated by hardware encryption circuit.Wherein, encrypted character string is biological characteristic ciphertext.Encryption Algorithm include algorithm based on physics unclonable function, aes algorithm, DES algorithm, 3DES algorithm, RSA Algorithm, national secret algorithm, Hash algorithm.
In a preferred embodiment, hardware encryption circuit can pass through physics unclonable function (Physical Unclonable Function, PUF) it realizes, on piece PUF is a kind of to be produced using process variations in ic manufacturing process The mechanism of raw uniqueness excitation-response pair.PUF have persistence, unpredictability, nonclonability and can not tamper etc. it is excellent Point.Currently, PUF circuit have diversified forms, be usually used in integrated circuit fields has: arbitration type PUF (Arbiter PUF) and Ring oscillation type PUF (Ring Oscillator PUF, RO PUF).
Biological characteristic is divided into the M sub- character strings that length is N in plain text (sequence length P), if P=N × M, N, M are equal For the positive integer greater than 1, then the sub- character string of M group can be obtained, if P cannot be evenly divisible by N, last is organized sub- character string and adds Spot patch is neat.Specifically, such as P=255, N=32, then last group only has 7 characters, and needing to add 10 and mending into length is 8 Sub- character string, and the excitation as PUF hardware encryption circuit, are sequentially inputted in PUF encrypted circuit, what PUF circuit generated Response character sequence, this encrypted character string are known as biological characteristic ciphertext.Wherein, length N is according to hardware encryption circuit Structure depending on, the size of response character sequence can pass through modification hardware encryption circuit adjustment according to actual needs.
Biological feature encryption method provided by the invention realizes the biological information of user by hardware encryption circuit Encryption, reduces dependence of the algorithm to processor, and encryption, the peace of improve data transfer are realized in same chip to realize Full property and efficiency.
Fig. 2 shows the structural schematic diagrams of biological feature encryption device provided in an embodiment of the present invention.As shown in Fig. 2, institute Show that biological feature encryption device includes acquisition module 10, processing module 20 and encrypting module 30.
Wherein, acquisition module 10 is used to obtain the biological information of user.
In the present embodiment, acquisition module 10 acquires the biological information of user by sensitive zones.Wherein, the life Object characteristic information is collected with image analoging signal.
The biological attribute data can be single biological attribute data or multi-biological characteristic data, as texture (including fingerprint, Palmmprint, vein and associated satellite feature, such as pore), biomembrane (such as iris, retina), face, ear canal, voice, body Shape, personal habits (such as the dynamics and frequency, signature, gait for tapping keyboard) etc..
Processing module 20 is used to generate biological characteristic in plain text according to the biological information.
In the present embodiment, processing module 20 includes AD conversion unit 201, verification unit 202 and pretreatment unit 203.AD conversion unit 201 is used to the biological information being converted into digital signal by analog signal.Wherein, the number Word signal is expressed as binary-coded character sequence;Verification unit 202 is for carrying out school to the digital signal that AD conversion unit generates It tests;Pretreatment unit 203 is used to carrying out the digital signal after verification into pretreatment to generate biological characteristic in plain text.
Specifically, collected analog signal is converted into digital signal, stored in memory, the digital signal of storage It is a binary-coded character sequence, the gray value for Characterize fingerprints image.Further, which is verified, is disappeared Except the error in conversion process.Further, the digital signal after verification is handled using the operation such as moving to left, move to right, negate, User is eliminated in typing fingerprint, the excessive or insufficient problem of pressing dynamics.
Encrypting module 30 is used to carrying out the biological characteristic into encryption in plain text to generate biological characteristic ciphertext.Wherein, described to add Close module 30 encrypts the biological characteristic in such a way that hardware encrypts in plain text
In the present embodiment, the encrypting module includes grouped element 301 and encryption unit 302, wherein grouped element 301 for being divided into multiple sub- character strings for pretreated digital signal sequences;Encryption unit 302 is used for sub- character string It passes sequentially through hardware encryption circuit and generates biological characteristic ciphertext.Encryption Algorithm include algorithm based on physics unclonable function, Aes algorithm, DES algorithm, 3DES algorithm, RSA Algorithm, national secret algorithm, hash algorithm.
In a preferred embodiment, hardware encryption circuit can pass through physics unclonable function (Physical Unclonable Function, PUF) it realizes, on piece PUF is a kind of to be produced using process variations in ic manufacturing process The mechanism of raw uniqueness excitation-response pair.PUF have persistence, unpredictability, nonclonability and can not tamper etc. it is excellent Point.Currently, PUF circuit have diversified forms, be usually used in integrated circuit fields has: arbitration type PUF (Arbiter PUF) and Ring oscillation type PUF (Ring Oscillator PUF, RO PUF).
Biological characteristic is divided into multiple sub- character strings that length is N, if P=N × M, N, M in plain text (sequence length P) It is the positive integer greater than 1, then the sub- character string of M group can be obtained, if P cannot be evenly divisible by N, last organizes sub- character string Add spot patch neat.Specifically, such as P=255, N=32, then last group only has 7 characters, and needing to add 10 and mending into length is 8 Sub- character string, and the excitation as PUF hardware encryption circuit is sequentially inputted in PUF encrypted circuit, and PUF circuit generates Isometric response character sequence, this encrypted character string are known as biological characteristic ciphertext.Wherein, length N adds according to hardware Depending on the structure on cipher telegram road, the size of response character sequence can pass through modification hardware encryption circuit adjustment according to actual needs.
