CN106506168A - A kind of safe method based on biological characteristic long-distance identity-certifying - Google Patents
A kind of safe method based on biological characteristic long-distance identity-certifying Download PDFInfo
- Publication number
- CN106506168A CN106506168A CN201611115259.6A CN201611115259A CN106506168A CN 106506168 A CN106506168 A CN 106506168A CN 201611115259 A CN201611115259 A CN 201611115259A CN 106506168 A CN106506168 A CN 106506168A
- Authority
- CN
- China
- Prior art keywords
- biological characteristic
- data
- authentication
- client
- method based
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3273—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
Abstract
The invention discloses a kind of safe method based on biological characteristic long-distance identity-certifying, belongs to field of information security technology, the invention solves the problems that under the internet environment of non-security channel, based on the problem how biological characteristic realizes safety identification authentication.The technical scheme for adopting for:Contemporary cryptology is merged in living things feature recognition, by cryptographic algorithm and protocol realization safety identification authentication;When registering first, biological characteristic as secret or carry out secret generation using biological characteristic, server storage deduces the key of negotiation;During authentication, the key that the key according to service end, biological characteristic are generated does challenge checking, realizes two-way authentication.
Description
Technical field
The present invention relates to a kind of field of information security technology, specifically a kind of safe based on the long-range body of biological characteristic
The method of part certification.
Background technology
The biological characteristics such as fingerprint, iris, face, vein be recognize certification personal user natural voucher, everyone life
Thing feature possesses uniqueness, it is difficult to forges and palms off.People are desirable with biological character for identity authentication always, to reach nothing
User need to be allowed to remember the password of complexity or carry with the purpose of the equipment such as U-shield.
Common biometric authentication technology principle is:Biological characteristic is gathered when user registers first, through feature extraction
After coding, server background is arrived in the storage of biological characteristic value.During authentication, gather again and calculate eigenvalue, feature
The eigenvalue contrast of value and backstage storage, certification success if coupling, on the contrary authentification failure.The certification of this simple feature coupling
Mode, is only applicable to enclosed environment or trusted channel environment, is not suitable for internet environment.Biological characteristic or biological characteristic value are
Height private data, once information leakage will result in leakage of the personation of user, privacy etc., more seriously once revealing
It is then permanent leakage, it is impossible to change.The Internet is insecure environments, and biological characteristic is very easy to quilt in transmission, storing process
Sniff is broken through.
Modern cryptographic technique be generally used in network communications data confidentiality, authentication, data integrity protection and
Resisting denying.Current main-stream identity authentication protocol such as SSL TLS, Kerberos etc. used modern cryptographic technique.
Under the internet environment of non-security channel, safe authentication to be realized based on biological characteristic, at least need to be expired
The following condition of foot:
1st, biological characteristic zero is stored, and never preserves user biological eigenvalue in client, service end, does not also transmit user biological special
Value indicative, prevents privacy leakage;
2nd, two-way authentication, under unsafe channel, i.e., will prevent the personation of user from will also prevent the personation of server, can
By algorithm or agreement guarantee;
3rd, dual factor anthentication, introduces other authentication modes such as password, to strengthen authentication strength.
How to meet above three condition, carry out safe biometric identity certification, be those skilled in the art
Problem in the urgent need to address at present.
Content of the invention
The technical assignment of the present invention is for above not enough, there is provided a kind of safe side based on biological characteristic long-distance identity-certifying
Method, solves under the internet environment of non-security channel, based on the problem how biological characteristic realizes safety identification authentication.
The present invention technical assignment realize in the following manner,
A kind of safe method based on biological characteristic long-distance identity-certifying, living things feature recognition merge contemporary cryptology, by
Cryptographic algorithm and protocol realization safety identification authentication;When registering first, biological characteristic as secret or is utilized biological characteristic
Secret generation is carried out, server does not store biological characteristic value, but the key that consults is deduced in storage;During authentication, according to clothes
The key that the key at business end, biological characteristic are generated does challenge checking, realizes two-way authentication.
