CN107257283A - Fingerprint verification method based on quantum figure state - Google Patents
Fingerprint verification method based on quantum figure state Download PDFInfo
- Publication number
- CN107257283A CN107257283A CN201710284104.3A CN201710284104A CN107257283A CN 107257283 A CN107257283 A CN 107257283A CN 201710284104 A CN201710284104 A CN 201710284104A CN 107257283 A CN107257283 A CN 107257283A
- Authority
- CN
- China
- Prior art keywords
- quantum
- fingerprint
- state
- server
- finger print
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/1347—Preprocessing; Feature extraction
- G06V40/1353—Extracting features related to minutiae or pores
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Electromagnetism (AREA)
- Life Sciences & Earth Sciences (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Human Computer Interaction (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention discloses a kind of fingerprint verification method based on quantum figure state, finger print information is obtained applied to FTP client FTP, and complete finger print minutiae point information is encrypted to after encoded sequence information sent to server, the fingerprint sequence information that server is decrypted and obtained, judge whether fingerprint point information is consistent with the user fingerprints information of storage by the stable child-operation to quantum coding figure state, and will determine that result feeds back to client, if, finger print information certification success, if it is not, finger print information authentification failure waits new finger print identifying.For verifying legal identity between communicating pair during finger print identification verification.
Description
Technical field
The invention belongs to Technique on Quantum Communication field, it is related to a kind of fingerprint verification method based on quantum figure state.
Background technology
With the fast development of computer networking technology, transmission, acquisition and the issue of information have penetrated into daily life
In.Therefore, various information leakage and the illegal event for obtaining information constantly occur.Computer cryptography refers to set up to be protected in Shannon
Ensure its security on the basis of close communication theory basis and computational complexity with the computing capability of computer or computer network
Cryptographic system.Secret algorithm in computer cryptology is often based upon computation complexity and the mathematical problem that can not be cracked, mesh
It is preceding to use most AES DES, AES, RSA, ECC etc..
The quantum computer proposed at present can significantly shorten the time for extracting user's information needed, can be solved in several days
Certainly traditional calculations chance spend millions of years just treatable data, the peace of the appearance of quantum computer to computer cipher system
Full property has deathblow.
Quantum information science technology is that quantum mechanics and computer science and technology are combined the interdisciplinary science grown up, is adopted
With carrier of the quantum state as information, there are big advantage and bright prospect in the scientific domain such as communication and computer.Quantum
Cryptographic technique is the product that cryptography is combined with quantum mechanics, and its security is by depending on the big general principle of quantum mechanics two, i.e.,
Heisenberg's uncertainty principle (the Heisenberg uncertainty principle) and unclonable principle (the
quantum no-cloning theorem).Quantum figure state is a kind of multicomponent Quantum Entangled States, can use vertex set and side
Collection is combined into mathematic graph to state.Figure state is the specific algorithm resource of quantum calculation model, is stable in Quantum Error Correcting Codes
The subset of subcode, is also to construct one of method of Quantum Error Correcting Codes.Figure state has been always research quantum calculation, amount since the proposition
Sub- error correction, the important tool of quanta cryptology technique.
Finger print identifying technology is one of core technology of information security, and finger print identifying technology is the fingerprint pair with him user
It should get up, be compared by the fingerprint for comparing his fingerprint He pre-saving, it is possible to verify its true identity.Its principle exists
In everyone fingerprint lines on pattern, breakpoint and crosspoint it is different, with uniqueness and stability.Biological fingerprint feature
It is real-life extensive use so that the security and privacy sex chromosome mosaicism that people bring for it are increasingly paid close attention to.
Based on the above analysis, the powerful computer capacity of quantum calculation can break through many mathematical problems, at present
Most of finger print identifying algorithm face very big threat, quantum figure state is combined with finger print identifying technology, using quantum calculation come
Finger print information is authenticated, the unconditional security of algorithm can be ensured by the peculiar physical property of quantum, thus is designed such a
Safe and reliable verification algorithm is necessary
The content of the invention
To achieve the above object, the present invention provides a kind of fingerprint verification method based on quantum figure state, solves and refers to safely
Information leakage problem caused by classical identifying algorithm in line Verification System.
The technical solution adopted in the present invention is, a kind of fingerprint verification method based on quantum figure state, according to following steps
Carry out:
Step S1:Fingerprint image acquisition;
Receive user input fingerprint image, take the fingerprint on minutiae point, processing is digitized to fingerprint image, general
Fingerprint minutiae is encoded into the n positions binary sequence being made up of { 0,1 };
Step S2:Apply for quantum key;
Client receives and sends key application request, server by utilizing quantum channel hair to server immediately after fingerprint image
The quantum ID keys after encryption are sent to share quantum ID keys to the client for sending application request, i.e. server and client;
Step S3:Cryptographic fingerprint information;
The finger print information that client inputs user and ID key bindings, generate assistance data;
Step S4:Client sends assistance data to server, and server by utilizing ID secret key decryptions go out finger print information;
Step S5:Server carries out the finger print information decrypted and the user fingerprints information stored in fingerprint database
Fingerprint matching is verified;
Step S6:Judgement verifies whether success, terminates communication if success;If checking is failed, it is transferred in step S1,
Client extracts user fingerprint image again.
Further, the step of step S5 is as follows:
Step 1) server prepare 3 particle entangleds quantum figure state3 tops in figure state
Point is respectively labeled as AS, User and Data, utilizes formulaFigure state is encoded
Operation, whereinFor code pattern state,Expansion beFor Kronecker product, li2∈ { 0,1 },Refer to, work as li2I operation is carried out to i-th and summit when=0, works as li2To i-th and summit progress Z operations when=1, i ∈ 1,2,
3 }, I, Z are respectively Pauli matrixesSummit AS, User and Data therein label are set
For (0, l12)(0,l22) and (0, l32), wherein l12=0;
Step 2) sequence that the finger print information that server decrypts is made up of n quantum states is set, be designated as | S>
=| Sj>:J ∈ { 1,2 ..., n } }, wherein | Sj>∈{|0>,|1>Represent jth position quantum state;
Step 3) verification operation, by quantum figure state stabistorAct on code pattern stateAnd operate n times, jth time behaviour
During work, l22 j=SjThat is l22 j∈ { 0,1 }, l22 jLength for user finger print data library storage in the server is n fingerprints
Jth position in data information sequence, marks l22Transfer process be formulatedWhereinl22When=0,Work as l22=1,
⊕ is XOR symbol,For Kronecker product;
Step 4) as any lj 32⊕lj 22=0 all sets up, i.e. fingerprint matching success, and server is by fingerprint matching successful information
Feed back to client;
When there is lj 32⊕lj 22=1, then fingerprint matching fails, and fingerprint matching failure information is fed back to client by server
End, Client-Prompt user re-enters fingerprint.
Further, the step 1) in, the preparation process step of figure state is as follows:
(1) be ready to by | 000>Constitute quantum Bit String;
(2) each quantum bit is carried out Hadamard conversion, become |+>State;
(3) for pure figure state | G>Figure in quantum bit corresponding to adjacent two summits be controlled the operation of Z,
That is CZ | ε ε '>=(- 1)εε'|εε'>, whereinFor two-dimentional Hilbert space,
Beneficial effects of the present invention:Quantum figure state algorithm is combined with finger print identifying technology, can be peculiar physical by quantum
The unconditional security of algorithm is demonstrate,proved in quality guarantee, while the powerful computing capability of quantum, can effectively improve the efficiency of finger print identifying.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with
Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is principle of the invention figure.
Fig. 2 is workflow diagram of the present invention.
Fig. 3 be the present invention a kind of stable child-operation of quantum figure state is provided implement fingerprint verification method schematic diagram.
Embodiment
Below in conjunction with the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely retouched
State, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.Based on the present invention
In embodiment, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made
Example, belongs to the scope of protection of the invention.
A kind of fingerprint verification method based on quantum figure state, including client and server, as shown in Figure 1-2, client
Communicated with server, user can step on input fingerprint by client, client can pass through quantum network and server point
Key is enjoyed, the fingerprint for being inputted to user carries out associated encryption algorithm process;Server, can carry out matching to fingerprint and test
Card, and feed back to client.
Specific implementation step is as follows:
Step S1:Fingerprint image acquisition;
Receive user input fingerprint image, take the fingerprint on minutiae point, processing is digitized to fingerprint image, general
Fingerprint minutiae is encoded into the n positions binary sequence being made up of { 0,1 };
Step S2:Apply for quantum key;
Client receives and sends key application request, server by utilizing quantum channel hair to server immediately after fingerprint image
The quantum ID keys after encryption are sent to share quantum ID keys to the client for sending application request, i.e. server and client;
Step S3:Cryptographic fingerprint information;
The finger print information that client inputs user and ID key bindings, generate assistance data;
Step S4:Client sends assistance data to server, and server by utilizing ID secret key decryptions go out finger print information;
Step S5:Server carries out the finger print information decrypted and the user fingerprints information stored in fingerprint database
Fingerprint matching is verified.
Step S6:Judgement verifies whether success, terminates communication if success;If checking is failed, it is transferred in step S1,
Client extracts user fingerprint image again.
Wherein, step S5 is comprised the following steps that:
1) server prepares the quantum figure state of 3 particle entangleds3 summits point in figure state
Biao Ji not be that User and Data utilize formulaCoding behaviour is carried out to figure state
Make, whereinFor code pattern state,Expansion beFor Kronecker product, li2∈ { 0,1 },
Refer to, work as li2I operation is carried out to i-th and summit when=0, works as li2To i-th and summit progress Z operations when=1, i ∈ { 1,2,3 },
I, Z are respectively Pauli matrixesSummit AS, User and Data therein label are set to (0,
l12)(0,l22) and (0, l32), wherein l12=0;
The preparation process step of figure state is as follows in the step:
(1) be ready to by | 000>Constitute quantum Bit String;
(2) each quantum bit is carried out Hadamard conversion, become |+>State;
(3) for pure figure state | G>Figure in quantum bit corresponding to adjacent two summits be controlled the operation of Z,
That is CZ | ε ε '>=(- 1)εε'|εε'>, whereinFor two-dimentional Hilbert space,
2) sequence that the finger print information that server decrypts is made up of n quantum states is set, is designated as | S>=|
Sj>:J ∈ { 1,2 ..., n } }, wherein | Sj>∈{|0>,|1>Represent jth position quantum state;
3) verification operation, by quantum figure state stabistorAct on code pattern stateAnd operate n times, jth time was operated
Cheng Zhong, l22 j=SjThat is l22 j∈ { 0,1 }, l22 jLength for user finger print data library storage in the server is n finger print datas
Jth position in information sequence, marks l22Transfer process be formulatedWhereinWhen,When⊕
For XOR symbol,For Kronecker product;
4) as any lj 32⊕lj 22=0 all sets up, i.e. fingerprint matching success, server feeds back fingerprint matching successful information
To client;
When there is lj 32⊕lj 22=1, then fingerprint matching fails, and fingerprint matching failure information is fed back to client by server
End, Client-Prompt user re-enters fingerprint.
What Fig. 3 showed the stable child-operation of quantum figure state in the present invention implements fingerprint verification method.Fig. 3 (a) is
Code pattern state before fingerprint authenticationFig. 3 (b) is the code pattern state after normal fingerprints are verified.When the server carries out fingerprint
During checking, summit User is by stabistorAct in quantum figure state, its label l22 jIt is transferred on the Data of summit, arrows
The transfer of mark.Label in being operated when n times on Data is (0,0) i.e. lj 32⊕lj 22When=0, wherein ⊕ is XOR symbol, j
Otherwise ∈ { 1,2 ..., n }, fingerprint authentication successful match fails, and feeds back signal to the client requirements and re-types fingerprint.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the scope of the present invention.It is all
Any modification, equivalent substitution and improvements made within the spirit and principles in the present invention etc., are all contained in protection scope of the present invention
It is interior.
Claims (3)
1. a kind of fingerprint verification method based on quantum figure state, it is characterised in that follow the steps below:
Step S1:Fingerprint image acquisition;
Receive user input fingerprint image, take the fingerprint on minutiae point, processing is digitized to fingerprint image, by fingerprint
Minutiae point is encoded into the n positions binary sequence being made up of { 0,1 };
Step S2:Apply for quantum key;
Client is received and sends key application request to server immediately after fingerprint image, and server by utilizing quantum channel, which is sent, to be added
Quantum ID keys after close share quantum ID keys to the client for sending application request, i.e. server and client;
Step S3:Cryptographic fingerprint information;
The finger print information that client inputs user and ID key bindings, generate assistance data;
Step S4:Client sends assistance data to server, and server by utilizing ID secret key decryptions go out finger print information;
Step S5:The finger print information decrypted and the user fingerprints information stored in fingerprint database are carried out fingerprint by server
Matching checking;
Step S6:Judgement verifies whether success, terminates communication if success;If checking is failed, it is transferred in step S1, client
Again user fingerprint image is extracted in end.
2. the fingerprint verification method according to claim 1 based on quantum figure state, it is characterised in that the step of the step S5
It is rapid as follows:
Step 1) server prepare 3 particle entangleds quantum figure state3 summits point in figure state
Biao Ji not be that User and Data utilize formulaCoding behaviour is carried out to figure state
Make, whereinFor code pattern state,Expansion be For Kronecker product, li2∈ { 0,1 },It is
Refer to, work as li2I operation is carried out to i-th and summit when=0, works as li2To i-th and summit progress Z operations when=1, i ∈ { 1,2,3 }, I,
Z is respectively Pauli matrixesSummit AS, User and Data therein label are set to (0,
l12)(0,l22) and (0, l32), wherein l12=0;
Step 2) sequence that the finger print information that server decrypts is made up of n quantum states is set, be designated as | S>=| Sj
>:J ∈ { 1,2 ..., n } }, wherein | Sj>∈{|0>,|1>Represent jth position quantum state;
Step 3) verification operation, by quantum figure state stabistorAct on code pattern stateAnd operate n times, jth time was operated
Cheng Zhong, l22 j=SjThat is l22 j∈ { 0,1 }, l22 jLength for user finger print data library storage in the server is n finger print datas
Jth position in information sequence, marks l22Transfer process be formulatedWhereinl22When=0,Work as l22=1, For XOR symbol,For Kronecker product;
Step 4) when anyAll set up, i.e. fingerprint matching success, server feeds back to fingerprint matching successful information
Client;
Work as presenceThen fingerprint matching fails, and fingerprint matching failure information is fed back to client, client by server
Prompting user re-enters fingerprint.
3. the fingerprint verification method according to claim 2 based on quantum figure state, it is characterised in that the step 1) in,
The preparation process step of figure state is as follows:
(1) be ready to by | 000>Constitute quantum Bit String;
(2) each quantum bit is carried out Hadamard conversion, become |+>State;
(3) for pure figure state | G>Figure in quantum bit corresponding to adjacent two summits be controlled the operation of Z, i.e. CZ |
εε'>=(- 1)εε'|εε'>, wherein ε, ε ' ∈ { 0,1 }, For two-dimentional Hilbert space,
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710284104.3A CN107257283B (en) | 2017-04-26 | 2017-04-26 | Fingerprint verification method based on quantum figure state |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710284104.3A CN107257283B (en) | 2017-04-26 | 2017-04-26 | Fingerprint verification method based on quantum figure state |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107257283A true CN107257283A (en) | 2017-10-17 |
CN107257283B CN107257283B (en) | 2019-11-08 |
Family
ID=60027175
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710284104.3A Expired - Fee Related CN107257283B (en) | 2017-04-26 | 2017-04-26 | Fingerprint verification method based on quantum figure state |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107257283B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108810016A (en) * | 2018-07-11 | 2018-11-13 | 长春大学 | Terminal access authentication method based on quantum cryptography watermark |
CN108833100A (en) * | 2018-07-27 | 2018-11-16 | 江苏亨通问天量子信息研究院有限公司 | Information Authentication method, transmitting terminal system, receiving terminal system and verifying end system |
CN109194469A (en) * | 2018-09-04 | 2019-01-11 | 中南大学 | Fingerprint verification method based on continuous variable quantum key distribution |
CN115107701A (en) * | 2022-07-26 | 2022-09-27 | 合众新能源汽车有限公司 | Automobile anti-theft authentication method and system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101777115B (en) * | 2009-11-25 | 2012-02-15 | 中国科学院自动化研究所 | Safe fingerprint verification method and system |
CN102750529A (en) * | 2012-07-24 | 2012-10-24 | 南京邮电大学 | Biometric fingerprint authentication method based on quantum fuzzy commitment |
CN105471584A (en) * | 2015-12-04 | 2016-04-06 | 长春大学 | Identity authentication method based on quantum key encryption |
CN105991285A (en) * | 2015-02-16 | 2016-10-05 | 阿里巴巴集团控股有限公司 | Identity authentication methods, devices and system applied to quantum key distribution process |
CN106330440A (en) * | 2016-11-23 | 2017-01-11 | 长春大学 | Mobile network quantum key distribution system based on near-field communication and distribution method thereof |
-
2017
- 2017-04-26 CN CN201710284104.3A patent/CN107257283B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101777115B (en) * | 2009-11-25 | 2012-02-15 | 中国科学院自动化研究所 | Safe fingerprint verification method and system |
CN102750529A (en) * | 2012-07-24 | 2012-10-24 | 南京邮电大学 | Biometric fingerprint authentication method based on quantum fuzzy commitment |
CN105991285A (en) * | 2015-02-16 | 2016-10-05 | 阿里巴巴集团控股有限公司 | Identity authentication methods, devices and system applied to quantum key distribution process |
CN105471584A (en) * | 2015-12-04 | 2016-04-06 | 长春大学 | Identity authentication method based on quantum key encryption |
CN106330440A (en) * | 2016-11-23 | 2017-01-11 | 长春大学 | Mobile network quantum key distribution system based on near-field communication and distribution method thereof |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108810016A (en) * | 2018-07-11 | 2018-11-13 | 长春大学 | Terminal access authentication method based on quantum cryptography watermark |
CN108833100A (en) * | 2018-07-27 | 2018-11-16 | 江苏亨通问天量子信息研究院有限公司 | Information Authentication method, transmitting terminal system, receiving terminal system and verifying end system |
CN108833100B (en) * | 2018-07-27 | 2021-07-20 | 江苏亨通问天量子信息研究院有限公司 | Information verification method, sending end system, receiving end system and verification end system |
CN109194469A (en) * | 2018-09-04 | 2019-01-11 | 中南大学 | Fingerprint verification method based on continuous variable quantum key distribution |
CN109194469B (en) * | 2018-09-04 | 2020-12-18 | 中南大学 | Fingerprint authentication method based on continuous variable quantum key distribution |
CN115107701A (en) * | 2022-07-26 | 2022-09-27 | 合众新能源汽车有限公司 | Automobile anti-theft authentication method and system |
CN115107701B (en) * | 2022-07-26 | 2024-02-23 | 合众新能源汽车股份有限公司 | Automobile anti-theft authentication method and system |
Also Published As
Publication number | Publication date |
---|---|
CN107257283B (en) | 2019-11-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20200252203A1 (en) | Biometric verification of a blockchain database transaction contributor | |
EP3435591B1 (en) | 1:n biometric authentication, encryption, signature system | |
CN105471584B (en) | A kind of identity identifying method based on quantum key encryption | |
CN110969431B (en) | Secure hosting method, device and system for private key of blockchain digital coin | |
CN107257283B (en) | Fingerprint verification method based on quantum figure state | |
CN105553657B (en) | A kind of fingerprint fuzzy vault implementation method of feature-based fusion | |
CN104408356B (en) | A kind of fingerprint verification method and system, fingerprint template encryption device | |
CN107493168B (en) | Quanta identity authentication method and its application method during quantum key distribution | |
CN101945114A (en) | Identity authentication method based on fuzzy vault and digital certificate | |
CN103929308B (en) | Information Authentication method applied to rfid card | |
CN102004872A (en) | Fingerprint encryption-based identity authentication system and implementation method thereof | |
CN105450419A (en) | Method, device and system | |
CN106533697A (en) | Random number generating and extracting method and application thereof to identity authentication | |
CN116318617B (en) | Medical rescue material charity donation method based on RFID and blockchain | |
Barman et al. | A novel secure key-exchange protocol using biometrics of the sender and receiver | |
CN111768523A (en) | CTID-based NFC intelligent door lock unlocking method, system, equipment and medium | |
Aanjanadevi et al. | Face Attribute Convolutional Neural Network System for Data Security with Improved Crypto Biometrics. | |
CN107317676A (en) | Method for distributing key based on quantum figure state | |
CN114065169B (en) | Privacy protection biometric authentication method and device and electronic equipment | |
CN110492992A (en) | A kind of data encryption and transmission method based on radio RF recognition technology | |
Barman et al. | Approach to cryptographic key generation from fingerprint biometrics | |
Alrifaee et al. | Cryptography based on retina information | |
CN101933287B (en) | The encrypting and authenticating apparatus and method of the disposable one time key of antagonism wooden horse formula | |
Dong et al. | Security enhancement of biometrics, cryptography and data hiding by their combinations | |
CN105227562A (en) | The key business data transmission mediation device of identity-based checking and using method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information |
Inventor after: Guo Ying Inventor after: Li Fei Inventor after: Ma Hongling Inventor after: Peng Siwei Inventor before: Li Fei Inventor before: Guo Ying Inventor before: Ma Hongling Inventor before: Peng Siwei |
|
CB03 | Change of inventor or designer information | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20191108 Termination date: 20200426 |
|
CF01 | Termination of patent right due to non-payment of annual fee |