For arbitrating type PUF (Arbiter PUF), a kind of basic structure of Arbiter PUF hardware encryption circuit As shown in figure 3, Arbiter PUF hardware encryption circuit includes K identical switch unit (E1-EK) and latch 301, wherein K is the positive integer greater than 1.Switch unit (E1-EK) be used for according to the biological characteristic plaintext gating signal transmission path, and root Biological characteristic ciphertext is generated according to the signal transmission path of gating.Wherein, the biological characteristic control as each switch unit in plain text Signal (C1-CK).Each switch unit includes two selectors, and two pairs of path structures in each switch unit are identical , wire structures are symmetrical.Input signal is a pulse signal, is divided into two and is input to hardware encryption circuit, i.e., A, B believe Number it is input to hardware encryption circuit.Since there are deviations for technique, even if the delay on identical two paths of wire structures Also it can have any different, so the time that A, B signal reach latch has successively, change latch output valve between 0 and 1.No Same excitation obtains different output valves.It inputs different biological characteristics and obtains corresponding biological characteristic ciphertext in plain text.Specifically Ground, the order of settable Arbiter PUF are set to 128 ranks, i.e. K=128, while constructing 8 such Arbiter PUF electricity Road.When biological characteristic plaintext character string is grouped, the length N of sub- character string is identical as K value, i.e. N=K.Ciphering process: one group The character string that size is 8 × 128 feeds hardware encryption circuit, the character string of this 8 128bit is successively used as 8 The excitation of Arbiter PUF acts on PUF circuit.For the character string of each 128bit, by 8 PUF circuits Encryption obtains the response character of 8bit, constitutes 8bit ciphertext character string.Therefore, one group 8 × 128 of character string is by adding The ciphertext character string of close available 8 × 8 ciphertext character string i.e. 8 8bit.It can be by changing Arbiter PUF electricity The size of the number adjustment ciphertext character string on road.It should be appreciated that a kind of electricity for the only Arbiter PUF circuit that Fig. 3 is provided Road form, derivative various Arbiter PUF circuits are in interest field of the invention.
By taking ring oscillation type PUF (Ring Oscillator PUF, RO PUF) as an example, typical RO PUF hardware adds The basic cell structure on cipher telegram road is as shown in figure 4, include K ring oscillator (RO1-ROK), selector (401-402), count Device (403-404) and comparator 405, wherein K is the positive integer greater than 1, and each RO contains 3 phase inverters.Each RO has There is identical allocation wiring structure.Similarly, input signal is a step signal.Due to process deviation, each RO is produced The frequency of raw pulse signal is different, and pumping signal controls two selectors and selects two from K ring oscillator (RO) Ring oscillator (RO), i.e. i-th of ring oscillator ROiWith j-th of ring oscillator ROj, wherein i, j are respectively positive integer, and 1 ≤ i≤K, 1≤j≤K and i ≠ j constitute a RO to (RO pair).Two counters measure the frequency f of two RO respectivelyiWith fj.Due to the diversity of manufacturing process, fiAnd fjIt is often different, judge fiAnd fjSize relation response character sequence just can be obtained Column.Such as: work as fi> fjWhen, rij=1, otherwise, rij=0.Specifically, settable RO PUF circuit includes 8 basic units, often A basic unit includes 16 RO, i.e. K=16.When biological characteristic plaintext character string is grouped, the length N and K of sub- character string Relational expression: K=2N/2.Ciphering process: one group of size is that 64 × 8 character strings feed hardware encryption circuit, this 64 8bit's Character string is successively used as the excitation of 64 RO PUF, successively acts on 8 basic units of RO PUF circuit.For each For the character string of 8bit, by the encryption of RO PUF circuit, the response character of 8bit is obtained, constitutes 8bit ciphertext character sequence Column.Therefore, ciphertext character string i.e. 64 8bit of one group 64 × 8 of the character string by encryption available 64 × 8 is close Chinese character sequence.The ciphertext character string of generation can be adjusted by the basic unit number in modification RO PUF circuit.Biology Pumping signal of the feature plaintext as the RO PUF hardware encryption circuit, corresponding output rijAs biological characteristic ciphertext.It answers Work as understanding, a kind of circuit form for the only RO PUF circuit that Fig. 4 is provided, the various RO PUF circuits derived are in this hair In bright protection scope.
It should be appreciated that the described two kinds PUF circuits for being used as hardware encryption are that two PUF are used as showing for hardware encryption Example, the PUF circuit that can be used for integrated circuit fields are used equally for hardware to encrypt, are within the scope of the invention.
Biological feature encryption device provided by the invention realizes the biological information of user by hardware encryption circuit Encryption, reduces dependence of the algorithm to processor, and encryption, the peace of improve data transfer are realized in same chip to realize Full property and efficiency.
It is as described above according to the embodiment of the present invention, these embodiments details all there is no detailed descriptionthe, also not Limiting the invention is only the specific embodiment.Obviously, as described above, can make many modifications and variations.This explanation These embodiments are chosen and specifically described to book, is principle and practical application in order to better explain the present invention, thus belonging to making Technical field technical staff can be used using modification of the invention and on the basis of the present invention well.Protection model of the invention The range that the claims in the present invention are defined should be subject to by enclosing.

Claims (9)

1. a kind of biological feature encryption method, comprising:
Obtain the biological information of user;
Biological characteristic is generated in plain text according to the biological information;
By hardware encryption circuit, to the biological characteristic, encryption generates biological characteristic ciphertext in plain text;
Wherein, generating biological characteristic in plain text according to the biological information includes:
The analog signal for carrying the biological information is converted into digital signal, wherein the digital signal is expressed as word Accord with sequence;
The digital signal generated to AD conversion unit verifies;
The digital signal after verification is subjected to pretreatment and generates biological characteristic in plain text;
To the biological characteristic, encryption generation biological characteristic ciphertext includes: in plain text in a manner of hardware encryption
Biological characteristic is divided into multiple sub- character strings in plain text, wherein the multiple sub- character string characterizes the biological characteristic Information;
Multiple sub- character strings are passed sequentially through into hardware encryption circuit and generate biological characteristic ciphertext.
2. according to the method described in claim 1, wherein, the Encryption Algorithm for hardware encryption includes unclonable based on physics Algorithm, symmetric encipherment algorithm, rivest, shamir, adelman, the hash algorithm of function.
3. according to the method described in claim 1, wherein, the Encryption Algorithm for hardware encryption includes national secret algorithm.
4. a kind of encrypting fingerprint device, comprising:
Acquisition module, for obtaining the biological information of user;
Processing module, for generating biological characteristic in plain text according to the biological information;
Encrypting module generates biological characteristic ciphertext for the biological characteristic to be carried out to encryption in plain text;
Wherein, the encrypting module encrypts the biological characteristic by hardware encryption circuit in plain text;
The processing module includes:
AD conversion unit, for the biological information to be converted into digital signal wherein by analog signal, the number Signal is expressed as binary-coded character sequence;
Verification unit, for being verified to the digital signal that AD conversion unit generates;
Pretreatment unit generates biological characteristic in plain text for the digital signal after verification to be carried out pretreatment;
The encrypting module includes:
Grouped element, for pretreated digital signal to be divided into multiple sub- character strings;
Encryption unit generates biological characteristic ciphertext for multiple sub- character strings to be passed sequentially through hardware encryption circuit.
5. device according to claim 4, wherein the Encryption Algorithm for hardware encryption includes unclonable based on physics Algorithm, symmetric encipherment algorithm, rivest, shamir, adelman, the hash algorithm of function.
6. device according to claim 5, wherein the algorithm based on physics unclonable function can not by physics Clone hardware encrypted circuit is realized.
7. device according to claim 6, wherein the unclonable hardware encryption circuit of physics includes multiple identical Switch unit is used for according to the biological characteristic plaintext gating signal transmission path, and raw according to the signal transmission path of gating At biological characteristic ciphertext.
8. device according to claim 6, wherein the unclonable hardware encryption circuit of physics includes multiple annular vibrations Device, selector, counter and comparator are swung, for selecting two of them ring oscillator in plain text according to the biological characteristic, and Biological characteristic ciphertext is generated according to the frequency of two ring oscillators.
9. device according to claim 4, wherein the Encryption Algorithm for hardware encryption includes national secret algorithm.
CN201610448166.9A 2016-06-20 2016-06-20 Biological feature encryption method and device Active CN105978889B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610448166.9A CN105978889B (en) 2016-06-20 2016-06-20 Biological feature encryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610448166.9A CN105978889B (en) 2016-06-20 2016-06-20 Biological feature encryption method and device