Comprise the steps:
[one], registration process is as follows:
[1], by the collection certification terminal of client, gather the biological characteristic of user, biological characteristic is carried out successively pretreatment,
Feature extraction and coding, obtain biological characteristic value;
[2], biological characteristic value is processed through fuzzy extraction or error correcting code and obtains one section of public data and one section of secret data;
[3], secret data is destroyed;
[4], public data and user's registration information are encrypted using server side certificate, sends from client and store clothes
Business device end;
[two], verification process is as follows:
[5], when user passes through client login system, certification request is sent to server end;
[6], server end produces authentication challenge code data, and authentication challenge code data are obtained using the private key signature of server side certificate
Must sign value, signature value, authentication challenge code data are sent to client;
[7], collection certification terminal of the user by client, gathers the biological characteristic of user again, biological characteristic is entered successively
Row pretreatment, feature extraction and coding, obtain biological characteristic value;
[8], biological characteristic value is processed through fuzzy extraction or error correcting code and obtains one section of public data and one section of secret data;
[9], signature value of the client using server side certificate authentication verification challenge code data;If signature value is verified,
Show that service end-apparatus is credible;
[10], server end is sent to authentication challenge code data encryption using secret data;
[11], secret data is destroyed;
[12], after the data that received server-side is sent to [10th] step, the certification after encryption is decrypted using user's public data
Challenge code data, successful decryption, then it represents that certification success.
Step [2] is replaced with:Biological characteristic value is extracted or error correcting code process through fuzzy, and adds password, obtain one
Section public data and one section of secret data;Step [8] is replaced with:Biological characteristic value is extracted or error correcting code process through fuzzy,
And password is added, obtain one section of public data and one section of secret data.
The communication channel of client and server is communicated using SSL/TLS protocol securitys.
In step [4], encrypted using server side certificate, the AES for adopting is PKI asymmetric arithmetic RSA or SM2.
In step [6], server end produces a random number, adds timestamp as authentication challenge code data;Certification is chosen
Private key signature of the war code data using server side certificate, signature algorithm adopt PKI asymmetric arithmetic RSA or SM2.
In step [1] and step [7], collection certification terminal is photographic head or mike or fingerprint instrument or venous collection instrument;
Biological characteristic is face or vocal print or fingerprint or vein.
In step [9], client uses PKI technology, the signature of authentication verification challenge code data.
The a kind of safe of the present invention has advantages below based on the method for biological characteristic long-distance identity-certifying:
1st, safety identification authentication under the internet environment of non-security channel, based on biological characteristic disclosure satisfy that;
2nd, can realize that biological characteristic zero is stored, service end, client two-way authentication, supports other authentication factors, lift certification
Intensity;
3rd, the convenience of biological characteristic is remained, cryptographic technique is introduced and is enhanced safety:Using biological characteristic as secret or
Secret generation is carried out using biological characteristic with reference to other factors, recycle ripe cryptographic technique to realize authentication, so
To retain the convenience of biological characteristic authentication, protect the privacy of biological characteristic again, be provided simultaneously with higher safety;
4th, zero storage, zero transmission of biological characteristic are achieved, it is to avoid the leakage of private data;
5th, propose introducing password etc. multifactor, further enhancing safety.
Description of the drawings
The present invention is further described below in conjunction with the accompanying drawings.
Accompanying drawing 1 is a kind of register flow path figure of the embodiment 1 of the safe method based on biological characteristic long-distance identity-certifying;
Accompanying drawing 2 is a kind of identifying procedure figure of the embodiment 1 of the safe method based on biological characteristic long-distance identity-certifying;
Accompanying drawing 3 is a kind of register flow path figure of the embodiment 2 of the safe method based on biological characteristic long-distance identity-certifying;
Accompanying drawing 4 is a kind of identifying procedure figure of the embodiment 2 of the safe method based on biological characteristic long-distance identity-certifying.
Specific embodiment
The a kind of safe of the present invention is recognized based on biological characteristic remote identity with reference to Figure of description and specific embodiment
The method of card is described in detail below.
