CN106506168A - A kind of safe method based on biological characteristic long-distance identity-certifying - Google Patents

A kind of safe method based on biological characteristic long-distance identity-certifying Download PDF

Info

Publication number
CN106506168A
CN106506168A CN201611115259.6A CN201611115259A CN106506168A CN 106506168 A CN106506168 A CN 106506168A CN 201611115259 A CN201611115259 A CN 201611115259A CN 106506168 A CN106506168 A CN 106506168A
Authority
CN
China
Prior art keywords
biological characteristic
data
authentication
client
method based
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611115259.6A
Other languages
Chinese (zh)
Inventor
马臣云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Trust Technology Co Ltd
Original Assignee
Beijing Trust Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Trust Technology Co Ltd filed Critical Beijing Trust Technology Co Ltd
Priority to CN201611115259.6A priority Critical patent/CN106506168A/en
Publication of CN106506168A publication Critical patent/CN106506168A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3273Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication

Abstract

The invention discloses a kind of safe method based on biological characteristic long-distance identity-certifying, belongs to field of information security technology, the invention solves the problems that under the internet environment of non-security channel, based on the problem how biological characteristic realizes safety identification authentication.The technical scheme for adopting for:Contemporary cryptology is merged in living things feature recognition, by cryptographic algorithm and protocol realization safety identification authentication;When registering first, biological characteristic as secret or carry out secret generation using biological characteristic, server storage deduces the key of negotiation;During authentication, the key that the key according to service end, biological characteristic are generated does challenge checking, realizes two-way authentication.

