CN107257283A - Fingerprint verification method based on quantum figure state - Google Patents

Fingerprint verification method based on quantum figure state Download PDF

Info

Publication number
CN107257283A
CN107257283A CN201710284104.3A CN201710284104A CN107257283A CN 107257283 A CN107257283 A CN 107257283A CN 201710284104 A CN201710284104 A CN 201710284104A CN 107257283 A CN107257283 A CN 107257283A
Authority
CN
China
Prior art keywords
quantum
fingerprint
state
server
finger print
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710284104.3A
Other languages
Chinese (zh)
Other versions
CN107257283B (en
Inventor
李飞
郭迎
马红玲
彭思维
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Central South University
Original Assignee
Central South University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Central South University filed Critical Central South University
Priority to CN201710284104.3A priority Critical patent/CN107257283B/en
Publication of CN107257283A publication Critical patent/CN107257283A/en
Application granted granted Critical
Publication of CN107257283B publication Critical patent/CN107257283B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1347Preprocessing; Feature extraction
    • G06V40/1353Extracting features related to minutiae or pores
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Electromagnetism (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Human Computer Interaction (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a kind of fingerprint verification method based on quantum figure state, finger print information is obtained applied to FTP client FTP, and complete finger print minutiae point information is encrypted to after encoded sequence information sent to server, the fingerprint sequence information that server is decrypted and obtained, judge whether fingerprint point information is consistent with the user fingerprints information of storage by the stable child-operation to quantum coding figure state, and will determine that result feeds back to client, if, finger print information certification success, if it is not, finger print information authentification failure waits new finger print identifying.For verifying legal identity between communicating pair during finger print identification verification.

Description

Fingerprint verification method based on quantum figure state
Technical field
The invention belongs to Technique on Quantum Communication field, it is related to a kind of fingerprint verification method based on quantum figure state.
Background technology
With the fast development of computer networking technology, transmission, acquisition and the issue of information have penetrated into daily life In.Therefore, various information leakage and the illegal event for obtaining information constantly occur.Computer cryptography refers to set up to be protected in Shannon Ensure its security on the basis of close communication theory basis and computational complexity with the computing capability of computer or computer network Cryptographic system.Secret algorithm in computer cryptology is often based upon computation complexity and the mathematical problem that can not be cracked, mesh It is preceding to use most AES DES, AES, RSA, ECC etc..
The quantum computer proposed at present can significantly shorten the time for extracting user's information needed, can be solved in several days Certainly traditional calculations chance spend millions of years just treatable data, the peace of the appearance of quantum computer to computer cipher system Full property has deathblow.
Quantum information science technology is that quantum mechanics and computer science and technology are combined the interdisciplinary science grown up, is adopted With carrier of the quantum state as information, there are big advantage and bright prospect in the scientific domain such as communication and computer.Quantum Cryptographic technique is the product that cryptography is combined with quantum mechanics, and its security is by depending on the big general principle of quantum mechanics two, i.e., Heisenberg's uncertainty principle (the Heisenberg uncertainty principle) and unclonable principle (the quantum no-cloning theorem).Quantum figure state is a kind of multicomponent Quantum Entangled States, can use vertex set and side Collection is combined into mathematic graph to state.Figure state is the specific algorithm resource of quantum calculation model, is stable in Quantum Error Correcting Codes The subset of subcode, is also to construct one of method of Quantum Error Correcting Codes.Figure state has been always research quantum calculation, amount since the proposition Sub- error correction, the important tool of quanta cryptology technique.
Finger print identifying technology is one of core technology of information security, and finger print identifying technology is the fingerprint pair with him user It should get up, be compared by the fingerprint for comparing his fingerprint He pre-saving, it is possible to verify its true identity.Its principle exists In everyone fingerprint lines on pattern, breakpoint and crosspoint it is different, with uniqueness and stability.Biological fingerprint feature It is real-life extensive use so that the security and privacy sex chromosome mosaicism that people bring for it are increasingly paid close attention to.
Based on the above analysis, the powerful computer capacity of quantum calculation can break through many mathematical problems, at present Most of finger print identifying algorithm face very big threat, quantum figure state is combined with finger print identifying technology, using quantum calculation come Finger print information is authenticated, the unconditional security of algorithm can be ensured by the peculiar physical property of quantum, thus is designed such a Safe and reliable verification algorithm is necessary
The content of the invention
To achieve the above object, the present invention provides a kind of fingerprint verification method based on quantum figure state, solves and refers to safely Information leakage problem caused by classical identifying algorithm in line Verification System.
The technical solution adopted in the present invention is, a kind of fingerprint verification method based on quantum figure state, according to following steps Carry out:
Step S1:Fingerprint image acquisition;
Receive user input fingerprint image, take the fingerprint on minutiae point, processing is digitized to fingerprint image, general Fingerprint minutiae is encoded into the n positions binary sequence being made up of { 0,1 };
Step S2:Apply for quantum key;
Client receives and sends key application request, server by utilizing quantum channel hair to server immediately after fingerprint image The quantum ID keys after encryption are sent to share quantum ID keys to the client for sending application request, i.e. server and client;
Step S3:Cryptographic fingerprint information;
The finger print information that client inputs user and ID key bindings, generate assistance data;
Step S4:Client sends assistance data to server, and server by utilizing ID secret key decryptions go out finger print information;
Step S5:Server carries out the finger print information decrypted and the user fingerprints information stored in fingerprint database Fingerprint matching is verified;
Step S6:Judgement verifies whether success, terminates communication if success;If checking is failed, it is transferred in step S1, Client extracts user fingerprint image again.
Further, the step of step S5 is as follows:
Step 1) server prepare 3 particle entangleds quantum figure state3 tops in figure state Point is respectively labeled as AS, User and Data, utilizes formulaFigure state is encoded Operation, whereinFor code pattern state,Expansion beFor Kronecker product, li2∈ { 0,1 },Refer to, work as li2I operation is carried out to i-th and summit when=0, works as li2To i-th and summit progress Z operations when=1, i ∈ 1,2, 3 }, I, Z are respectively Pauli matrixesSummit AS, User and Data therein label are set For (0, l12)(0,l22) and (0, l32), wherein l12=0;
Step 2) sequence that the finger print information that server decrypts is made up of n quantum states is set, be designated as | S> =| Sj>:J ∈ { 1,2 ..., n } }, wherein | Sj>∈{|0>,|1>Represent jth position quantum state;
Step 3) verification operation, by quantum figure state stabistorAct on code pattern stateAnd operate n times, jth time behaviour During work, l22 j=SjThat is l22 j∈ { 0,1 }, l22 jLength for user finger print data library storage in the server is n fingerprints Jth position in data information sequence, marks l22Transfer process be formulatedWhereinl22When=0,Work as l22=1, ⊕ is XOR symbol,For Kronecker product;
Step 4) as any lj 32⊕lj 22=0 all sets up, i.e. fingerprint matching success, and server is by fingerprint matching successful information Feed back to client;
When there is lj 32⊕lj 22=1, then fingerprint matching fails, and fingerprint matching failure information is fed back to client by server End, Client-Prompt user re-enters fingerprint.
Further, the step 1) in, the preparation process step of figure state is as follows:
(1) be ready to by | 000>Constitute quantum Bit String;
(2) each quantum bit is carried out Hadamard conversion, become |+>State;
(3) for pure figure state | G>Figure in quantum bit corresponding to adjacent two summits be controlled the operation of Z, That is CZ | ε ε '>=(- 1)εε'|εε'>, whereinFor two-dimentional Hilbert space,
Beneficial effects of the present invention:Quantum figure state algorithm is combined with finger print identifying technology, can be peculiar physical by quantum The unconditional security of algorithm is demonstrate,proved in quality guarantee, while the powerful computing capability of quantum, can effectively improve the efficiency of finger print identifying.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is principle of the invention figure.
Fig. 2 is workflow diagram of the present invention.
Fig. 3 be the present invention a kind of stable child-operation of quantum figure state is provided implement fingerprint verification method schematic diagram.
Embodiment
Below in conjunction with the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely retouched State, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.Based on the present invention In embodiment, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made Example, belongs to the scope of protection of the invention.
A kind of fingerprint verification method based on quantum figure state, including client and server, as shown in Figure 1-2, client Communicated with server, user can step on input fingerprint by client, client can pass through quantum network and server point Key is enjoyed, the fingerprint for being inputted to user carries out associated encryption algorithm process;Server, can carry out matching to fingerprint and test Card, and feed back to client.
Specific implementation step is as follows:
Step S1:Fingerprint image acquisition;
Receive user input fingerprint image, take the fingerprint on minutiae point, processing is digitized to fingerprint image, general Fingerprint minutiae is encoded into the n positions binary sequence being made up of { 0,1 };
Step S2:Apply for quantum key;
Client receives and sends key application request, server by utilizing quantum channel hair to server immediately after fingerprint image The quantum ID keys after encryption are sent to share quantum ID keys to the client for sending application request, i.e. server and client;
Step S3:Cryptographic fingerprint information;
The finger print information that client inputs user and ID key bindings, generate assistance data;
Step S4:Client sends assistance data to server, and server by utilizing ID secret key decryptions go out finger print information;
Step S5:Server carries out the finger print information decrypted and the user fingerprints information stored in fingerprint database Fingerprint matching is verified.
Step S6:Judgement verifies whether success, terminates communication if success;If checking is failed, it is transferred in step S1, Client extracts user fingerprint image again.
Wherein, step S5 is comprised the following steps that:
1) server prepares the quantum figure state of 3 particle entangleds3 summits point in figure state Biao Ji not be that User and Data utilize formulaCoding behaviour is carried out to figure state Make, whereinFor code pattern state,Expansion beFor Kronecker product, li2∈ { 0,1 }, Refer to, work as li2I operation is carried out to i-th and summit when=0, works as li2To i-th and summit progress Z operations when=1, i ∈ { 1,2,3 }, I, Z are respectively Pauli matrixesSummit AS, User and Data therein label are set to (0, l12)(0,l22) and (0, l32), wherein l12=0;
The preparation process step of figure state is as follows in the step:
(1) be ready to by | 000>Constitute quantum Bit String;
(2) each quantum bit is carried out Hadamard conversion, become |+>State;
(3) for pure figure state | G>Figure in quantum bit corresponding to adjacent two summits be controlled the operation of Z, That is CZ | ε ε '>=(- 1)εε'|εε'>, whereinFor two-dimentional Hilbert space,
2) sequence that the finger print information that server decrypts is made up of n quantum states is set, is designated as | S>=| Sj>:J ∈ { 1,2 ..., n } }, wherein | Sj>∈{|0>,|1>Represent jth position quantum state;
3) verification operation, by quantum figure state stabistorAct on code pattern stateAnd operate n times, jth time was operated Cheng Zhong, l22 j=SjThat is l22 j∈ { 0,1 }, l22 jLength for user finger print data library storage in the server is n finger print datas Jth position in information sequence, marks l22Transfer process be formulatedWhereinWhen,When⊕ For XOR symbol,For Kronecker product;
4) as any lj 32⊕lj 22=0 all sets up, i.e. fingerprint matching success, server feeds back fingerprint matching successful information To client;
When there is lj 32⊕lj 22=1, then fingerprint matching fails, and fingerprint matching failure information is fed back to client by server End, Client-Prompt user re-enters fingerprint.
What Fig. 3 showed the stable child-operation of quantum figure state in the present invention implements fingerprint verification method.Fig. 3 (a) is Code pattern state before fingerprint authenticationFig. 3 (b) is the code pattern state after normal fingerprints are verified.When the server carries out fingerprint During checking, summit User is by stabistorAct in quantum figure state, its label l22 jIt is transferred on the Data of summit, arrows The transfer of mark.Label in being operated when n times on Data is (0,0) i.e. lj 32⊕lj 22When=0, wherein ⊕ is XOR symbol, j Otherwise ∈ { 1,2 ..., n }, fingerprint authentication successful match fails, and feeds back signal to the client requirements and re-types fingerprint.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the scope of the present invention.It is all Any modification, equivalent substitution and improvements made within the spirit and principles in the present invention etc., are all contained in protection scope of the present invention It is interior.

Claims (3)

1. a kind of fingerprint verification method based on quantum figure state, it is characterised in that follow the steps below:
Step S1:Fingerprint image acquisition;
Receive user input fingerprint image, take the fingerprint on minutiae point, processing is digitized to fingerprint image, by fingerprint Minutiae point is encoded into the n positions binary sequence being made up of { 0,1 };
Step S2:Apply for quantum key;
Client is received and sends key application request to server immediately after fingerprint image, and server by utilizing quantum channel, which is sent, to be added Quantum ID keys after close share quantum ID keys to the client for sending application request, i.e. server and client;
Step S3:Cryptographic fingerprint information;
The finger print information that client inputs user and ID key bindings, generate assistance data;
Step S4:Client sends assistance data to server, and server by utilizing ID secret key decryptions go out finger print information;
Step S5:The finger print information decrypted and the user fingerprints information stored in fingerprint database are carried out fingerprint by server Matching checking;
Step S6:Judgement verifies whether success, terminates communication if success;If checking is failed, it is transferred in step S1, client Again user fingerprint image is extracted in end.
2. the fingerprint verification method according to claim 1 based on quantum figure state, it is characterised in that the step of the step S5 It is rapid as follows:
Step 1) server prepare 3 particle entangleds quantum figure state3 summits point in figure state Biao Ji not be that User and Data utilize formulaCoding behaviour is carried out to figure state Make, whereinFor code pattern state,Expansion be For Kronecker product, li2∈ { 0,1 },It is Refer to, work as li2I operation is carried out to i-th and summit when=0, works as li2To i-th and summit progress Z operations when=1, i ∈ { 1,2,3 }, I, Z is respectively Pauli matrixesSummit AS, User and Data therein label are set to (0, l12)(0,l22) and (0, l32), wherein l12=0;
Step 2) sequence that the finger print information that server decrypts is made up of n quantum states is set, be designated as | S>=| Sj >:J ∈ { 1,2 ..., n } }, wherein | Sj>∈{|0>,|1>Represent jth position quantum state;
Step 3) verification operation, by quantum figure state stabistorAct on code pattern stateAnd operate n times, jth time was operated Cheng Zhong, l22 j=SjThat is l22 j∈ { 0,1 }, l22 jLength for user finger print data library storage in the server is n finger print datas Jth position in information sequence, marks l22Transfer process be formulatedWhereinl22When=0,Work as l22=1, For XOR symbol,For Kronecker product;
Step 4) when anyAll set up, i.e. fingerprint matching success, server feeds back to fingerprint matching successful information Client;
Work as presenceThen fingerprint matching fails, and fingerprint matching failure information is fed back to client, client by server Prompting user re-enters fingerprint.
3. the fingerprint verification method according to claim 2 based on quantum figure state, it is characterised in that the step 1) in, The preparation process step of figure state is as follows:
(1) be ready to by | 000>Constitute quantum Bit String;
(2) each quantum bit is carried out Hadamard conversion, become |+>State;
(3) for pure figure state | G>Figure in quantum bit corresponding to adjacent two summits be controlled the operation of Z, i.e. CZ | εε'>=(- 1)εε'|εε'>, wherein ε, ε ' ∈ { 0,1 }, For two-dimentional Hilbert space,
CN201710284104.3A 2017-04-26 2017-04-26 Fingerprint verification method based on quantum figure state Expired - Fee Related CN107257283B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710284104.3A CN107257283B (en) 2017-04-26 2017-04-26 Fingerprint verification method based on quantum figure state

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710284104.3A CN107257283B (en) 2017-04-26 2017-04-26 Fingerprint verification method based on quantum figure state

Publications (2)

Publication Number Publication Date
CN107257283A true CN107257283A (en) 2017-10-17
CN107257283B CN107257283B (en) 2019-11-08

Family

ID=60027175

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710284104.3A Expired - Fee Related CN107257283B (en) 2017-04-26 2017-04-26 Fingerprint verification method based on quantum figure state

Country Status (1)

Country Link
CN (1) CN107257283B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108810016A (en) * 2018-07-11 2018-11-13 长春大学 Terminal access authentication method based on quantum cryptography watermark
CN108833100A (en) * 2018-07-27 2018-11-16 江苏亨通问天量子信息研究院有限公司 Information Authentication method, transmitting terminal system, receiving terminal system and verifying end system
CN109194469A (en) * 2018-09-04 2019-01-11 中南大学 Fingerprint verification method based on continuous variable quantum key distribution
CN115107701A (en) * 2022-07-26 2022-09-27 合众新能源汽车有限公司 Automobile anti-theft authentication method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101777115B (en) * 2009-11-25 2012-02-15 中国科学院自动化研究所 Safe fingerprint verification method and system
CN102750529A (en) * 2012-07-24 2012-10-24 南京邮电大学 Biometric fingerprint authentication method based on quantum fuzzy commitment
CN105471584A (en) * 2015-12-04 2016-04-06 长春大学 Identity authentication method based on quantum key encryption
CN105991285A (en) * 2015-02-16 2016-10-05 阿里巴巴集团控股有限公司 Identity authentication methods, devices and system applied to quantum key distribution process
CN106330440A (en) * 2016-11-23 2017-01-11 长春大学 Mobile network quantum key distribution system based on near-field communication and distribution method thereof

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101777115B (en) * 2009-11-25 2012-02-15 中国科学院自动化研究所 Safe fingerprint verification method and system
CN102750529A (en) * 2012-07-24 2012-10-24 南京邮电大学 Biometric fingerprint authentication method based on quantum fuzzy commitment
CN105991285A (en) * 2015-02-16 2016-10-05 阿里巴巴集团控股有限公司 Identity authentication methods, devices and system applied to quantum key distribution process
CN105471584A (en) * 2015-12-04 2016-04-06 长春大学 Identity authentication method based on quantum key encryption
CN106330440A (en) * 2016-11-23 2017-01-11 长春大学 Mobile network quantum key distribution system based on near-field communication and distribution method thereof

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108810016A (en) * 2018-07-11 2018-11-13 长春大学 Terminal access authentication method based on quantum cryptography watermark
CN108833100A (en) * 2018-07-27 2018-11-16 江苏亨通问天量子信息研究院有限公司 Information Authentication method, transmitting terminal system, receiving terminal system and verifying end system
CN108833100B (en) * 2018-07-27 2021-07-20 江苏亨通问天量子信息研究院有限公司 Information verification method, sending end system, receiving end system and verification end system
CN109194469A (en) * 2018-09-04 2019-01-11 中南大学 Fingerprint verification method based on continuous variable quantum key distribution
CN109194469B (en) * 2018-09-04 2020-12-18 中南大学 Fingerprint authentication method based on continuous variable quantum key distribution
CN115107701A (en) * 2022-07-26 2022-09-27 合众新能源汽车有限公司 Automobile anti-theft authentication method and system
CN115107701B (en) * 2022-07-26 2024-02-23 合众新能源汽车股份有限公司 Automobile anti-theft authentication method and system

Also Published As

Publication number Publication date
CN107257283B (en) 2019-11-08

Similar Documents

Publication Publication Date Title
US20200252203A1 (en) Biometric verification of a blockchain database transaction contributor
EP3435591B1 (en) 1:n biometric authentication, encryption, signature system
CN105471584B (en) A kind of identity identifying method based on quantum key encryption
CN110969431B (en) Secure hosting method, device and system for private key of blockchain digital coin
CN107257283B (en) Fingerprint verification method based on quantum figure state
CN105553657B (en) A kind of fingerprint fuzzy vault implementation method of feature-based fusion
CN104408356B (en) A kind of fingerprint verification method and system, fingerprint template encryption device
CN107493168B (en) Quanta identity authentication method and its application method during quantum key distribution
CN101945114A (en) Identity authentication method based on fuzzy vault and digital certificate
CN103929308B (en) Information Authentication method applied to rfid card
CN102004872A (en) Fingerprint encryption-based identity authentication system and implementation method thereof
CN105450419A (en) Method, device and system
CN106533697A (en) Random number generating and extracting method and application thereof to identity authentication
CN116318617B (en) Medical rescue material charity donation method based on RFID and blockchain
Barman et al. A novel secure key-exchange protocol using biometrics of the sender and receiver
CN111768523A (en) CTID-based NFC intelligent door lock unlocking method, system, equipment and medium
Aanjanadevi et al. Face Attribute Convolutional Neural Network System for Data Security with Improved Crypto Biometrics.
CN107317676A (en) Method for distributing key based on quantum figure state
CN114065169B (en) Privacy protection biometric authentication method and device and electronic equipment
CN110492992A (en) A kind of data encryption and transmission method based on radio RF recognition technology
Barman et al. Approach to cryptographic key generation from fingerprint biometrics
Alrifaee et al. Cryptography based on retina information
CN101933287B (en) The encrypting and authenticating apparatus and method of the disposable one time key of antagonism wooden horse formula
Dong et al. Security enhancement of biometrics, cryptography and data hiding by their combinations
CN105227562A (en) The key business data transmission mediation device of identity-based checking and using method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information

Inventor after: Guo Ying

Inventor after: Li Fei

Inventor after: Ma Hongling

Inventor after: Peng Siwei

Inventor before: Li Fei

Inventor before: Guo Ying

Inventor before: Ma Hongling

Inventor before: Peng Siwei

CB03 Change of inventor or designer information
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20191108

Termination date: 20200426

CF01 Termination of patent right due to non-payment of annual fee