Embodiment 1:
A kind of safe method based on biological characteristic long-distance identity-certifying of the present invention, living things feature recognition merge modern password
Learn, by cryptographic algorithm and protocol realization safety identification authentication;When registering first, using biological characteristic as secret or using life
Thing feature carries out secret generation, and server does not store biological characteristic value, but the key that consults is deduced in storage;During authentication,
The key that key according to service end, biological characteristic are generated does challenge checking, realizes two-way authentication.
Specifically include following steps:
As shown in figure 1, registration process is as follows:
Step 101:By the collection certification terminal of client, the biological characteristic Um of user is gathered, biological characteristic Um is entered successively
Row pretreatment, feature extraction and coding, obtain biological characteristic value Wm;Collection certification terminal is photographic head;Biological characteristic is face;
Step 102:Biological characteristic value Wm through fuzzy extract or error correcting code process obtain one section of public data Pm and one section secret
Ciphertext data Rm;
Step 103:Destroy secret data Rm;
Step 104:Public data Pm and user's registration information are obtained P'm using server side certificate encryption, employing plus
Close algorithm is PKI asymmetric arithmetic RSA, is sent to server end from client, it is ensured that only server end can just receive the number
According to;
Step 105:P'm is decrypted using server end private key, public data Pm is obtained;
Step 106:Safe for public data Pm is stored in server end.
As shown in Fig. 2 verification process is as follows:
Step 201:When user passes through client login system, certification request is sent to server end;
Step 202:Server end produces a random number, adds timestamp as authentication challenge code data Nm;
Step 203:Authentication challenge code data Nm must be signed value Sn using the private key signature of server side certificate, and signature algorithm is adopted
PKI asymmetric arithmetic RSA;Signature value Sn, authentication challenge code data Nm are sent to client;
Step 204:Collection certification terminal of the user by client, gathers the biological characteristic Um of user, again to biological characteristic
Um carries out pretreatment, feature extraction and coding successively, obtains biological characteristic value W'm;
Step 205:Biological characteristic value W'm is processed through fuzzy extraction or error correcting code and obtains one section of public data P'm and one section
Secret data R'm;
Step 206:Client combines server side certificate, using PKI technology, the signature value of authentication verification challenge code data Nm
Sn;If signature value Sn is verified, show that service end-apparatus is credible;
Step 207:N''m is obtained to the encryption of authentication challenge code data Nm using secret data R'm, server end is sent to;Destroy
Secret data R'm;
Step 208:Received server-side decrypts the authentication challenge code data after encryption using user's public data Pm to after N''m
N''m, if data are equal to authentication challenge code data Nm, as successful decryption after decryption, then it represents that certification success, otherwise certification are lost
Lose.
The communication channel of client and server is communicated using SSL/TLS protocol securitys.
Embodiment 2:
A kind of safe method based on biological characteristic long-distance identity-certifying of the present invention, living things feature recognition merge modern password
Learn, by cryptographic algorithm and protocol realization safety identification authentication;When registering first, using biological characteristic as secret or using life
Thing feature carries out secret generation, and server does not store biological characteristic value, but the key that consults is deduced in storage;During authentication,
The key that key according to service end, biological characteristic are generated does challenge checking, realizes two-way authentication.
Specifically include following steps:
As shown in figure 3, registration process is as follows:
Step 101:By the collection certification terminal of client, the biological characteristic Um of user is gathered, biological characteristic Um is entered successively
Row pretreatment, feature extraction and coding, obtain biological characteristic value Wm;Collection certification terminal is fingerprint instrument;Biological characteristic is fingerprint;
Step 102:Biological characteristic value Wm is extracted or error correcting code process through fuzzy, and adds password, obtain one section of open number
According to Pm and one section of secret data Rm;
Step 103:Destroy secret data Rm;
Step 104:Public data Pm and user's registration information are obtained P'm using server side certificate encryption, employing plus
Close algorithm is SM2 algorithms, is sent to server end from client, it is ensured that only server end can just receive the data;
Step 105:P'm is decrypted using server end private key, public data Pm is obtained;
Step 106:Safe for public data Pm is stored in server end.
As shown in figure 4, verification process is as follows:
Step 201:When user passes through client login system, certification request is sent to server end;
Step 202:Server end produces a random number, adds timestamp as authentication challenge code data Nm;
Step 203:Authentication challenge code data Nm must be signed value Sn using the private key signature of server side certificate, and signature algorithm is adopted
SM2 algorithms;Signature value Sn, authentication challenge code data Nm are sent to client;
Step 204:Collection certification terminal of the user by client, gathers the biological characteristic Um of user, again to biological characteristic
Um carries out pretreatment, feature extraction and coding successively, obtains biological characteristic value W'm;
Step 205:Biological characteristic value W'm is extracted or error correcting code process through fuzzy, and adds password, obtain one section of open number
According to P'm and one section of secret data R'm;
Step 206:Client combines server side certificate, using PKI technology, the signature value of authentication verification challenge code data Nm
Sn;If signature value Sn is verified, show that service end-apparatus is credible;
Step 207:N''m is obtained to the encryption of authentication challenge code data Nm using secret data R'm, server end is sent to;Destroy
Secret data R'm;
Step 208:Received server-side decrypts the authentication challenge code data after encryption using user's public data Pm to after N''m
N''m, if data are equal to authentication challenge code data Nm, as successful decryption after decryption, then it represents that certification success, otherwise certification are lost
Lose.
The communication channel of client and server is communicated using SSL/TLS protocol securitys.
By specific embodiment above, the those skilled in the art can readily realize the present invention.But should
Work as understanding, the present invention is not limited to above-mentioned specific embodiment.On the basis of disclosed embodiment, the technical field
Technical staff can the different technical characteristic of combination in any, so as to realize different technical schemes.Other technological means
Conventional displacement can be done, such as collection certification terminal can also be that photographic head or mike or fingerprint instrument or venous collection instrument are a kind of
Or several combinations;Corresponding biological characteristic is obtained simultaneously:Face or vocal print or fingerprint or vein;Can also be by step 102
It is optimized with step 205, obtains enhanced scheme, except adding password, may be incorporated into the factor of other enhancing safeties.
In addition to the technical characteristic described in description, the known technology of those skilled in the art is.
Claims (8)
1. a kind of safe method based on biological characteristic long-distance identity-certifying, it is characterised in that will be existing for living things feature recognition fusion
For cryptography, by cryptographic algorithm and protocol realization safety identification authentication;First register when, biological characteristic as secret or
Secret generation is carried out using biological characteristic, server storage deduces the key that consults;During authentication, according to the close of service end
The key that key, biological characteristic are generated does challenge checking, realizes two-way authentication.
2. a kind of safe method based on biological characteristic long-distance identity-certifying according to claim 1, it is characterised in that
Comprise the steps:
[one], registration process is as follows:
[1], by the collection certification terminal of client, gather the biological characteristic of user, biological characteristic is carried out successively pretreatment,
Feature extraction and coding, obtain biological characteristic value;
[2], biological characteristic value is processed through fuzzy extraction or error correcting code and obtains one section of public data and one section of secret data;
[3], secret data is destroyed;
[4], public data and user's registration information are encrypted using server side certificate, sends from client and store clothes
Business device end;
[two], verification process is as follows:
[5], when user passes through client login system, certification request is sent to server end;
[6], server end produces authentication challenge code data, and authentication challenge code data are obtained using the private key signature of server side certificate
Must sign value, signature value, authentication challenge code data are sent to client;
[7], collection certification terminal of the user by client, gathers the biological characteristic of user again, biological characteristic is entered successively
Row pretreatment, feature extraction and coding, obtain biological characteristic value;
[8], biological characteristic value is processed through fuzzy extraction or error correcting code and obtains one section of public data and one section of secret data;
[9], signature value of the client using server side certificate authentication verification challenge code data;If signature value is verified,
Show that service end-apparatus is credible;
[10], server end is sent to authentication challenge code data encryption using secret data;
[11], secret data is destroyed;
[12], after the data that received server-side is sent to [10th] step, the certification after encryption is decrypted using user's public data
Challenge code data, successful decryption, then it represents that certification success.
3. a kind of safe method based on biological characteristic long-distance identity-certifying according to claim 2, it is characterised in that
Step [2] is replaced with:Biological characteristic value is extracted or error correcting code process through fuzzy, and adds password, obtain one section of open number
According to one section of secret data;Step [8] is replaced with:Biological characteristic value is extracted or error correcting code process through fuzzy, and adds mouth
Order, obtains one section of public data and one section of secret data.
4. a kind of safe method based on biological characteristic long-distance identity-certifying according to claim 2, it is characterised in that
The communication channel of client and server is communicated using SSL/TLS protocol securitys.
5. a kind of safe method based on biological characteristic long-distance identity-certifying according to claim 2, it is characterised in that
In step [4], encrypted using server side certificate, the AES for adopting is PKI asymmetric arithmetic RSA or SM2.
6. a kind of safe method based on biological characteristic long-distance identity-certifying according to claim 2, it is characterised in that
In step [6], server end produces a random number, adds timestamp as authentication challenge code data;Authentication challenge code data
Using the private key signature of server side certificate, signature algorithm adopts PKI asymmetric arithmetic RSA or SM2.
7. a kind of safe method based on biological characteristic long-distance identity-certifying according to claim 2, it is characterised in that
In step [1] and step [7], collection certification terminal is photographic head or mike or fingerprint instrument or venous collection instrument;Biological characteristic
For face or vocal print or fingerprint or vein.
8. a kind of safe method based on biological characteristic long-distance identity-certifying according to claim 2, it is characterised in that
In step [9], client uses PKI technology, the signature of authentication verification challenge code data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611115259.6A CN106506168A (en) | 2016-12-07 | 2016-12-07 | A kind of safe method based on biological characteristic long-distance identity-certifying |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611115259.6A CN106506168A (en) | 2016-12-07 | 2016-12-07 | A kind of safe method based on biological characteristic long-distance identity-certifying |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106506168A true CN106506168A (en) | 2017-03-15 |
Family
ID=58330487
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611115259.6A Pending CN106506168A (en) | 2016-12-07 | 2016-12-07 | A kind of safe method based on biological characteristic long-distance identity-certifying |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106506168A (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107332668A (en) * | 2017-06-05 | 2017-11-07 | 国政通科技股份有限公司 | A kind of method and apparatus for handling encrypted message |
CN107705198A (en) * | 2017-03-24 | 2018-02-16 | 广东网金控股股份有限公司 | A kind of method and system for securely delivering U-shield |
CN108737103A (en) * | 2018-03-27 | 2018-11-02 | 中国科学院数据与通信保护研究教育中心 | A kind of SM2 algorithm endorsement methods applied to CS frameworks |
CN109086014A (en) * | 2018-08-22 | 2018-12-25 | 上海纳孚通信设备技术有限公司 | The method and system of document secure printing are realized using biological identification technology |
CN109547503A (en) * | 2018-05-17 | 2019-03-29 | 北京岸思信息科技有限公司 | Biological feather recognition method |
CN109840405A (en) * | 2017-11-29 | 2019-06-04 | 上海荆虹电子科技有限公司 | A kind of identification authentication system and its application method |
CN110224713A (en) * | 2019-06-12 | 2019-09-10 | 读书郎教育科技有限公司 | A kind of high security intelligence children wrist-watch and its safety protecting method |
CN110391909A (en) * | 2018-04-20 | 2019-10-29 | 武汉真元生物数据有限公司 | Terminal unlock method and system based on living things feature recognition |
CN110392030A (en) * | 2018-04-20 | 2019-10-29 | 武汉真元生物数据有限公司 | A kind of authentication based on biological characteristic, method for processing business and system |
CN111356118A (en) * | 2018-12-20 | 2020-06-30 | 上海银基信息安全技术股份有限公司 | Interactive key generation method and system, Bluetooth electronic equipment and storage medium |
CN111611623A (en) * | 2020-07-03 | 2020-09-01 | 腾讯科技(深圳)有限公司 | Private data processing method and device |
CN112040481A (en) * | 2020-08-19 | 2020-12-04 | 广东电网有限责任公司广州供电局 | Secondary authentication method based on 5G communication gateway |
CN112417424A (en) * | 2020-12-02 | 2021-02-26 | 中国电力科学研究院有限公司 | Authentication method and system for power terminal |
CN113691367A (en) * | 2020-05-16 | 2021-11-23 | 成都天瑞芯安科技有限公司 | Desensitized safe biological characteristic identity authentication method |
CN113688651A (en) * | 2020-05-16 | 2021-11-23 | 成都天瑞芯安科技有限公司 | Biological characteristic password desensitization protection method based on SM9 algorithm |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103124269A (en) * | 2013-03-05 | 2013-05-29 | 桂林电子科技大学 | Bidirectional identity authentication method based on dynamic password and biologic features under cloud environment |
CN103237038A (en) * | 2013-05-09 | 2013-08-07 | 中国电子科技集团公司第三十研究所 | Two-way network access authentication method based on digital certificate |
US20130212645A1 (en) * | 2010-10-29 | 2013-08-15 | Hitachi, Ltd. | Information authentication method and information authentication system |
CN103607282A (en) * | 2013-11-22 | 2014-02-26 | 成都卫士通信息产业股份有限公司 | Identity fusion authentication method based on biological characteristics |
CN103888442A (en) * | 2014-01-13 | 2014-06-25 | 黄晓芳 | System with integration of visualization biological characteristics and one-time digital signature and method thereof |
CN105391713A (en) * | 2015-11-09 | 2016-03-09 | 浙江工业大学 | Biological-certificate-based identity authentication method |
-
2016
- 2016-12-07 CN CN201611115259.6A patent/CN106506168A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130212645A1 (en) * | 2010-10-29 | 2013-08-15 | Hitachi, Ltd. | Information authentication method and information authentication system |
CN103124269A (en) * | 2013-03-05 | 2013-05-29 | 桂林电子科技大学 | Bidirectional identity authentication method based on dynamic password and biologic features under cloud environment |
CN103237038A (en) * | 2013-05-09 | 2013-08-07 | 中国电子科技集团公司第三十研究所 | Two-way network access authentication method based on digital certificate |
CN103607282A (en) * | 2013-11-22 | 2014-02-26 | 成都卫士通信息产业股份有限公司 | Identity fusion authentication method based on biological characteristics |
CN103888442A (en) * | 2014-01-13 | 2014-06-25 | 黄晓芳 | System with integration of visualization biological characteristics and one-time digital signature and method thereof |
CN105391713A (en) * | 2015-11-09 | 2016-03-09 | 浙江工业大学 | Biological-certificate-based identity authentication method |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107705198A (en) * | 2017-03-24 | 2018-02-16 | 广东网金控股股份有限公司 | A kind of method and system for securely delivering U-shield |
CN107332668A (en) * | 2017-06-05 | 2017-11-07 | 国政通科技股份有限公司 | A kind of method and apparatus for handling encrypted message |
CN109840405A (en) * | 2017-11-29 | 2019-06-04 | 上海荆虹电子科技有限公司 | A kind of identification authentication system and its application method |
CN108737103A (en) * | 2018-03-27 | 2018-11-02 | 中国科学院数据与通信保护研究教育中心 | A kind of SM2 algorithm endorsement methods applied to CS frameworks |
CN108737103B (en) * | 2018-03-27 | 2021-06-29 | 中国科学院数据与通信保护研究教育中心 | SM2 algorithm signature method applied to CS framework |
CN110392030B (en) * | 2018-04-20 | 2021-12-14 | 武汉真元生物数据有限公司 | Identity authentication and service processing method and system based on biological characteristics |
CN110391909A (en) * | 2018-04-20 | 2019-10-29 | 武汉真元生物数据有限公司 | Terminal unlock method and system based on living things feature recognition |
CN110392030A (en) * | 2018-04-20 | 2019-10-29 | 武汉真元生物数据有限公司 | A kind of authentication based on biological characteristic, method for processing business and system |
CN109547503A (en) * | 2018-05-17 | 2019-03-29 | 北京岸思信息科技有限公司 | Biological feather recognition method |
CN109086014A (en) * | 2018-08-22 | 2018-12-25 | 上海纳孚通信设备技术有限公司 | The method and system of document secure printing are realized using biological identification technology |
CN109086014B (en) * | 2018-08-22 | 2021-03-16 | 上海旷沃科技有限公司 | Method and system for realizing safe printing of file by using biometric identification technology |
CN111356118A (en) * | 2018-12-20 | 2020-06-30 | 上海银基信息安全技术股份有限公司 | Interactive key generation method and system, Bluetooth electronic equipment and storage medium |
CN111356118B (en) * | 2018-12-20 | 2023-07-25 | 上海银基信息安全技术股份有限公司 | Interactive key generation method, system, bluetooth electronic device and storage medium |
CN110224713A (en) * | 2019-06-12 | 2019-09-10 | 读书郎教育科技有限公司 | A kind of high security intelligence children wrist-watch and its safety protecting method |
CN113691367A (en) * | 2020-05-16 | 2021-11-23 | 成都天瑞芯安科技有限公司 | Desensitized safe biological characteristic identity authentication method |
CN113688651A (en) * | 2020-05-16 | 2021-11-23 | 成都天瑞芯安科技有限公司 | Biological characteristic password desensitization protection method based on SM9 algorithm |
CN113691367B (en) * | 2020-05-16 | 2024-04-12 | 成都天瑞芯安科技有限公司 | Desensitization safety biological characteristic identity authentication method |
CN111611623A (en) * | 2020-07-03 | 2020-09-01 | 腾讯科技(深圳)有限公司 | Private data processing method and device |
CN112040481A (en) * | 2020-08-19 | 2020-12-04 | 广东电网有限责任公司广州供电局 | Secondary authentication method based on 5G communication gateway |
CN112040481B (en) * | 2020-08-19 | 2023-10-24 | 广东电网有限责任公司广州供电局 | Secondary authentication method based on 5G communication gateway |
CN112417424A (en) * | 2020-12-02 | 2021-02-26 | 中国电力科学研究院有限公司 | Authentication method and system for power terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106506168A (en) | A kind of safe method based on biological characteristic long-distance identity-certifying | |
CN103124269B (en) | Based on the Bidirectional identity authentication method of dynamic password and biological characteristic under cloud environment | |
CN104796265B (en) | A kind of Internet of Things identity identifying method based on Bluetooth communication access | |
CN107819587B (en) | Authentication method based on fully homomorphic encryption, user equipment and authentication server | |
WO2020087805A1 (en) | Trusted authentication method employing two cryptographic values and chaotic encryption in measurement and control network | |
CN108243166A (en) | A kind of identity identifying method and system based on USBKey | |
CN105162599B (en) | A kind of data transmission system and its transmission method | |
CN103067390A (en) | User registration authentication method and system based on facial features | |
CN104243494B (en) | A kind of data processing method | |
CN106464493B (en) | Permanent authentication system containing one-time pass code | |
Bindu et al. | Improved remote user authentication scheme preserving user anonymity | |
CN102685110A (en) | Universal method and system for user registration authentication based on fingerprint characteristics | |
CN109474419A (en) | A kind of living body portrait photo encryption and decryption method and encrypting and deciphering system | |
CN110020524A (en) | A kind of mutual authentication method based on smart card | |
US11722466B2 (en) | Methods for communicating data utilizing sessionless dynamic encryption | |
CN103036674A (en) | Computer permission control method based on mobile dynamic password | |
CN105450419A (en) | Method, device and system | |
CN106789032A (en) | The single password tripartite authentication method of privacy sharing between server and mobile device | |
CN103297237B (en) | Identity registration and authentication method, system, personal authentication apparatus and certificate server | |
CN106789524A (en) | The high speed parsing of VPN encrypted tunnels and restoring method | |
CZ2013373A3 (en) | Authentication method of safe data channel | |
Yongliang et al. | Elliptic curve cryptography based wireless authentication protocol | |
CN106230840B (en) | A kind of command identifying method of high security | |
Sun et al. | A lightweight multi-factor mobile user authentication scheme | |
CN116388995A (en) | Lightweight smart grid authentication method based on PUF |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170315 |