Description

A kind of safe method based on biological characteristic long-distance identity-certifying
Technical field
The present invention relates to a kind of field of information security technology, specifically a kind of safe based on the long-range body of biological characteristic The method of part certification.
Background technology
The biological characteristics such as fingerprint, iris, face, vein be recognize certification personal user natural voucher, everyone life Thing feature possesses uniqueness, it is difficult to forges and palms off.People are desirable with biological character for identity authentication always, to reach nothing User need to be allowed to remember the password of complexity or carry with the purpose of the equipment such as U-shield.
Common biometric authentication technology principle is:Biological characteristic is gathered when user registers first, through feature extraction After coding, server background is arrived in the storage of biological characteristic value.During authentication, gather again and calculate eigenvalue, feature The eigenvalue contrast of value and backstage storage, certification success if coupling, on the contrary authentification failure.The certification of this simple feature coupling Mode, is only applicable to enclosed environment or trusted channel environment, is not suitable for internet environment.Biological characteristic or biological characteristic value are Height private data, once information leakage will result in leakage of the personation of user, privacy etc., more seriously once revealing It is then permanent leakage, it is impossible to change.The Internet is insecure environments, and biological characteristic is very easy to quilt in transmission, storing process Sniff is broken through.
Modern cryptographic technique be generally used in network communications data confidentiality, authentication, data integrity protection and Resisting denying.Current main-stream identity authentication protocol such as SSL TLS, Kerberos etc. used modern cryptographic technique.
Under the internet environment of non-security channel, safe authentication to be realized based on biological characteristic, at least need to be expired The following condition of foot:
1st, biological characteristic zero is stored, and never preserves user biological eigenvalue in client, service end, does not also transmit user biological special Value indicative, prevents privacy leakage;
2nd, two-way authentication, under unsafe channel, i.e., will prevent the personation of user from will also prevent the personation of server, can By algorithm or agreement guarantee;
3rd, dual factor anthentication, introduces other authentication modes such as password, to strengthen authentication strength.
How to meet above three condition, carry out safe biometric identity certification, be those skilled in the art Problem in the urgent need to address at present.
Content of the invention
The technical assignment of the present invention is for above not enough, there is provided a kind of safe side based on biological characteristic long-distance identity-certifying Method, solves under the internet environment of non-security channel, based on the problem how biological characteristic realizes safety identification authentication.
The present invention technical assignment realize in the following manner,
A kind of safe method based on biological characteristic long-distance identity-certifying, living things feature recognition merge contemporary cryptology, by Cryptographic algorithm and protocol realization safety identification authentication;When registering first, biological characteristic as secret or is utilized biological characteristic Secret generation is carried out, server does not store biological characteristic value, but the key that consults is deduced in storage;During authentication, according to clothes The key that the key at business end, biological characteristic are generated does challenge checking, realizes two-way authentication.
Comprise the steps:
[one], registration process is as follows:
[1], by the collection certification terminal of client, gather the biological characteristic of user, biological characteristic is carried out successively pretreatment, Feature extraction and coding, obtain biological characteristic value;
[2], biological characteristic value is processed through fuzzy extraction or error correcting code and obtains one section of public data and one section of secret data;
[3], secret data is destroyed;
[4], public data and user's registration information are encrypted using server side certificate, sends from client and store clothes Business device end;
[two], verification process is as follows:
[5], when user passes through client login system, certification request is sent to server end;
[6], server end produces authentication challenge code data, and authentication challenge code data are obtained using the private key signature of server side certificate Must sign value, signature value, authentication challenge code data are sent to client;
[7], collection certification terminal of the user by client, gathers the biological characteristic of user again, biological characteristic is entered successively Row pretreatment, feature extraction and coding, obtain biological characteristic value;
[8], biological characteristic value is processed through fuzzy extraction or error correcting code and obtains one section of public data and one section of secret data;
[9], signature value of the client using server side certificate authentication verification challenge code data;If signature value is verified, Show that service end-apparatus is credible;
[10], server end is sent to authentication challenge code data encryption using secret data;
[11], secret data is destroyed;
[12], after the data that received server-side is sent to [10th] step, the certification after encryption is decrypted using user's public data Challenge code data, successful decryption, then it represents that certification success.
Step [2] is replaced with:Biological characteristic value is extracted or error correcting code process through fuzzy, and adds password, obtain one Section public data and one section of secret data;Step [8] is replaced with:Biological characteristic value is extracted or error correcting code process through fuzzy, And password is added, obtain one section of public data and one section of secret data.
The communication channel of client and server is communicated using SSL/TLS protocol securitys.
In step [4], encrypted using server side certificate, the AES for adopting is PKI asymmetric arithmetic RSA or SM2.
In step [6], server end produces a random number, adds timestamp as authentication challenge code data;Certification is chosen Private key signature of the war code data using server side certificate, signature algorithm adopt PKI asymmetric arithmetic RSA or SM2.
In step [1] and step [7], collection certification terminal is photographic head or mike or fingerprint instrument or venous collection instrument; Biological characteristic is face or vocal print or fingerprint or vein.
In step [9], client uses PKI technology, the signature of authentication verification challenge code data.
The a kind of safe of the present invention has advantages below based on the method for biological characteristic long-distance identity-certifying:
1st, safety identification authentication under the internet environment of non-security channel, based on biological characteristic disclosure satisfy that;
2nd, can realize that biological characteristic zero is stored, service end, client two-way authentication, supports other authentication factors, lift certification Intensity;
3rd, the convenience of biological characteristic is remained, cryptographic technique is introduced and is enhanced safety:Using biological characteristic as secret or Secret generation is carried out using biological characteristic with reference to other factors, recycle ripe cryptographic technique to realize authentication, so To retain the convenience of biological characteristic authentication, protect the privacy of biological characteristic again, be provided simultaneously with higher safety;
4th, zero storage, zero transmission of biological characteristic are achieved, it is to avoid the leakage of private data;
5th, propose introducing password etc. multifactor, further enhancing safety.
Description of the drawings
The present invention is further described below in conjunction with the accompanying drawings.
Accompanying drawing 1 is a kind of register flow path figure of the embodiment 1 of the safe method based on biological characteristic long-distance identity-certifying;
Accompanying drawing 2 is a kind of identifying procedure figure of the embodiment 1 of the safe method based on biological characteristic long-distance identity-certifying;
Accompanying drawing 3 is a kind of register flow path figure of the embodiment 2 of the safe method based on biological characteristic long-distance identity-certifying;
Accompanying drawing 4 is a kind of identifying procedure figure of the embodiment 2 of the safe method based on biological characteristic long-distance identity-certifying.
Specific embodiment
The a kind of safe of the present invention is recognized based on biological characteristic remote identity with reference to Figure of description and specific embodiment The method of card is described in detail below.
Embodiment 1:
A kind of safe method based on biological characteristic long-distance identity-certifying of the present invention, living things feature recognition merge modern password Learn, by cryptographic algorithm and protocol realization safety identification authentication;When registering first, using biological characteristic as secret or using life Thing feature carries out secret generation, and server does not store biological characteristic value, but the key that consults is deduced in storage;During authentication, The key that key according to service end, biological characteristic are generated does challenge checking, realizes two-way authentication.
Specifically include following steps:
As shown in figure 1, registration process is as follows:
Step 101:By the collection certification terminal of client, the biological characteristic Um of user is gathered, biological characteristic Um is entered successively Row pretreatment, feature extraction and coding, obtain biological characteristic value Wm;Collection certification terminal is photographic head;Biological characteristic is face;
Step 102:Biological characteristic value Wm through fuzzy extract or error correcting code process obtain one section of public data Pm and one section secret Ciphertext data Rm;
Step 103:Destroy secret data Rm;
Step 104:Public data Pm and user's registration information are obtained P'm using server side certificate encryption, employing plus Close algorithm is PKI asymmetric arithmetic RSA, is sent to server end from client, it is ensured that only server end can just receive the number According to;
Step 105:P'm is decrypted using server end private key, public data Pm is obtained;
Step 106:Safe for public data Pm is stored in server end.
As shown in Fig. 2 verification process is as follows:
Step 201:When user passes through client login system, certification request is sent to server end;
Step 202:Server end produces a random number, adds timestamp as authentication challenge code data Nm;
Step 203:Authentication challenge code data Nm must be signed value Sn using the private key signature of server side certificate, and signature algorithm is adopted PKI asymmetric arithmetic RSA;Signature value Sn, authentication challenge code data Nm are sent to client;
Step 204:Collection certification terminal of the user by client, gathers the biological characteristic Um of user, again to biological characteristic Um carries out pretreatment, feature extraction and coding successively, obtains biological characteristic value W'm;
Step 205:Biological characteristic value W'm is processed through fuzzy extraction or error correcting code and obtains one section of public data P'm and one section Secret data R'm;
Step 206:Client combines server side certificate, using PKI technology, the signature value of authentication verification challenge code data Nm Sn;If signature value Sn is verified, show that service end-apparatus is credible;
Step 207:N''m is obtained to the encryption of authentication challenge code data Nm using secret data R'm, server end is sent to;Destroy Secret data R'm;
Step 208:Received server-side decrypts the authentication challenge code data after encryption using user's public data Pm to after N''m N''m, if data are equal to authentication challenge code data Nm, as successful decryption after decryption, then it represents that certification success, otherwise certification are lost Lose.
The communication channel of client and server is communicated using SSL/TLS protocol securitys.
Embodiment 2:
A kind of safe method based on biological characteristic long-distance identity-certifying of the present invention, living things feature recognition merge modern password Learn, by cryptographic algorithm and protocol realization safety identification authentication;When registering first, using biological characteristic as secret or using life Thing feature carries out secret generation, and server does not store biological characteristic value, but the key that consults is deduced in storage;During authentication, The key that key according to service end, biological characteristic are generated does challenge checking, realizes two-way authentication.
Specifically include following steps:
As shown in figure 3, registration process is as follows:
Step 101:By the collection certification terminal of client, the biological characteristic Um of user is gathered, biological characteristic Um is entered successively Row pretreatment, feature extraction and coding, obtain biological characteristic value Wm;Collection certification terminal is fingerprint instrument;Biological characteristic is fingerprint;
Step 102:Biological characteristic value Wm is extracted or error correcting code process through fuzzy, and adds password, obtain one section of open number According to Pm and one section of secret data Rm;
Step 103:Destroy secret data Rm;
Step 104:Public data Pm and user's registration information are obtained P'm using server side certificate encryption, employing plus Close algorithm is SM2 algorithms, is sent to server end from client, it is ensured that only server end can just receive the data;
Step 105:P'm is decrypted using server end private key, public data Pm is obtained;
Step 106:Safe for public data Pm is stored in server end.
As shown in figure 4, verification process is as follows:
Step 201:When user passes through client login system, certification request is sent to server end;
Step 202:Server end produces a random number, adds timestamp as authentication challenge code data Nm;
Step 203:Authentication challenge code data Nm must be signed value Sn using the private key signature of server side certificate, and signature algorithm is adopted SM2 algorithms;Signature value Sn, authentication challenge code data Nm are sent to client;
Step 204:Collection certification terminal of the user by client, gathers the biological characteristic Um of user, again to biological characteristic Um carries out pretreatment, feature extraction and coding successively, obtains biological characteristic value W'm;
Step 205:Biological characteristic value W'm is extracted or error correcting code process through fuzzy, and adds password, obtain one section of open number According to P'm and one section of secret data R'm;
Step 206:Client combines server side certificate, using PKI technology, the signature value of authentication verification challenge code data Nm Sn;If signature value Sn is verified, show that service end-apparatus is credible;
Step 207:N''m is obtained to the encryption of authentication challenge code data Nm using secret data R'm, server end is sent to;Destroy Secret data R'm;
Step 208:Received server-side decrypts the authentication challenge code data after encryption using user's public data Pm to after N''m N''m, if data are equal to authentication challenge code data Nm, as successful decryption after decryption, then it represents that certification success, otherwise certification are lost Lose.
The communication channel of client and server is communicated using SSL/TLS protocol securitys.
By specific embodiment above, the those skilled in the art can readily realize the present invention.But should Work as understanding, the present invention is not limited to above-mentioned specific embodiment.On the basis of disclosed embodiment, the technical field Technical staff can the different technical characteristic of combination in any, so as to realize different technical schemes.Other technological means Conventional displacement can be done, such as collection certification terminal can also be that photographic head or mike or fingerprint instrument or venous collection instrument are a kind of Or several combinations;Corresponding biological characteristic is obtained simultaneously:Face or vocal print or fingerprint or vein;Can also be by step 102 It is optimized with step 205, obtains enhanced scheme, except adding password, may be incorporated into the factor of other enhancing safeties.
In addition to the technical characteristic described in description, the known technology of those skilled in the art is.

Claims (8)

1. a kind of safe method based on biological characteristic long-distance identity-certifying, it is characterised in that will be existing for living things feature recognition fusion For cryptography, by cryptographic algorithm and protocol realization safety identification authentication;First register when, biological characteristic as secret or Secret generation is carried out using biological characteristic, server storage deduces the key that consults;During authentication, according to the close of service end The key that key, biological characteristic are generated does challenge checking, realizes two-way authentication.
2. a kind of safe method based on biological characteristic long-distance identity-certifying according to claim 1, it is characterised in that Comprise the steps:
[one], registration process is as follows:
[1], by the collection certification terminal of client, gather the biological characteristic of user, biological characteristic is carried out successively pretreatment, Feature extraction and coding, obtain biological characteristic value;
[2], biological characteristic value is processed through fuzzy extraction or error correcting code and obtains one section of public data and one section of secret data;
[3], secret data is destroyed;
[4], public data and user's registration information are encrypted using server side certificate, sends from client and store clothes Business device end;
[two], verification process is as follows:
[5], when user passes through client login system, certification request is sent to server end;
[6], server end produces authentication challenge code data, and authentication challenge code data are obtained using the private key signature of server side certificate Must sign value, signature value, authentication challenge code data are sent to client;
[7], collection certification terminal of the user by client, gathers the biological characteristic of user again, biological characteristic is entered successively Row pretreatment, feature extraction and coding, obtain biological characteristic value;
[8], biological characteristic value is processed through fuzzy extraction or error correcting code and obtains one section of public data and one section of secret data;
[9], signature value of the client using server side certificate authentication verification challenge code data;If signature value is verified, Show that service end-apparatus is credible;
[10], server end is sent to authentication challenge code data encryption using secret data;
[11], secret data is destroyed;
[12], after the data that received server-side is sent to [10th] step, the certification after encryption is decrypted using user's public data Challenge code data, successful decryption, then it represents that certification success.
3. a kind of safe method based on biological characteristic long-distance identity-certifying according to claim 2, it is characterised in that Step [2] is replaced with:Biological characteristic value is extracted or error correcting code process through fuzzy, and adds password, obtain one section of open number According to one section of secret data;Step [8] is replaced with:Biological characteristic value is extracted or error correcting code process through fuzzy, and adds mouth Order, obtains one section of public data and one section of secret data.
4. a kind of safe method based on biological characteristic long-distance identity-certifying according to claim 2, it is characterised in that The communication channel of client and server is communicated using SSL/TLS protocol securitys.
5. a kind of safe method based on biological characteristic long-distance identity-certifying according to claim 2, it is characterised in that In step [4], encrypted using server side certificate, the AES for adopting is PKI asymmetric arithmetic RSA or SM2.
6. a kind of safe method based on biological characteristic long-distance identity-certifying according to claim 2, it is characterised in that In step [6], server end produces a random number, adds timestamp as authentication challenge code data;Authentication challenge code data Using the private key signature of server side certificate, signature algorithm adopts PKI asymmetric arithmetic RSA or SM2.
7. a kind of safe method based on biological characteristic long-distance identity-certifying according to claim 2, it is characterised in that In step [1] and step [7], collection certification terminal is photographic head or mike or fingerprint instrument or venous collection instrument;Biological characteristic For face or vocal print or fingerprint or vein.
8. a kind of safe method based on biological characteristic long-distance identity-certifying according to claim 2, it is characterised in that In step [9], client uses PKI technology, the signature of authentication verification challenge code data.
CN201611115259.6A 2016-12-07 2016-12-07 A kind of safe method based on biological characteristic long-distance identity-certifying Pending CN106506168A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611115259.6A CN106506168A (en) 2016-12-07 2016-12-07 A kind of safe method based on biological characteristic long-distance identity-certifying

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611115259.6A CN106506168A (en) 2016-12-07 2016-12-07 A kind of safe method based on biological characteristic long-distance identity-certifying

Publications (1)

Publication Number Publication Date
CN106506168A true CN106506168A (en) 2017-03-15

Family

ID=58330487

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611115259.6A Pending CN106506168A (en) 2016-12-07 2016-12-07 A kind of safe method based on biological characteristic long-distance identity-certifying

Country Status (1)

Country Link
CN (1) CN106506168A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107332668A (en) * 2017-06-05 2017-11-07 国政通科技股份有限公司 A kind of method and apparatus for handling encrypted message
CN107705198A (en) * 2017-03-24 2018-02-16 广东网金控股股份有限公司 A kind of method and system for securely delivering U-shield
CN108737103A (en) * 2018-03-27 2018-11-02 中国科学院数据与通信保护研究教育中心 A kind of SM2 algorithm endorsement methods applied to CS frameworks
CN109086014A (en) * 2018-08-22 2018-12-25 上海纳孚通信设备技术有限公司 The method and system of document secure printing are realized using biological identification technology
CN109547503A (en) * 2018-05-17 2019-03-29 北京岸思信息科技有限公司 Biological feather recognition method
CN109840405A (en) * 2017-11-29 2019-06-04 上海荆虹电子科技有限公司 A kind of identification authentication system and its application method
CN110224713A (en) * 2019-06-12 2019-09-10 读书郎教育科技有限公司 A kind of high security intelligence children wrist-watch and its safety protecting method
CN110391909A (en) * 2018-04-20 2019-10-29 武汉真元生物数据有限公司 Terminal unlock method and system based on living things feature recognition
CN110392030A (en) * 2018-04-20 2019-10-29 武汉真元生物数据有限公司 A kind of authentication based on biological characteristic, method for processing business and system
CN111356118A (en) * 2018-12-20 2020-06-30 上海银基信息安全技术股份有限公司 Interactive key generation method and system, Bluetooth electronic equipment and storage medium
CN111611623A (en) * 2020-07-03 2020-09-01 腾讯科技(深圳)有限公司 Private data processing method and device
CN112040481A (en) * 2020-08-19 2020-12-04 广东电网有限责任公司广州供电局 Secondary authentication method based on 5G communication gateway
CN112417424A (en) * 2020-12-02 2021-02-26 中国电力科学研究院有限公司 Authentication method and system for power terminal
CN113691367A (en) * 2020-05-16 2021-11-23 成都天瑞芯安科技有限公司 Desensitized safe biological characteristic identity authentication method
CN113688651A (en) * 2020-05-16 2021-11-23 成都天瑞芯安科技有限公司 Biological characteristic password desensitization protection method based on SM9 algorithm

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103124269A (en) * 2013-03-05 2013-05-29 桂林电子科技大学 Bidirectional identity authentication method based on dynamic password and biologic features under cloud environment
CN103237038A (en) * 2013-05-09 2013-08-07 中国电子科技集团公司第三十研究所 Two-way network access authentication method based on digital certificate
US20130212645A1 (en) * 2010-10-29 2013-08-15 Hitachi, Ltd. Information authentication method and information authentication system
CN103607282A (en) * 2013-11-22 2014-02-26 成都卫士通信息产业股份有限公司 Identity fusion authentication method based on biological characteristics
CN103888442A (en) * 2014-01-13 2014-06-25 黄晓芳 System with integration of visualization biological characteristics and one-time digital signature and method thereof
CN105391713A (en) * 2015-11-09 2016-03-09 浙江工业大学 Biological-certificate-based identity authentication method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130212645A1 (en) * 2010-10-29 2013-08-15 Hitachi, Ltd. Information authentication method and information authentication system
CN103124269A (en) * 2013-03-05 2013-05-29 桂林电子科技大学 Bidirectional identity authentication method based on dynamic password and biologic features under cloud environment
CN103237038A (en) * 2013-05-09 2013-08-07 中国电子科技集团公司第三十研究所 Two-way network access authentication method based on digital certificate
CN103607282A (en) * 2013-11-22 2014-02-26 成都卫士通信息产业股份有限公司 Identity fusion authentication method based on biological characteristics
CN103888442A (en) * 2014-01-13 2014-06-25 黄晓芳 System with integration of visualization biological characteristics and one-time digital signature and method thereof
CN105391713A (en) * 2015-11-09 2016-03-09 浙江工业大学 Biological-certificate-based identity authentication method

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107705198A (en) * 2017-03-24 2018-02-16 广东网金控股股份有限公司 A kind of method and system for securely delivering U-shield
CN107332668A (en) * 2017-06-05 2017-11-07 国政通科技股份有限公司 A kind of method and apparatus for handling encrypted message
CN109840405A (en) * 2017-11-29 2019-06-04 上海荆虹电子科技有限公司 A kind of identification authentication system and its application method
CN108737103A (en) * 2018-03-27 2018-11-02 中国科学院数据与通信保护研究教育中心 A kind of SM2 algorithm endorsement methods applied to CS frameworks
CN108737103B (en) * 2018-03-27 2021-06-29 中国科学院数据与通信保护研究教育中心 SM2 algorithm signature method applied to CS framework
CN110392030B (en) * 2018-04-20 2021-12-14 武汉真元生物数据有限公司 Identity authentication and service processing method and system based on biological characteristics
CN110391909A (en) * 2018-04-20 2019-10-29 武汉真元生物数据有限公司 Terminal unlock method and system based on living things feature recognition
CN110392030A (en) * 2018-04-20 2019-10-29 武汉真元生物数据有限公司 A kind of authentication based on biological characteristic, method for processing business and system
CN109547503A (en) * 2018-05-17 2019-03-29 北京岸思信息科技有限公司 Biological feather recognition method
CN109086014A (en) * 2018-08-22 2018-12-25 上海纳孚通信设备技术有限公司 The method and system of document secure printing are realized using biological identification technology
CN109086014B (en) * 2018-08-22 2021-03-16 上海旷沃科技有限公司 Method and system for realizing safe printing of file by using biometric identification technology
CN111356118A (en) * 2018-12-20 2020-06-30 上海银基信息安全技术股份有限公司 Interactive key generation method and system, Bluetooth electronic equipment and storage medium
CN111356118B (en) * 2018-12-20 2023-07-25 上海银基信息安全技术股份有限公司 Interactive key generation method, system, bluetooth electronic device and storage medium
CN110224713A (en) * 2019-06-12 2019-09-10 读书郎教育科技有限公司 A kind of high security intelligence children wrist-watch and its safety protecting method
CN113691367A (en) * 2020-05-16 2021-11-23 成都天瑞芯安科技有限公司 Desensitized safe biological characteristic identity authentication method
CN113688651A (en) * 2020-05-16 2021-11-23 成都天瑞芯安科技有限公司 Biological characteristic password desensitization protection method based on SM9 algorithm
CN113691367B (en) * 2020-05-16 2024-04-12 成都天瑞芯安科技有限公司 Desensitization safety biological characteristic identity authentication method
CN111611623A (en) * 2020-07-03 2020-09-01 腾讯科技(深圳)有限公司 Private data processing method and device
CN112040481A (en) * 2020-08-19 2020-12-04 广东电网有限责任公司广州供电局 Secondary authentication method based on 5G communication gateway
CN112040481B (en) * 2020-08-19 2023-10-24 广东电网有限责任公司广州供电局 Secondary authentication method based on 5G communication gateway
CN112417424A (en) * 2020-12-02 2021-02-26 中国电力科学研究院有限公司 Authentication method and system for power terminal

Similar Documents

Publication Publication Date Title
CN106506168A (en) A kind of safe method based on biological characteristic long-distance identity-certifying
CN103124269B (en) Based on the Bidirectional identity authentication method of dynamic password and biological characteristic under cloud environment
CN104796265B (en) A kind of Internet of Things identity identifying method based on Bluetooth communication access
CN107819587B (en) Authentication method based on fully homomorphic encryption, user equipment and authentication server
WO2020087805A1 (en) Trusted authentication method employing two cryptographic values and chaotic encryption in measurement and control network
CN108243166A (en) A kind of identity identifying method and system based on USBKey
CN105162599B (en) A kind of data transmission system and its transmission method
CN103067390A (en) User registration authentication method and system based on facial features
CN104243494B (en) A kind of data processing method
CN106464493B (en) Permanent authentication system containing one-time pass code
Bindu et al. Improved remote user authentication scheme preserving user anonymity
CN102685110A (en) Universal method and system for user registration authentication based on fingerprint characteristics
CN109474419A (en) A kind of living body portrait photo encryption and decryption method and encrypting and deciphering system
CN110020524A (en) A kind of mutual authentication method based on smart card
US11722466B2 (en) Methods for communicating data utilizing sessionless dynamic encryption
CN103036674A (en) Computer permission control method based on mobile dynamic password
CN105450419A (en) Method, device and system
CN106789032A (en) The single password tripartite authentication method of privacy sharing between server and mobile device
CN103297237B (en) Identity registration and authentication method, system, personal authentication apparatus and certificate server
CN106789524A (en) The high speed parsing of VPN encrypted tunnels and restoring method
CZ2013373A3 (en) Authentication method of safe data channel
Yongliang et al. Elliptic curve cryptography based wireless authentication protocol
CN106230840B (en) A kind of command identifying method of high security
Sun et al. A lightweight multi-factor mobile user authentication scheme
CN116388995A (en) Lightweight smart grid authentication method based on PUF

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170315