CN108322480A - Information authentication method in smart home - Google Patents

Information authentication method in smart home Download PDF

Info

Publication number
CN108322480A
CN108322480A CN201810222355.3A CN201810222355A CN108322480A CN 108322480 A CN108322480 A CN 108322480A CN 201810222355 A CN201810222355 A CN 201810222355A CN 108322480 A CN108322480 A CN 108322480A
Authority
CN
China
Prior art keywords
matrix
server
information
data
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810222355.3A
Other languages
Chinese (zh)
Other versions
CN108322480B (en
Inventor
覃士忠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wang Rui
Original Assignee
Wuhan Kanghuiran Information Technology Consulting Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Kanghuiran Information Technology Consulting Co ltd filed Critical Wuhan Kanghuiran Information Technology Consulting Co ltd
Priority to CN201810222355.3A priority Critical patent/CN108322480B/en
Publication of CN108322480A publication Critical patent/CN108322480A/en
Application granted granted Critical
Publication of CN108322480B publication Critical patent/CN108322480B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

An information authentication method in smart home comprises the following steps: s1, dividing a dedicated storage area in the server, wherein the dedicated storage area is used for data encryption storage; s2, acquiring the identification information of each member in the home range through a sensor; sending the identification information of each user to a server; s3, the server processes all the identification information according to a first preset algorithm to obtain an identification data set, and then deletes the identification information of each user; the server carries out data grouping on the identification data set according to the members; s4, establishing a mapping relation between each data group and the intelligent terminal corresponding to the member in the server; s5, when the user requests to perform identity authentication, the corresponding user information is obtained through the intelligent terminal, the user information is processed through a second preset algorithm to obtain authentication information, and the authentication information is sent to the server after the corresponding user information is obtained through the intelligent terminal is deleted.

Description

Information authentication method in smart home
Technical field
The present invention relates to intelligent home information security technology area, more particularly to authentification of message side in a kind of smart home Method.
Background technology
Focus in order to solve existing Intelligent housing technology is mostly focused on the uniformity of Data Transport Protocol, And the safety of information in smart home is not paid close attention to, store user's for another aspect, in mobile terminal or server The problem of identification information, there is also information leakages.
Invention content
Focus in order to solve existing Intelligent housing technology is mostly focused on the uniformity of Data Transport Protocol, And the safety of information in smart home is not paid close attention to, store user's for another aspect, in mobile terminal or server Identification information, there is also the defect of information leakage, the present invention proposes information authentication method in smart home.
A kind of information authentication method in smart home comprising following steps:
S1, an exclusive storage region is divided in the server, the exclusive storage region is stored for data encryption;
S2, the identity identification information that each member within the scope of household is obtained by sensor;The identity of each user is known Other information is sent to server;
S3, server are handled all identity identification informations after obtaining identification data acquisition system according to the first preset algorithm Delete the identity identification information of each user;Server will identify that data acquisition system carries out packet according to member;
S4, the mapping relations for establishing each packet intelligent terminal corresponding with member in the server;
S5, when user asks to carry out authentication, corresponding user information is obtained by intelligent terminal, it is default by second Algorithm carries out processing to user information and is verified information, deletes after intelligent terminal obtains corresponding user information and sends out verification information It is sent to server;
S6, server verify verification information, receive the ID authentication request of user when being verified;Otherwise it uses Family authentication failure.
In smart home of the present invention in information authentication method,
The step S3 includes:
The identity identification information of each user is respectively converted into data matrix;
According to each data matrix compensation matrix corresponding with the incidence relation of other matrixes each data matrix of generation;
The corresponding R-matrix of each data matrix is generated according to compensation matrix, R-matrix is encrypted by escape way After be sent to the corresponding mobile terminal of data matrix;
Server is handled to obtain data acquisition system by the first preset algorithm to data matrix and compensation matrix;Server Matrix correlation value is obtained after being handled data acquisition system and R-matrix by the second preset algorithm;
Server will identify that data acquisition system carries out packet according to member, and establish in matrix correlation value and data acquisition system The mapping relations of packet and matrix correlation value;
Server deletes identity identification information, R-matrix, the compensation matrix of user, and by data acquisition system, matrix correlation Value and packet and the mapping relations of matrix correlation value are stored in exclusive storage region.
In smart home of the present invention in information authentication method,
The step S5 includes:
When user asks to carry out authentication, pass through acquisition for mobile terminal corresponding user information;
Mobile terminal converts user information to verify data matrix;
Mobile terminal is verified letter after being handled verify data matrix and R-matrix by the second preset algorithm Breath, mobile terminal transmit authentication information to server after deleting corresponding user information.
In smart home of the present invention in information authentication method,
The step S6 includes:
S61, server judge whether verification information matches with matrix correlation value;The jump procedure S62 in matching;
S62, server are closed by establishing matrix correlation value with packet in data acquisition system and the mapping of matrix correlation value System determines corresponding packet;
S63, server confirm the identity of user by the mapping relations of each packet mobile terminal corresponding with member Certification request passes through.
In smart home of the present invention in information authentication method,
The incidence relation according to each data matrix and other matrixes generates the corresponding compensation square of each data matrix Battle array include:
According to the line number of data matrix, columns, line number is filtered out, columns corresponds to line number, row less than or equal to data matrix Other several matrixes are as incidence matrix;
Setting offset is standardized incidence matrix and is compensated matrix according to offset.
In smart home of the present invention in information authentication method,
Server is handled to obtain data acquisition system by the first preset algorithm to data matrix and compensation matrix:
Server obtains the first intermediary matrix by carrying out product calculation to each data matrix and compensation matrix;
Server handles to obtain the data acquisition system of serializing form by the first intermediary matrix of SHA512 algorithms pair;
Server obtains matrix correlation value packet after being handled data acquisition system and R-matrix by the second preset algorithm It includes:
Server obtains the second intermediary matrix by carrying out product calculation to each data matrix and R-matrix;
Server handles to obtain the reference data set of serializing form by the second intermediary matrix of SHA512 algorithms pair;
Server correction data set obtains esodisparity value with reference data set, using difference value as matrix correlation Value.
Implement information authentication method in a kind of smart home provided by the invention to have the advantages that:In the server The original user information for not storing acquisition only retains data after treatment to carry out authentification of message, and retain Information determines relationship with original user information existence anduniquess, has not only met the safety of information storage, but also improves certification identification Accuracy.
Description of the drawings
Fig. 1 be the embodiment of the present invention smart home in information authentication method flow chart.
Specific implementation mode
As shown in Figure 1, information authentication method in a kind of smart home comprising following steps:
S1, an exclusive storage region is divided in the server, the exclusive storage region is stored for data encryption.It is optional Exclusive storage region is encrypted in ground by the encrypted mode of hardware, ensures the storage safety of data in server.
S2, the identity identification information that each member within the scope of household is obtained by sensor;The identity of each user is known Other information is sent to server;The identity identification information of each member is obtained by sensor, and is sent to server, member's Identity identification information only server be configured to verification user request whether legal information, therefore be disposably to transmit , it will not be stolen in follow-up use.
S3, server are handled all identity identification informations after obtaining identification data acquisition system according to the first preset algorithm Delete the identity identification information of each user;Server will identify that data acquisition system carries out packet according to member.
The identity identification information that each user is deleted after obtaining identification data acquisition system ensure that the identification letter of user Breath is not leaked, even if occurring that in the case that exclusive storage region is leaked, the true identification information of user will not be obtained, The identification information includes iris recognition information, finger print information etc..
In embodiments of the present invention, data acquisition system is multiple, and there are corresponding with the identity identification information of user for data acquisition system Relationship;Therefore, server will identify that data acquisition system carries out packet according to member, and array grouping and user identity may be implemented Correspondence.Packet is a kind of process classified to data acquisition system according to user identity.
In smart home of the present invention in information authentication method,
The step S3 includes:
The identity identification information of each user is respectively converted into data matrix;Since the identity information of user may include The biometric informations such as iris, fingerprint, and the identification method that different user is taken is different, therefore the identity of different users The data matrix of identification information conversion is different, and not only value is different, and there may be differences for line number, columns.The embodiment of the present invention Isomorphism introduces the concept of data matrix, and introduces and be standardized the concept for being compensated matrix to incidence matrix, makes It is more preferable to obtain the compatibility of the invention for the various biometric informations of user, and these verification informations can intersect, flexible group It closes so that disabled user can not parse the user information of acquired original from all information.
According to each data matrix compensation matrix corresponding with the incidence relation of other matrixes each data matrix of generation.
In smart home of the present invention in information authentication method,
The incidence relation according to each data matrix and other matrixes generates the corresponding compensation square of each data matrix Battle array include:
According to the line number of data matrix, columns, line number is filtered out, columns corresponds to line number, row less than or equal to data matrix Other several matrixes are as incidence matrix;By this step, the calculation amount of compensation matrix generation can be substantially reduced.
Setting offset is standardized incidence matrix and is compensated matrix according to offset.
Offset can be independently arranged by user, it is preferable that can pass through the personal status relationship next life between different user At offset.It can be arranged and pre-set fixed numerical value and be used as offset.
Incidence matrix is standardized and is compensated matrix and may include:If the row and/or row of incidence matrix Less than corresponding data matrix, then the row of incidence matrix and/or row polishing are compensated by matrix by offset.
By implementing the present embodiment, due to being provided with offset, obtained subsequently by standardized compensation matrix to realize Data acquisition system, and reduce operand.
The corresponding R-matrix of each data matrix is generated according to compensation matrix, R-matrix is encrypted by escape way After be sent to the corresponding mobile terminal of data matrix.
Optionally, the corresponding R-matrix of each data matrix is generated by replacing spy in compensation matrix according to compensation matrix Fixed numerical value obtains.
The advantageous effect for implementing the present embodiment is:What is sent to mobile terminal is R-matrix, and different data The corresponding R-matrix of matrix is different in fact, and numerical value difference, line number/columns may also be different.Make other illegal users Can not data matrix finally be obtained by reference to matrix, and can not also obtain the identity information of all users simultaneously.
Server is handled to obtain data acquisition system by the first preset algorithm to data matrix and compensation matrix;Server Matrix correlation value is obtained after being handled data acquisition system and R-matrix by the second preset algorithm.In the embodiment of the present invention In, by judging whether the request of user is legal with the verification of matrix correlation value, it on the one hand can establish and uniquely know with user The correspondence of other information (iris information, finger print information), and and it is indirect verified using these information, substantially increase Safety.
In smart home of the present invention in information authentication method,
Server is handled to obtain data acquisition system by the first preset algorithm to data matrix and compensation matrix:
Server obtains the first intermediary matrix by carrying out product calculation to each data matrix and compensation matrix;
Server handles to obtain the data acquisition system of serializing form by the first intermediary matrix of SHA512 algorithms pair.
Correspondence can not be cracked out since SHA512 algorithms are a kind of non-reversible algorithms, if even if obtaining data acquisition system Data matrix, and then the identification information of corresponding user can not be obtained.In embodiments of the present invention, the first preset algorithm refers to above-mentioned All processing steps.
Server obtains matrix correlation value packet after being handled data acquisition system and R-matrix by the second preset algorithm It includes:
Server obtains the second intermediary matrix by carrying out product calculation to each data matrix and R-matrix;
Server handles to obtain the reference data set of serializing form by the second intermediary matrix of SHA512 algorithms pair;
Server correction data set obtains esodisparity value with reference data set, using difference value as matrix correlation Value.
It can not be cracked out since SHA512 algorithms are a kind of non-reversible algorithms, if even if obtaining reference data set Corresponding data matrix, and then the identification information of user can not be obtained.In embodiments of the present invention, the first preset algorithm refers to above-mentioned All processing steps.By the way that matrix correlation value is arranged, can solve to bring by reference to matrix and by compensation matrix operation The problem of Different Results, closes so as to form matrix correlation value with packet in data acquisition system and the mapping of matrix correlation value System.
Server will identify that data acquisition system carries out packet according to member, and establish in matrix correlation value and data acquisition system The mapping relations of packet and matrix correlation value;
Server deletes identity identification information, R-matrix, the compensation matrix of user, and by data acquisition system, matrix correlation Value and packet and the mapping relations of matrix correlation value are stored in exclusive storage region.
By implementing this step, it is only stored with data acquisition system, matrix correlation value and packet and square in the server The mapping relations of battle array relating value, that is, allow to obtain these three different information simultaneously, can not also obtain corresponding with array grouping User identification information.
S4, the mapping relations for establishing each packet intelligent terminal corresponding with member in the server;
S5, when user asks to carry out authentication, corresponding user information is obtained by intelligent terminal, it is default by second Algorithm carries out processing to user information and is verified information, deletes after intelligent terminal obtains corresponding user information and sends out verification information It is sent to server.
In smart home of the present invention in information authentication method,
The step S5 includes:
When user asks to carry out authentication, pass through acquisition for mobile terminal corresponding user information;
Mobile terminal converts user information to verify data matrix;
Mobile terminal is verified letter after being handled verify data matrix and R-matrix by the second preset algorithm Breath, mobile terminal transmit authentication information to server after deleting corresponding user information.
S6, server verify verification information, receive the ID authentication request of user when being verified;Otherwise it uses Family authentication failure.
During entire authentification of message, whether server or mobile terminal or in transmission process, even if Illegal user obtains the information and data during these three links, can not also crack out the identification information of user.
In smart home of the present invention in information authentication method,
The step S6 includes:
S61, server judge whether verification information matches with matrix correlation value;The jump procedure S62 in matching;
S62, server are closed by establishing matrix correlation value with packet in data acquisition system and the mapping of matrix correlation value System determines corresponding packet;
S63, server confirm the identity of user by the mapping relations of each packet mobile terminal corresponding with member Certification request passes through.
Implement information authentication method in a kind of smart home provided by the invention to have the advantages that:In the server The original user information for not storing acquisition only retains data after treatment to carry out authentification of message, and retain Information determines relationship with original user information existence anduniquess, has not only met the safety of information storage, but also improves certification identification Accuracy.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can directly be held with hardware, processor The combination of capable software module or the two is implemented.Software module can be placed in random access memory, memory, read-only memory, Institute is public in electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field In the storage medium for the arbitrary other forms known.
It is understood that for those of ordinary skill in the art, can be conceived with the technique according to the invention and be done Go out various other corresponding changes and deformation, and all these changes and deformation should all belong to the protection model of the claims in the present invention It encloses.

Claims (6)

1. information authentication method in a kind of smart home, which is characterized in that it includes the following steps:
S1, an exclusive storage region is divided in the server, the exclusive storage region is stored for data encryption;
S2, the identity identification information that each member within the scope of household is obtained by sensor;The identification of each user is believed Breath is sent to server;
All identity identification informations are handled to delete after obtaining identification data acquisition system by S3, server according to the first preset algorithm The identity identification information of each user;Server will identify that data acquisition system carries out packet according to member;
S4, the mapping relations for establishing each packet intelligent terminal corresponding with member in the server;
S5, user ask carry out authentication when, by intelligent terminal obtain corresponding user information, pass through the second preset algorithm Processing is carried out to user information and is verified information, deletes after intelligent terminal obtains corresponding user information and transmits authentication information to Server;
S6, server verify verification information, receive the ID authentication request of user when being verified;Otherwise user's body Part authentication failed.
2. information authentication method in smart home as described in claim 1, which is characterized in that
The step S3 includes:
The identity identification information of each user is respectively converted into data matrix;
According to each data matrix compensation matrix corresponding with the incidence relation of other matrixes each data matrix of generation;
The corresponding R-matrix of each data matrix is generated according to compensation matrix, is sent out after R-matrix is encrypted by escape way Give data matrix corresponding mobile terminal;
Server is handled to obtain data acquisition system by the first preset algorithm to data matrix and compensation matrix;Server passes through Second preset algorithm obtains matrix correlation value after handling data acquisition system and R-matrix;
Server will identify that data acquisition system carries out packet according to member, and establish matrix correlation value and data in data acquisition system The mapping relations of grouping and matrix correlation value;
Server delete user identity identification information, R-matrix, compensation matrix, and by data acquisition system, matrix correlation value with And packet and the mapping relations of matrix correlation value are stored in exclusive storage region.
3. information authentication method in smart home as claimed in claim 2, which is characterized in that
The step S5 includes:
When user asks to carry out authentication, pass through acquisition for mobile terminal corresponding user information;
Mobile terminal converts user information to verify data matrix;
Mobile terminal is verified information after being handled verify data matrix and R-matrix by the second preset algorithm, move Dynamic terminal transmits authentication information to server after deleting corresponding user information.
4. information authentication method in smart home as claimed in claim 3, which is characterized in that
The step S6 includes:
S61, server judge whether verification information matches with matrix correlation value;The jump procedure S62 in matching;
S62, server are true by establishing matrix correlation value and packet in data acquisition system and the mapping relations of matrix correlation value Fixed corresponding packet;
S63, server confirm the authentication of user by the mapping relations of each packet mobile terminal corresponding with member Request passes through.
5. information authentication method in smart home as claimed in claim 2, which is characterized in that
The incidence relation according to each data matrix and other matrixes generates the corresponding compensation matrix packet of each data matrix It includes:
According to the line number of data matrix, columns, line number is filtered out, columns is less than or equal to data matrix and corresponds to line number, columns Other matrixes are as incidence matrix;
Setting offset is standardized incidence matrix and is compensated matrix according to offset.
6. information authentication method in smart home as claimed in claim 5, which is characterized in that
Server is handled to obtain data acquisition system by the first preset algorithm to data matrix and compensation matrix:
Server obtains the first intermediary matrix by carrying out product calculation to each data matrix and compensation matrix;
Server handles to obtain the data acquisition system of serializing form by the first intermediary matrix of SHA512 algorithms pair;
Server obtains matrix correlation value after being handled data acquisition system and R-matrix by the second preset algorithm:
Server obtains the second intermediary matrix by carrying out product calculation to each data matrix and R-matrix;
Server obtains the reference data set of serializing form by the second matrix disposal of SHA512 algorithms pair;
Server correction data set obtains esodisparity value with reference data set, using difference value as matrix difference value.
CN201810222355.3A 2018-03-19 2018-03-19 Information authentication method in smart home Active CN108322480B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810222355.3A CN108322480B (en) 2018-03-19 2018-03-19 Information authentication method in smart home

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810222355.3A CN108322480B (en) 2018-03-19 2018-03-19 Information authentication method in smart home

Publications (2)

Publication Number Publication Date
CN108322480A true CN108322480A (en) 2018-07-24
CN108322480B CN108322480B (en) 2020-11-20

Family

ID=62898486

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810222355.3A Active CN108322480B (en) 2018-03-19 2018-03-19 Information authentication method in smart home

Country Status (1)

Country Link
CN (1) CN108322480B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102598543A (en) * 2009-11-18 2012-07-18 西门子公司 Method and arrangement for stabilizing a color coding method and optically transferring data
CN104935608A (en) * 2015-07-07 2015-09-23 成都睿峰科技有限公司 Identity authentication method in cloud computing network
US20150341350A1 (en) * 2014-05-23 2015-11-26 Fujitsu Limited Privacy preserving biometric authentication based on error correcting codes
CN105577357A (en) * 2015-12-21 2016-05-11 东南大学 Intelligent household data privacy protection method based on full homomorphic encryption
CN105681269A (en) * 2014-12-04 2016-06-15 富士通株式会社 Privacy preserving set-based biometric authentication
CN106101260A (en) * 2016-07-06 2016-11-09 杨炳 Smart Home security access system
CN106471534A (en) * 2014-02-04 2017-03-01 德克·海尔宾 Cross support processor
CN106657655A (en) * 2016-12-30 2017-05-10 深圳智乐信息科技有限公司 Control method and system
CN106789378A (en) * 2017-03-29 2017-05-31 宁夏灵智科技有限公司 Information prevents from revealing method and system in smart home
CN107612889A (en) * 2017-08-23 2018-01-19 四川长虹电器股份有限公司 The method for preventing user profile from revealing

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102598543A (en) * 2009-11-18 2012-07-18 西门子公司 Method and arrangement for stabilizing a color coding method and optically transferring data
CN106471534A (en) * 2014-02-04 2017-03-01 德克·海尔宾 Cross support processor
US20150341350A1 (en) * 2014-05-23 2015-11-26 Fujitsu Limited Privacy preserving biometric authentication based on error correcting codes
CN105681269A (en) * 2014-12-04 2016-06-15 富士通株式会社 Privacy preserving set-based biometric authentication
CN104935608A (en) * 2015-07-07 2015-09-23 成都睿峰科技有限公司 Identity authentication method in cloud computing network
CN105577357A (en) * 2015-12-21 2016-05-11 东南大学 Intelligent household data privacy protection method based on full homomorphic encryption
CN106101260A (en) * 2016-07-06 2016-11-09 杨炳 Smart Home security access system
CN106657655A (en) * 2016-12-30 2017-05-10 深圳智乐信息科技有限公司 Control method and system
CN106789378A (en) * 2017-03-29 2017-05-31 宁夏灵智科技有限公司 Information prevents from revealing method and system in smart home
CN107612889A (en) * 2017-08-23 2018-01-19 四川长虹电器股份有限公司 The method for preventing user profile from revealing

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
戴华等: "两层传感网中能量高效的隐私保护范围查询方法 ", 《计算机研究与发展》 *
戴华等: "两层传感网中能量高效的隐私保护范围查询方法", 《计算机研究与发展》 *

Also Published As

Publication number Publication date
CN108322480B (en) 2020-11-20

Similar Documents

Publication Publication Date Title
US10454913B2 (en) Device authentication agent
US20140093144A1 (en) More-Secure Hardware Token
EP0944980B1 (en) Method and system for improving security in network applications
US10242171B2 (en) Verifying a user identity
US11194895B2 (en) Method and apparatus for authenticating biometric information
CN108023894A (en) Visa information system and its processing method based on block chain
KR20180081108A (en) Public / private key biometric authentication system
EP3363154A1 (en) Storing and retrieving cryptographic keys from biometric data
KR20170098890A (en) Equipment verification method and apparatus
CN105227307A (en) Auth method and system and server data processing method and server
CN105635099A (en) Identity authentication method, identity authentication system, terminal and server
US20240048555A1 (en) Privacy-Preserving Biometric Authentication
CN107733636A (en) Authentication method and Verification System
CN104820814A (en) Second-generation ID card anti-counterfeiting verification system
US11681787B1 (en) Ownership validation for cryptographic asset contracts using irreversibly transformed identity tokens
CN105868610A (en) Method and system for realizing user authentication through biological characteristic information
CN105827571A (en) UAF (Universal Authentication Framework) protocol based multi-modal biological characteristic authentication method and equipment
WO2023142453A1 (en) Biometric identification method, server, and client
CN113591057A (en) Biological characteristic off-line identity recognition method and system
CN109246066B (en) Identity recognition method, cloud server and identity recognition system
CN108377249A (en) Information authentication method in new energy automobile based on Internet of things technology
CN115801382A (en) User information authentication method and system
US20150120543A1 (en) EyeWatch ATM and Wire Transfer Fraud Prevention System
CN101459514A (en) Method and apparatus for biological identification, biological characteristic data ciphering method
CN110619228B (en) File decryption method, file encryption method, file management system and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20201102

Address after: No. 617, Lijiagou village, Heshun Town, Linzhou City, Anyang City, Henan Province

Applicant after: Wang Rui

Address before: 430000 Wuhan Donghu New Technological Development Zone, Hubei Province, Guannan Science and Technology Industrial Park, Phase I, Level 3, Unit 21, No. 9 (Admitted to Wuhan Chuangyijia Business Secretary Service Co., Ltd; Trusteeship No. 000348)

Applicant before: WUHAN KANGHUIRAN INFORMATION TECHNOLOGY CONSULTING Co.,Ltd.

GR01 Patent grant
GR01 Patent grant