Publications (2)

Publication Number Publication Date
CN105978889A CN105978889A (en) 2016-09-28
CN105978889B true CN105978889B (en) 2019-06-11

Family

ID=57021708

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610448166.9A Active CN105978889B (en) 2016-06-20 2016-06-20 Biological feature encryption method and device

Country Status (1)

Country Link
CN (1) CN105978889B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106972934A (en) * 2017-04-28 2017-07-21 山东大学 A kind of camera images storage system based on PUF
CN111611629A (en) * 2020-06-24 2020-09-01 中物院成都科学技术发展中心 Physical fingerprint extraction system and method for chip
CN114614987B (en) * 2020-12-03 2023-07-07 北京京东方技术开发有限公司 Integrated circuit and digital fingerprint generation circuit and method thereof

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1588851A (en) * 2004-09-09 2005-03-02 杭州中正生物认证技术有限公司 Biological identifying device and method for proofing replay attach
CN101232380A (en) * 2008-02-28 2008-07-30 北京飞天诚信科技有限公司 Method of intelligent cryptographic key equipment safety use and intelligent cryptographic key equipment
CN203574665U (en) * 2013-02-04 2014-04-30 快车科技有限公司 Safety encipherment protection device
CN104506322A (en) * 2014-12-17 2015-04-08 广东讯飞启明科技发展有限公司 Examinee identity authentication data compression and encryption method and decryption method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1588851A (en) * 2004-09-09 2005-03-02 杭州中正生物认证技术有限公司 Biological identifying device and method for proofing replay attach
CN101232380A (en) * 2008-02-28 2008-07-30 北京飞天诚信科技有限公司 Method of intelligent cryptographic key equipment safety use and intelligent cryptographic key equipment
CN203574665U (en) * 2013-02-04 2014-04-30 快车科技有限公司 Safety encipherment protection device
CN104506322A (en) * 2014-12-17 2015-04-08 广东讯飞启明科技发展有限公司 Examinee identity authentication data compression and encryption method and decryption method

Also Published As

Publication number Publication date
CN105978889A (en) 2016-09-28

Similar Documents

Publication Publication Date Title
CN108632248B (en) Data ciphering method, data query method, apparatus, equipment and storage medium
CN110098923B (en) Method and equipment for generating and verifying temporary password
EP2368338B1 (en) Non-networked rfid-puf authentication
US9467293B1 (en) Generating authentication codes associated with devices
EP2214117B1 (en) Authentication with physical unclonable functions
CA2898609C (en) Cryptographic protocol for portable devices
US9306741B1 (en) Updating keys for use in authentication
JP5333669B2 (en) Individual information generation apparatus and individual information generation method
US9553722B2 (en) Generating a key based on a combination of keys
CN109151053A (en) Anti- quantum calculation cloud storage method and system based on public asymmetric key pond
JP5831202B2 (en) Individual information generation apparatus and individual information generation method
JP7006887B2 (en) Random number generator and how to generate output random numbers
CN107038383A (en) A kind of method and apparatus of data processing
CN105978889B (en) Biological feature encryption method and device
US11245680B2 (en) Garbled circuit for device authentication
CN106533697B (en) Generating random number and extracting method and its application in authentication
CN106101150B (en) The method and system of Encryption Algorithm
CN107257350B (en) Offline authentication or payment method of wearable equipment
CN106712931A (en) Mobile phone token identity authentication system and method based on quantum cipher network
CN111199053A (en) System and method for multi-character wildcard search of encrypted data
Zhu et al. Efficient and privacy-preserving online fingerprint authentication scheme over outsourced data
US11934323B2 (en) Diversifying a base symmetric key based on a public key
Selvaraju et al. A method to improve the security level of ATM banking systems using AES algorithm
CN109690598B (en) Generating a plurality of disposable tokens
SE526070C2 (en) Synchronizing method of communication session between e.g. enterprise and employees, involves performing handshake procedure to synchronize session counters of communication units by successively communicated signatures

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant