CN108322480A - Information authentication method in smart home - Google Patents
Information authentication method in smart home Download PDFInfo
- Publication number
- CN108322480A CN108322480A CN201810222355.3A CN201810222355A CN108322480A CN 108322480 A CN108322480 A CN 108322480A CN 201810222355 A CN201810222355 A CN 201810222355A CN 108322480 A CN108322480 A CN 108322480A
- Authority
- CN
- China
- Prior art keywords
- matrix
- server
- information
- data
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 238000013507 mapping Methods 0.000 claims abstract description 18
- 239000011159 matrix material Substances 0.000 claims description 166
- 238000012795 verification Methods 0.000 claims description 11
- 238000004364 calculation method Methods 0.000 claims description 7
- 238000012545 processing Methods 0.000 claims description 5
- 238000012937 correction Methods 0.000 claims description 3
- 230000002441 reversible effect Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005498 polishing Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
An information authentication method in smart home comprises the following steps: s1, dividing a dedicated storage area in the server, wherein the dedicated storage area is used for data encryption storage; s2, acquiring the identification information of each member in the home range through a sensor; sending the identification information of each user to a server; s3, the server processes all the identification information according to a first preset algorithm to obtain an identification data set, and then deletes the identification information of each user; the server carries out data grouping on the identification data set according to the members; s4, establishing a mapping relation between each data group and the intelligent terminal corresponding to the member in the server; s5, when the user requests to perform identity authentication, the corresponding user information is obtained through the intelligent terminal, the user information is processed through a second preset algorithm to obtain authentication information, and the authentication information is sent to the server after the corresponding user information is obtained through the intelligent terminal is deleted.
Description
Technical field
The present invention relates to intelligent home information security technology area, more particularly to authentification of message side in a kind of smart home
Method.
Background technology
Focus in order to solve existing Intelligent housing technology is mostly focused on the uniformity of Data Transport Protocol,
And the safety of information in smart home is not paid close attention to, store user's for another aspect, in mobile terminal or server
The problem of identification information, there is also information leakages.
Invention content
Focus in order to solve existing Intelligent housing technology is mostly focused on the uniformity of Data Transport Protocol,
And the safety of information in smart home is not paid close attention to, store user's for another aspect, in mobile terminal or server
Identification information, there is also the defect of information leakage, the present invention proposes information authentication method in smart home.
A kind of information authentication method in smart home comprising following steps:
S1, an exclusive storage region is divided in the server, the exclusive storage region is stored for data encryption;
S2, the identity identification information that each member within the scope of household is obtained by sensor;The identity of each user is known
Other information is sent to server;
S3, server are handled all identity identification informations after obtaining identification data acquisition system according to the first preset algorithm
Delete the identity identification information of each user;Server will identify that data acquisition system carries out packet according to member;
S4, the mapping relations for establishing each packet intelligent terminal corresponding with member in the server;
S5, when user asks to carry out authentication, corresponding user information is obtained by intelligent terminal, it is default by second
Algorithm carries out processing to user information and is verified information, deletes after intelligent terminal obtains corresponding user information and sends out verification information
It is sent to server;
S6, server verify verification information, receive the ID authentication request of user when being verified;Otherwise it uses
Family authentication failure.
In smart home of the present invention in information authentication method,
The step S3 includes:
The identity identification information of each user is respectively converted into data matrix;
According to each data matrix compensation matrix corresponding with the incidence relation of other matrixes each data matrix of generation;
The corresponding R-matrix of each data matrix is generated according to compensation matrix, R-matrix is encrypted by escape way
After be sent to the corresponding mobile terminal of data matrix;
Server is handled to obtain data acquisition system by the first preset algorithm to data matrix and compensation matrix;Server
Matrix correlation value is obtained after being handled data acquisition system and R-matrix by the second preset algorithm;
Server will identify that data acquisition system carries out packet according to member, and establish in matrix correlation value and data acquisition system
The mapping relations of packet and matrix correlation value;
Server deletes identity identification information, R-matrix, the compensation matrix of user, and by data acquisition system, matrix correlation
Value and packet and the mapping relations of matrix correlation value are stored in exclusive storage region.
In smart home of the present invention in information authentication method,
The step S5 includes:
When user asks to carry out authentication, pass through acquisition for mobile terminal corresponding user information;
Mobile terminal converts user information to verify data matrix;
Mobile terminal is verified letter after being handled verify data matrix and R-matrix by the second preset algorithm
Breath, mobile terminal transmit authentication information to server after deleting corresponding user information.
In smart home of the present invention in information authentication method,
The step S6 includes:
S61, server judge whether verification information matches with matrix correlation value;The jump procedure S62 in matching;
S62, server are closed by establishing matrix correlation value with packet in data acquisition system and the mapping of matrix correlation value
System determines corresponding packet;
S63, server confirm the identity of user by the mapping relations of each packet mobile terminal corresponding with member
Certification request passes through.
In smart home of the present invention in information authentication method,
The incidence relation according to each data matrix and other matrixes generates the corresponding compensation square of each data matrix
Battle array include:
According to the line number of data matrix, columns, line number is filtered out, columns corresponds to line number, row less than or equal to data matrix
Other several matrixes are as incidence matrix;
Setting offset is standardized incidence matrix and is compensated matrix according to offset.
In smart home of the present invention in information authentication method,
Server is handled to obtain data acquisition system by the first preset algorithm to data matrix and compensation matrix:
Server obtains the first intermediary matrix by carrying out product calculation to each data matrix and compensation matrix;
Server handles to obtain the data acquisition system of serializing form by the first intermediary matrix of SHA512 algorithms pair;
Server obtains matrix correlation value packet after being handled data acquisition system and R-matrix by the second preset algorithm
It includes:
Server obtains the second intermediary matrix by carrying out product calculation to each data matrix and R-matrix;
Server handles to obtain the reference data set of serializing form by the second intermediary matrix of SHA512 algorithms pair;
Server correction data set obtains esodisparity value with reference data set, using difference value as matrix correlation
Value.
Implement information authentication method in a kind of smart home provided by the invention to have the advantages that:In the server
The original user information for not storing acquisition only retains data after treatment to carry out authentification of message, and retain
Information determines relationship with original user information existence anduniquess, has not only met the safety of information storage, but also improves certification identification
Accuracy.
Description of the drawings
Fig. 1 be the embodiment of the present invention smart home in information authentication method flow chart.
Specific implementation mode
As shown in Figure 1, information authentication method in a kind of smart home comprising following steps:
S1, an exclusive storage region is divided in the server, the exclusive storage region is stored for data encryption.It is optional
Exclusive storage region is encrypted in ground by the encrypted mode of hardware, ensures the storage safety of data in server.
S2, the identity identification information that each member within the scope of household is obtained by sensor;The identity of each user is known
Other information is sent to server;The identity identification information of each member is obtained by sensor, and is sent to server, member's
Identity identification information only server be configured to verification user request whether legal information, therefore be disposably to transmit
, it will not be stolen in follow-up use.
S3, server are handled all identity identification informations after obtaining identification data acquisition system according to the first preset algorithm
Delete the identity identification information of each user;Server will identify that data acquisition system carries out packet according to member.
The identity identification information that each user is deleted after obtaining identification data acquisition system ensure that the identification letter of user
Breath is not leaked, even if occurring that in the case that exclusive storage region is leaked, the true identification information of user will not be obtained,
The identification information includes iris recognition information, finger print information etc..
In embodiments of the present invention, data acquisition system is multiple, and there are corresponding with the identity identification information of user for data acquisition system
Relationship;Therefore, server will identify that data acquisition system carries out packet according to member, and array grouping and user identity may be implemented
Correspondence.Packet is a kind of process classified to data acquisition system according to user identity.
In smart home of the present invention in information authentication method,
The step S3 includes:
The identity identification information of each user is respectively converted into data matrix;Since the identity information of user may include
The biometric informations such as iris, fingerprint, and the identification method that different user is taken is different, therefore the identity of different users
The data matrix of identification information conversion is different, and not only value is different, and there may be differences for line number, columns.The embodiment of the present invention
Isomorphism introduces the concept of data matrix, and introduces and be standardized the concept for being compensated matrix to incidence matrix, makes
It is more preferable to obtain the compatibility of the invention for the various biometric informations of user, and these verification informations can intersect, flexible group
It closes so that disabled user can not parse the user information of acquired original from all information.
According to each data matrix compensation matrix corresponding with the incidence relation of other matrixes each data matrix of generation.
In smart home of the present invention in information authentication method,
The incidence relation according to each data matrix and other matrixes generates the corresponding compensation square of each data matrix
Battle array include:
According to the line number of data matrix, columns, line number is filtered out, columns corresponds to line number, row less than or equal to data matrix
Other several matrixes are as incidence matrix;By this step, the calculation amount of compensation matrix generation can be substantially reduced.
Setting offset is standardized incidence matrix and is compensated matrix according to offset.
Offset can be independently arranged by user, it is preferable that can pass through the personal status relationship next life between different user
At offset.It can be arranged and pre-set fixed numerical value and be used as offset.
Incidence matrix is standardized and is compensated matrix and may include:If the row and/or row of incidence matrix
Less than corresponding data matrix, then the row of incidence matrix and/or row polishing are compensated by matrix by offset.
By implementing the present embodiment, due to being provided with offset, obtained subsequently by standardized compensation matrix to realize
Data acquisition system, and reduce operand.
The corresponding R-matrix of each data matrix is generated according to compensation matrix, R-matrix is encrypted by escape way
After be sent to the corresponding mobile terminal of data matrix.
Optionally, the corresponding R-matrix of each data matrix is generated by replacing spy in compensation matrix according to compensation matrix
Fixed numerical value obtains.
The advantageous effect for implementing the present embodiment is:What is sent to mobile terminal is R-matrix, and different data
The corresponding R-matrix of matrix is different in fact, and numerical value difference, line number/columns may also be different.Make other illegal users
Can not data matrix finally be obtained by reference to matrix, and can not also obtain the identity information of all users simultaneously.
Server is handled to obtain data acquisition system by the first preset algorithm to data matrix and compensation matrix;Server
Matrix correlation value is obtained after being handled data acquisition system and R-matrix by the second preset algorithm.In the embodiment of the present invention
In, by judging whether the request of user is legal with the verification of matrix correlation value, it on the one hand can establish and uniquely know with user
The correspondence of other information (iris information, finger print information), and and it is indirect verified using these information, substantially increase
Safety.
In smart home of the present invention in information authentication method,
Server is handled to obtain data acquisition system by the first preset algorithm to data matrix and compensation matrix:
Server obtains the first intermediary matrix by carrying out product calculation to each data matrix and compensation matrix;
Server handles to obtain the data acquisition system of serializing form by the first intermediary matrix of SHA512 algorithms pair.
Correspondence can not be cracked out since SHA512 algorithms are a kind of non-reversible algorithms, if even if obtaining data acquisition system
Data matrix, and then the identification information of corresponding user can not be obtained.In embodiments of the present invention, the first preset algorithm refers to above-mentioned
All processing steps.
Server obtains matrix correlation value packet after being handled data acquisition system and R-matrix by the second preset algorithm
It includes:
Server obtains the second intermediary matrix by carrying out product calculation to each data matrix and R-matrix;
Server handles to obtain the reference data set of serializing form by the second intermediary matrix of SHA512 algorithms pair;
Server correction data set obtains esodisparity value with reference data set, using difference value as matrix correlation
Value.
It can not be cracked out since SHA512 algorithms are a kind of non-reversible algorithms, if even if obtaining reference data set
Corresponding data matrix, and then the identification information of user can not be obtained.In embodiments of the present invention, the first preset algorithm refers to above-mentioned
All processing steps.By the way that matrix correlation value is arranged, can solve to bring by reference to matrix and by compensation matrix operation
The problem of Different Results, closes so as to form matrix correlation value with packet in data acquisition system and the mapping of matrix correlation value
System.
Server will identify that data acquisition system carries out packet according to member, and establish in matrix correlation value and data acquisition system
The mapping relations of packet and matrix correlation value;
Server deletes identity identification information, R-matrix, the compensation matrix of user, and by data acquisition system, matrix correlation
Value and packet and the mapping relations of matrix correlation value are stored in exclusive storage region.
By implementing this step, it is only stored with data acquisition system, matrix correlation value and packet and square in the server
The mapping relations of battle array relating value, that is, allow to obtain these three different information simultaneously, can not also obtain corresponding with array grouping
User identification information.
S4, the mapping relations for establishing each packet intelligent terminal corresponding with member in the server;
S5, when user asks to carry out authentication, corresponding user information is obtained by intelligent terminal, it is default by second
Algorithm carries out processing to user information and is verified information, deletes after intelligent terminal obtains corresponding user information and sends out verification information
It is sent to server.
In smart home of the present invention in information authentication method,
The step S5 includes:
When user asks to carry out authentication, pass through acquisition for mobile terminal corresponding user information;
Mobile terminal converts user information to verify data matrix;
Mobile terminal is verified letter after being handled verify data matrix and R-matrix by the second preset algorithm
Breath, mobile terminal transmit authentication information to server after deleting corresponding user information.
S6, server verify verification information, receive the ID authentication request of user when being verified;Otherwise it uses
Family authentication failure.
During entire authentification of message, whether server or mobile terminal or in transmission process, even if
Illegal user obtains the information and data during these three links, can not also crack out the identification information of user.
In smart home of the present invention in information authentication method,
The step S6 includes:
S61, server judge whether verification information matches with matrix correlation value;The jump procedure S62 in matching;
S62, server are closed by establishing matrix correlation value with packet in data acquisition system and the mapping of matrix correlation value
System determines corresponding packet;
S63, server confirm the identity of user by the mapping relations of each packet mobile terminal corresponding with member
Certification request passes through.
Implement information authentication method in a kind of smart home provided by the invention to have the advantages that:In the server
The original user information for not storing acquisition only retains data after treatment to carry out authentification of message, and retain
Information determines relationship with original user information existence anduniquess, has not only met the safety of information storage, but also improves certification identification
Accuracy.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can directly be held with hardware, processor
The combination of capable software module or the two is implemented.Software module can be placed in random access memory, memory, read-only memory,
Institute is public in electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field
In the storage medium for the arbitrary other forms known.
It is understood that for those of ordinary skill in the art, can be conceived with the technique according to the invention and be done
Go out various other corresponding changes and deformation, and all these changes and deformation should all belong to the protection model of the claims in the present invention
It encloses.
Claims (6)
1. information authentication method in a kind of smart home, which is characterized in that it includes the following steps:
S1, an exclusive storage region is divided in the server, the exclusive storage region is stored for data encryption;
S2, the identity identification information that each member within the scope of household is obtained by sensor;The identification of each user is believed
Breath is sent to server;
All identity identification informations are handled to delete after obtaining identification data acquisition system by S3, server according to the first preset algorithm
The identity identification information of each user;Server will identify that data acquisition system carries out packet according to member;
S4, the mapping relations for establishing each packet intelligent terminal corresponding with member in the server;
S5, user ask carry out authentication when, by intelligent terminal obtain corresponding user information, pass through the second preset algorithm
Processing is carried out to user information and is verified information, deletes after intelligent terminal obtains corresponding user information and transmits authentication information to
Server;
S6, server verify verification information, receive the ID authentication request of user when being verified;Otherwise user's body
Part authentication failed.
2. information authentication method in smart home as described in claim 1, which is characterized in that
The step S3 includes:
The identity identification information of each user is respectively converted into data matrix;
According to each data matrix compensation matrix corresponding with the incidence relation of other matrixes each data matrix of generation;
The corresponding R-matrix of each data matrix is generated according to compensation matrix, is sent out after R-matrix is encrypted by escape way
Give data matrix corresponding mobile terminal;
Server is handled to obtain data acquisition system by the first preset algorithm to data matrix and compensation matrix;Server passes through
Second preset algorithm obtains matrix correlation value after handling data acquisition system and R-matrix;
Server will identify that data acquisition system carries out packet according to member, and establish matrix correlation value and data in data acquisition system
The mapping relations of grouping and matrix correlation value;
Server delete user identity identification information, R-matrix, compensation matrix, and by data acquisition system, matrix correlation value with
And packet and the mapping relations of matrix correlation value are stored in exclusive storage region.
3. information authentication method in smart home as claimed in claim 2, which is characterized in that
The step S5 includes:
When user asks to carry out authentication, pass through acquisition for mobile terminal corresponding user information;
Mobile terminal converts user information to verify data matrix;
Mobile terminal is verified information after being handled verify data matrix and R-matrix by the second preset algorithm, move
Dynamic terminal transmits authentication information to server after deleting corresponding user information.
4. information authentication method in smart home as claimed in claim 3, which is characterized in that
The step S6 includes:
S61, server judge whether verification information matches with matrix correlation value;The jump procedure S62 in matching;
S62, server are true by establishing matrix correlation value and packet in data acquisition system and the mapping relations of matrix correlation value
Fixed corresponding packet;
S63, server confirm the authentication of user by the mapping relations of each packet mobile terminal corresponding with member
Request passes through.
5. information authentication method in smart home as claimed in claim 2, which is characterized in that
The incidence relation according to each data matrix and other matrixes generates the corresponding compensation matrix packet of each data matrix
It includes:
According to the line number of data matrix, columns, line number is filtered out, columns is less than or equal to data matrix and corresponds to line number, columns
Other matrixes are as incidence matrix;
Setting offset is standardized incidence matrix and is compensated matrix according to offset.
6. information authentication method in smart home as claimed in claim 5, which is characterized in that
Server is handled to obtain data acquisition system by the first preset algorithm to data matrix and compensation matrix:
Server obtains the first intermediary matrix by carrying out product calculation to each data matrix and compensation matrix;
Server handles to obtain the data acquisition system of serializing form by the first intermediary matrix of SHA512 algorithms pair;
Server obtains matrix correlation value after being handled data acquisition system and R-matrix by the second preset algorithm:
Server obtains the second intermediary matrix by carrying out product calculation to each data matrix and R-matrix;
Server obtains the reference data set of serializing form by the second matrix disposal of SHA512 algorithms pair;
Server correction data set obtains esodisparity value with reference data set, using difference value as matrix difference value.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810222355.3A CN108322480B (en) | 2018-03-19 | 2018-03-19 | Information authentication method in smart home |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810222355.3A CN108322480B (en) | 2018-03-19 | 2018-03-19 | Information authentication method in smart home |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108322480A true CN108322480A (en) | 2018-07-24 |
CN108322480B CN108322480B (en) | 2020-11-20 |
Family
ID=62898486
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810222355.3A Active CN108322480B (en) | 2018-03-19 | 2018-03-19 | Information authentication method in smart home |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108322480B (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102598543A (en) * | 2009-11-18 | 2012-07-18 | 西门子公司 | Method and arrangement for stabilizing a color coding method and optically transferring data |
CN104935608A (en) * | 2015-07-07 | 2015-09-23 | 成都睿峰科技有限公司 | Identity authentication method in cloud computing network |
US20150341350A1 (en) * | 2014-05-23 | 2015-11-26 | Fujitsu Limited | Privacy preserving biometric authentication based on error correcting codes |
CN105577357A (en) * | 2015-12-21 | 2016-05-11 | 东南大学 | Intelligent household data privacy protection method based on full homomorphic encryption |
CN105681269A (en) * | 2014-12-04 | 2016-06-15 | 富士通株式会社 | Privacy preserving set-based biometric authentication |
CN106101260A (en) * | 2016-07-06 | 2016-11-09 | 杨炳 | Smart Home security access system |
CN106471534A (en) * | 2014-02-04 | 2017-03-01 | 德克·海尔宾 | Cross support processor |
CN106657655A (en) * | 2016-12-30 | 2017-05-10 | 深圳智乐信息科技有限公司 | Control method and system |
CN106789378A (en) * | 2017-03-29 | 2017-05-31 | 宁夏灵智科技有限公司 | Information prevents from revealing method and system in smart home |
CN107612889A (en) * | 2017-08-23 | 2018-01-19 | 四川长虹电器股份有限公司 | The method for preventing user profile from revealing |
-
2018
- 2018-03-19 CN CN201810222355.3A patent/CN108322480B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102598543A (en) * | 2009-11-18 | 2012-07-18 | 西门子公司 | Method and arrangement for stabilizing a color coding method and optically transferring data |
CN106471534A (en) * | 2014-02-04 | 2017-03-01 | 德克·海尔宾 | Cross support processor |
US20150341350A1 (en) * | 2014-05-23 | 2015-11-26 | Fujitsu Limited | Privacy preserving biometric authentication based on error correcting codes |
CN105681269A (en) * | 2014-12-04 | 2016-06-15 | 富士通株式会社 | Privacy preserving set-based biometric authentication |
CN104935608A (en) * | 2015-07-07 | 2015-09-23 | 成都睿峰科技有限公司 | Identity authentication method in cloud computing network |
CN105577357A (en) * | 2015-12-21 | 2016-05-11 | 东南大学 | Intelligent household data privacy protection method based on full homomorphic encryption |
CN106101260A (en) * | 2016-07-06 | 2016-11-09 | 杨炳 | Smart Home security access system |
CN106657655A (en) * | 2016-12-30 | 2017-05-10 | 深圳智乐信息科技有限公司 | Control method and system |
CN106789378A (en) * | 2017-03-29 | 2017-05-31 | 宁夏灵智科技有限公司 | Information prevents from revealing method and system in smart home |
CN107612889A (en) * | 2017-08-23 | 2018-01-19 | 四川长虹电器股份有限公司 | The method for preventing user profile from revealing |
Non-Patent Citations (2)
Title |
---|
戴华等: "两层传感网中能量高效的隐私保护范围查询方法 ", 《计算机研究与发展》 * |
戴华等: "两层传感网中能量高效的隐私保护范围查询方法", 《计算机研究与发展》 * |
Also Published As
Publication number | Publication date |
---|---|
CN108322480B (en) | 2020-11-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10454913B2 (en) | Device authentication agent | |
US20140093144A1 (en) | More-Secure Hardware Token | |
EP0944980B1 (en) | Method and system for improving security in network applications | |
US10242171B2 (en) | Verifying a user identity | |
US11194895B2 (en) | Method and apparatus for authenticating biometric information | |
CN108023894A (en) | Visa information system and its processing method based on block chain | |
KR20180081108A (en) | Public / private key biometric authentication system | |
EP3363154A1 (en) | Storing and retrieving cryptographic keys from biometric data | |
KR20170098890A (en) | Equipment verification method and apparatus | |
CN105227307A (en) | Auth method and system and server data processing method and server | |
CN105635099A (en) | Identity authentication method, identity authentication system, terminal and server | |
US20240048555A1 (en) | Privacy-Preserving Biometric Authentication | |
CN107733636A (en) | Authentication method and Verification System | |
CN104820814A (en) | Second-generation ID card anti-counterfeiting verification system | |
US11681787B1 (en) | Ownership validation for cryptographic asset contracts using irreversibly transformed identity tokens | |
CN105868610A (en) | Method and system for realizing user authentication through biological characteristic information | |
CN105827571A (en) | UAF (Universal Authentication Framework) protocol based multi-modal biological characteristic authentication method and equipment | |
WO2023142453A1 (en) | Biometric identification method, server, and client | |
CN113591057A (en) | Biological characteristic off-line identity recognition method and system | |
CN109246066B (en) | Identity recognition method, cloud server and identity recognition system | |
CN108377249A (en) | Information authentication method in new energy automobile based on Internet of things technology | |
CN115801382A (en) | User information authentication method and system | |
US20150120543A1 (en) | EyeWatch ATM and Wire Transfer Fraud Prevention System | |
CN101459514A (en) | Method and apparatus for biological identification, biological characteristic data ciphering method | |
CN110619228B (en) | File decryption method, file encryption method, file management system and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20201102 Address after: No. 617, Lijiagou village, Heshun Town, Linzhou City, Anyang City, Henan Province Applicant after: Wang Rui Address before: 430000 Wuhan Donghu New Technological Development Zone, Hubei Province, Guannan Science and Technology Industrial Park, Phase I, Level 3, Unit 21, No. 9 (Admitted to Wuhan Chuangyijia Business Secretary Service Co., Ltd; Trusteeship No. 000348) Applicant before: WUHAN KANGHUIRAN INFORMATION TECHNOLOGY CONSULTING Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |