CN110175573B - Face and iris coding and verification method, system and computer storage medium - Google Patents

Face and iris coding and verification method, system and computer storage medium Download PDF

Info

Publication number
CN110175573B
CN110175573B CN201910452926.7A CN201910452926A CN110175573B CN 110175573 B CN110175573 B CN 110175573B CN 201910452926 A CN201910452926 A CN 201910452926A CN 110175573 B CN110175573 B CN 110175573B
Authority
CN
China
Prior art keywords
information
iris
face
coding
initial
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910452926.7A
Other languages
Chinese (zh)
Other versions
CN110175573A (en
Inventor
白羽
周昱彤
华勐志
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jilin Lost Biometric Technology Co ltd
Original Assignee
Jilin Lost Biometric Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jilin Lost Biometric Technology Co ltd filed Critical Jilin Lost Biometric Technology Co ltd
Priority to CN201910452926.7A priority Critical patent/CN110175573B/en
Publication of CN110175573A publication Critical patent/CN110175573A/en
Application granted granted Critical
Publication of CN110175573B publication Critical patent/CN110175573B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/168Feature extraction; Face representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/18Eye characteristics, e.g. of the iris

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • General Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Software Systems (AREA)
  • Ophthalmology & Optometry (AREA)
  • Collating Specific Patterns (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

The invention discloses a method, a system and a computer readable storage medium for encoding and verifying a human face and an iris, wherein the method for encoding and verifying the human face and the iris comprises the following steps: s100: collecting initial face information and initial iris information of a user; s110: combining the initial face information and the initial iris information to form initial information A1; s120: carrying out first confusion coding on the initial information A1 to generate information A2; s130: carrying out a second confusion coding on the information A2 by combining the personal identity information and the authority information of the user to generate information A3; s140: packaging the information A3 by digital envelopes to generate information A4; s150: carrying out third confusion coding on the information A4 to generate information A5; s160: recording the information A5 into an identity card for biological feature recognition; s180: and synchronously verifying the face information to be verified and the iris to be verified of the user through the identity card identified by the biological characteristics. The invention is more convenient to use and enhances the protection of the personal face and iris information.

Description

Face and iris coding and verification method, system and computer storage medium
Technical Field
The invention relates to the technical field of iris application, in particular to a method, a system and a computer storage medium for encoding and verifying a human face and an iris.
Background
Today, with the development of informatization, problems existing in protecting personal identity information and application system security of traditional user name passwords, IC cards and the like are increasingly apparent, and problems such as password (IC card) loss, forgetting, theft and the like frequently occur. The rapid development of artificial intelligence and the demand of people for higher-demand identity authentication modes make the biometric technology increasingly emerging. The technology is mature and more product schemes realize the application of the technology in the ground, and the biological recognition technology is becoming an important means for verifying personal identity information instead of the traditional passwords and magnetic cards. The biological recognition technology is to combine computer with optics, acoustics, biological sensor, biological statistics principle and other high technology to identify the personal identity with the physiological characteristic of human body.
The existing iris biometric identification products on the market at present are divided into two types of methods for protecting the biological characteristics of users. The personal biological characteristics are encrypted by adopting an encryption algorithm such as RSA, AES, SM and the like and then are directly stored in a local server, and the personal iris biological characteristics are collected and compared with personal biological characteristic information stored in the local server when an authentication system authenticates; another scheme is to encrypt the personal biological characteristics by adopting an encryption algorithm such as RSA, AES, SM2, and the like, store the ciphertext of the biological characteristics on a plurality of servers in a distributed manner by adopting a blockchain technology in a storage stage. The common characteristics of the two schemes are that the user needs to store the iris biological information of the user in the application server in advance (the blockchain scheme only stores a plurality of copies in different servers), when the identity authentication is carried out, the personal iris information acquired by the acquisition terminal of the authentication system is compared with the iris information in the server to confirm the identity of the user, the acquisition terminal of the authentication system needs to be connected with the server, the use is inconvenient, and once an lawbreaker breaks the server, the iris information of all users can be acquired, so that the identity information of a certain person is stolen, but the identity of all users in the server system is stolen, the important safety problem that the user cannot be used is solved, and the iris recognition is only used, so that the function is single.
Disclosure of Invention
The invention mainly aims to provide a coding and verification method for faces and irises, which aims to be more convenient to use and enhance the protection of personal information.
In order to achieve the above purpose, the present invention provides a method for encoding and verifying a face and an iris, comprising the following steps:
s100: collecting initial face information and initial iris information of a user;
s110: combining the initial face information and the initial iris information to form initial information A1;
s120: carrying out first confusion coding on the initial information A1 to generate information A2;
s130: carrying out a second confusion coding on the information A2 by combining the personal identity information and the authority information of the user to generate information A3;
s140: packaging the information A3 by digital envelopes to generate information A4;
s150: carrying out third confusion coding on the information A4 to generate information A5;
s160: recording the information A5 into an identity card for biological feature recognition;
s180: and synchronously verifying the face information to be verified and the iris to be verified of the user through the identity card identified by the biological characteristics.
Preferably, step S180 of synchronously verifying face information to be verified and iris to be verified of a user through an identification card of biometric identification specifically includes the following steps:
s181: collecting face information to be verified and iris information to be verified of a user, and combining the face information to be verified and the iris information to be verified to form information a1 to be verified;
s182: reading information A5 of the identification card identified by the biological characteristics;
s183: decoding the information A5 into digital envelope information A4;
s184: verifying the information A4, and obtaining information A3 after the verification is passed;
s185: decoding the information A3 to obtain information A2 and stored personal identity information and authority information;
s186: decoding the information A2 to obtain initial information A1;
s187: and comparing the initial information A1 in the identity card identified by the biological characteristics with the information A1 to be verified to judge whether the identity of the user is legal or not.
Preferably, the step S140 of digitally envelope-packing the information A3 to generate the information A4 specifically includes the following steps:
s141: and (3) digitally signing the information A3 by using a digital certificate stored in a server or using a certificate of a third-party authority digital certificate authentication center, and then packaging to generate information A4 of a signature envelope, wherein the format of the signature envelope is an international standard signature envelope format or a national standard signature envelope format.
Preferably, step S160 further includes the following steps after recording the information A5 in the identification card for biometric identification:
s170: and writing the ID code into the identification card for biological feature recognition.
Preferably, step S184 verifies the information A4, and the step of acquiring the information A3 after the verification is passed specifically includes the following steps:
s1841: judging whether the information A4 is legal and not tampered, if so, acquiring the information A3, executing the next step, and if not, stopping executing the next step or alarming if the authentication fails.
Preferably, step S187 compares the initial information A1 in the biometric identification card with the information A1 to be verified of the user to determine whether the user identity is legal, and specifically includes the following steps:
s1871: judging whether the initial information A1 in the identity card identified by the biological characteristics is the same as the acquired information A1 to be verified of the user, if so, the identity of the user is legal; if not, the user identity is illegal, and an alarm is given.
Preferably, step S187 compares the initial information A1 in the biometric identification card with the information A1 to be verified of the user to determine whether the user identity is legal, and then further includes the following steps:
s188: and verifying whether the personal identity information is legal or not, and if so, executing the next step.
Preferably, step S188 verifies whether the personal identity information is legal, and if so, the following steps are further included after the next step is performed:
s189: and verifying the authority information, judging whether the authority information records the authority of the application system to be accessed, if so, executing the next step, and if not, stopping executing the next step or giving an alarm.
The invention also provides a system for coding and verifying the human face and the iris, which comprises: a memory, a processor, and a face and iris encoding and verification program stored on the memory and executable on the processor, wherein:
the face and iris encoding and verification program, when executed by the processor, implements the steps of the face and iris encoding and verification method as described above.
The invention also provides a computer storage medium, wherein the computer storage medium is stored with a coding and verifying program of the human face and the iris, and the coding and verifying program of the human face and the iris realizes the steps of the coding and verifying method of the human face and the iris when being executed by a processor.
The technical scheme of the invention is that S100: collecting initial face information and initial iris information of a user; s110: combining the initial face information and the initial iris information to form initial information A1; s120: carrying out first confusion coding on the initial information A1 to generate information A2; s130: carrying out a second confusion coding on the information A2 by combining the personal identity information and the authority information of the user to generate information A3; s140: packaging the information A3 by digital envelopes to generate information A4; s150: carrying out third confusion coding on the information A4 to generate information A5; s160: recording the information A5 into an identity card for biological feature recognition; s180: the face information to be verified and the iris information to be verified of the user are synchronously verified through the identity card with the biological characteristic recognition, so that personal identity information, authority information, face information and iris information of the individual are encrypted and then recorded to the identity card with the biological characteristic recognition for use, and the initial face information and initial iris information in the identity card with the biological characteristic recognition are verified with the acquired face information to be verified and iris information of the user during verification, so that the personal information is more convenient to use and has stronger function, the personal information is prevented from being stored in a centralized server, the risk of personal information leakage caused by non-user personal reasons is reduced, and the protection of the personal information is further enhanced.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to the structures shown in these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic flow chart of a face and iris encoding and verification method according to an embodiment of the present invention;
FIG. 2 is a schematic flow chart of another embodiment of the face and iris encoding and verification method of the present invention;
fig. 3 is a schematic structural diagram of a refinement flow of step S180 in fig. 1 and 2;
fig. 4 is a schematic structural diagram of a refinement flow of step S140 in fig. 1 and 2;
fig. 5 is a schematic diagram of a refinement flow structure of step S184 in fig. 3;
fig. 6 is a schematic diagram of a refinement flow structure of step S187 in fig. 3.
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
It should be noted that all directional indicators (such as up, down, left, right, front, and rear … …) in the embodiments of the present invention are merely used to explain the relative positional relationship, movement, etc. between the components in a particular posture (as shown in the drawings), and if the particular posture is changed, the directional indicator is changed accordingly.
In the present invention, unless specifically stated and limited otherwise, the terms "connected," "affixed," and the like are to be construed broadly, and for example, "affixed" may be a fixed connection, a removable connection, or an integral body; can be mechanically or electrically connected; either directly or indirectly, through intermediaries, or both, may be in communication with each other or in interaction with each other, unless expressly defined otherwise. The specific meaning of the above terms in the present invention can be understood by those of ordinary skill in the art according to the specific circumstances.
Furthermore, descriptions such as those referred to as "first," "second," and the like, are provided for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implying an order of magnitude of the indicated technical features in the present disclosure. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature. In addition, the technical solutions of the embodiments may be combined with each other, but it is necessary to base that the technical solutions can be realized by those skilled in the art, and when the technical solutions are contradictory or cannot be realized, the combination of the technical solutions should be considered to be absent and not within the scope of protection claimed in the present invention.
The invention provides a face and iris coding system. The face and iris encoding system may be a mobile device such as a mobile phone, a smart phone, a notebook computer, a PAD (tablet computer), and a fixed terminal such as a desktop computer, a server, and the like. The face and iris encoding system includes a memory, a processor, and a face and iris encoding program stored on the memory and executable on the processor.
Referring to fig. 1, the face and iris encoding procedure, when executed by the processor, implements the steps of:
s100: collecting initial face information and initial iris information of a user;
s110: combining the initial face information and the initial iris information to form initial information A1;
s120: carrying out first confusion coding on the initial information A1 to generate information A2;
s130: carrying out a second confusion coding on the information A2 by combining the personal identity information and the authority information of the user to generate information A3;
s140: packaging the information A3 by digital envelopes to generate information A4;
s150: carrying out third confusion coding on the information A4 to generate information A5;
s160: and recording the information A5 into the identification card for biological feature recognition.
The memory comprises at least one computer storage medium for storing an operating system and various application software installed on the face and iris coding system, such as program codes of face and iris coding programs. In addition, the memory may be used to temporarily store various types of data that have been output or are to be output.
The processor may be a central processing unit (Central Processing Unit, CPU), controller, microcontroller, microprocessor, or other data processing chip in some embodiments. The processor is typically used to control the overall operation of the face and iris encoding system. In this embodiment, the processor is configured to execute the program code or process data stored in the memory, for example, execute the face and iris coding program, so as to enhance protection of personal information.
The invention also provides a face and iris verification system. The face and iris verification system may be a mobile device such as a mobile phone, a smart phone, a notebook computer, a PAD (tablet computer), and a fixed terminal such as a desktop computer, a server, and the like. The face and iris verification system includes a memory, a processor, and a face and iris verification program stored on the memory and executable on the processor.
Referring to fig. 1, the face and iris verification procedure, when executed by the processor, implements the steps of:
s181: collecting face information to be verified and iris information to be verified of a user, and combining the face information to be verified and the iris information to be verified to form information a1 to be verified;
s182: reading information A5 of the identification card identified by the biological characteristics;
s183: decoding the information A5 into digital envelope information A4;
s184: verifying the information A4, and obtaining information A3 after the verification is passed;
s185: decoding the information A3 to obtain information A2 and stored personal identity information and authority information;
s186: decoding the information A2 to obtain initial information A1;
s187: and comparing the initial information A1 in the identity card identified by the biological characteristics with the information A1 to be verified to judge whether the identity of the user is legal or not.
The memory comprises at least one computer storage medium for storing an operating system and various application software installed on the face and iris verification system, such as program codes of face and iris verification programs. In addition, the memory may be used to temporarily store various types of data that have been output or are to be output.
The processor may be a central processing unit (Central Processing Unit, CPU), controller, microcontroller, microprocessor, or other data processing chip in some embodiments. The processor is typically used to control the overall operation of the face and iris verification system. In this embodiment, the processor is configured to execute the program code or process data stored in the memory, for example, execute the face and iris verification program. The personal information is prevented from being stored in the centralized storage server, the risk of personal information leakage caused by non-user personal reasons is reduced, and the protection of the personal information is further enhanced.
The invention also provides a face and iris coding and verifying system. The face and iris coding and verification system may be a mobile device such as a mobile phone, a smart phone, a notebook computer, a PAD (tablet computer), and a fixed terminal such as a desktop computer, a server, and the like. The face and iris encoding and verification system includes a memory, a processor, and a face and iris encoding and verification program stored on the memory and executable on the processor. The face and iris coding and verifying system can be the integration of the face and iris coding system and the face and iris verifying system, and can be used for simultaneously verifying the face and iris coding and the face and the iris of a user, so that the face and iris coding and iris verifying system is more convenient to use, and particularly more convenient to test.
The memory comprises at least one computer storage medium for storing an operating system and various application software installed on the face and iris coding and verification system, such as program codes of the face and iris coding and verification programs. In addition, the memory may be used to temporarily store various types of data that have been output or are to be output.
The processor may be a central processing unit (Central Processing Unit, CPU), controller, microcontroller, microprocessor, or other data processing chip in some embodiments. The processor is typically used to control the overall operation of the iris encoding and verification system. In this embodiment, the processor is configured to execute the program code or process data stored in the memory, for example, execute the face and iris coding and verification program.
Referring to fig. 1, the face and iris coding and verification procedure, when executed by the processor, implements the following steps: the face and iris coding method comprises the following steps:
s100: collecting initial face information and initial iris information of a user;
s110: combining the initial face information and the initial iris information to form initial information A1;
s120: carrying out first confusion coding on the initial information A1 to generate information A2;
s130: carrying out a second confusion coding on the information A2 by combining the personal identity information and the authority information of the user to generate information A3;
s140: packaging the information A3 by digital envelopes to generate information A4;
s150: carrying out third confusion coding on the information A4 to generate information A5;
s160: recording the information A5 into an identity card for biological feature recognition;
s180: and synchronously verifying the face information to be verified and the iris to be verified of the user through the identity card identified by the biological characteristics.
The first embodiment is that a camera collects initial face information and initial iris information of a user and sends the initial face information and the initial iris information to a processor, the camera can collect the face information and the iris information at the same time or can collect the face information and the iris information respectively, normal shooting collection can be adopted for collecting the face information, focusing can be adopted for collecting the iris information, the processor converts the initial face information and the initial iris information of the user into codes and then combines the codes, the codes can be combined front and back, and the processor carries out first confusion coding on the initial information A1 to generate information A2, namely the initially collected iris information and the initially collected face information can be subjected to confusion coding, protection of personal information of the user is enhanced, and confusion coding is carried out confusion according to a corresponding rule, such as arrangement sequence adjustment and the like; the personal identity information of the user comprises identity document information, passport information, nationality information and the like, and the identity document information of the user is collected through an identity card reader or manually input through a keyboard and a touch screen; the authority information is used for verifying the personal authority information in the biological information identity card according to the personal requirements of the user and the authority given after being licensed in certain scenes needing special authorities, such as security check, access control, equipment access login ports and the like in various occasions, and judging whether the user has corresponding authority; the processor is used for carrying out second confusion coding on the information A2 combined with the personal identity information and the authority information of the user to generate information A3, wherein the second confusion coding can adopt the same confusion rule or different confusion rules with the first confusion coding, and the information A1 is combined with the personal identity information and the authority information to carry out the confusion coding again, so that the collected information of the user is subjected to layer-by-layer confusion, and the safety of the personal information of the user is enhanced; the processor is used for packaging the information A3 into digital envelopes to generate information A4, and encrypting face information, iris information, information personal identity information and authority information of a user to prevent malicious tampering and ensure the integrity and safety of the information A3; and then the processor carries out the third confusion coding on the information A4 to generate the information A5, so that copying and cracking of the information A4 by other people are prevented, and the safety of face information, iris information, personal identity information and authority information of the user is further ensured. The identification card with the biological characteristic identification is a card with a chip, the specific structure of the card is a conventional design, and the specific structure is not repeated here, and the information A5 is written into the chip of the identification card with the biological characteristic identification, so that the identification card is convenient for a user to carry about, is more convenient to use, prevents personal information from being stored in a centralized storage server, reduces the risk of personal information leakage caused by non-user personal reasons, and further enhances the protection of the personal information.
Further, referring to fig. 2, step S160 further includes the following steps after recording the information A5 in the identification card of biometric identification: s170: and writing the ID code into the identification card for biological feature recognition. Each processor is provided with a corresponding ID code, the ID codes corresponding to the processors are written into the identification card of the biological feature recognition, the rules of the first confusion code, the second confusion code and the third confusion code corresponding to each processor are all fixed rules, and when the identification card of the biological feature recognition is verified, the corresponding confusion rules can be obtained only by reading the corresponding ID codes so as to decode information in the identification card of the biological feature recognition, wherein the rules of the first confusion code, the second confusion code and the third confusion code are preferably the same confusion rules.
Further, the rules of the first confusion code, the second confusion code and the third confusion code are as follows: the processor equally divides the binary code of the information A1 into 3 parts (P1, P2 and P3), and each part is divided into N small blocks again, for example, each part is divided into six small blocks, namely P11, P12, P13, P14, P15 and P16 form P1; p21, P22, P23, P24, P25, P26 constitute P2; p31, P32, P33, P34, P35, P36 constitute P3; recombining the small blocks of each part into three parts (C1, C2 and C3) according to a certain confusion rule, such as a change arrangement mode, for example, P11, P21, P31, P12, P22 and P32 form C1, P13, P23, P33, P14, P24 and P34 form C2; p15, P25, P35, P16, P26 and P36 form C3; and finally, splicing C1, C2 and C3 into binary system to finish the first confusion coding. The method comprises the steps of generating information A3 by mixing and encoding information A2 after first confusion with personal identity information and authority information of a user, specifically, splicing binary codes of the identity information and the authority information into new binary data M, dividing each part into N small blocks again, for example, dividing each part into six small blocks, for example, dividing each part into M1, M2, M3, M4, M5 and M6 to form M, dividing the binary system of the information A2 after confusion encoding into a plurality of small blocks, for example, dividing each part into N1, N2, N3, N4, N5 and N6 to form N, recombining each part into two parts (C1 and C2) according to a certain confusion rule, for example, changing arrangement mode and the like, for example, dividing each part into C1, M1, N1, M2, M3 and N3 to form C1, M4, N4, M5, M6 and N6 to form C2, splicing C1 and C2 to form binary system code, and then completing encoding, and obtaining second confusion generating information A3; the third confusion coding rule is identical to the first confusion coding rule, and the like, and is not repeated here, so that the information A4 is subjected to the third confusion coding to generate the information A5, and the protection of personal information is enhanced.
Referring to fig. 3, preferably, step S180 specifically includes the steps of:
s181: collecting face information to be verified and iris information to be verified of a user, and combining the face information to be verified and the iris information to be verified to form information a1 to be verified;
s182: reading information A5 of the identification card identified by the biological characteristics;
s183: decoding the information A5 into digital envelope information A4;
s184: verifying the information A4, and obtaining information A3 after the verification is passed;
s185: decoding the information A3 to obtain information A2 and stored personal identity information and authority information;
s186: decoding the information A2 to obtain initial information A1;
s187: and comparing the initial information A1 in the identity card identified by the biological characteristics with the information A1 to be verified to judge whether the identity of the user is legal or not.
In a second embodiment, when a user uses an identity card with biometric identification, face information to be authenticated and iris information to be authenticated, which are acquired through a camera, are combined to form information A1 to be authenticated, an information reader adopting a TypeB non-contact IC card reading technology, such as an identity card reader, is used for reading information A5 of the identity card with biometric identification, the information A5 is decoded through a processor to obtain digital envelope information A4, then the information A4 is authenticated through a private key, information A3 is obtained after authentication, the information A3 is decoded through the processor to obtain information A2 and stored personal identity information and authority information, the information A2 is decoded through the processor to obtain iris information, finally the information A1 in the identity card with biometric identification is compared with the information A1 to be authenticated through the processor, whether the similarity of the information A1 and the information A5 exceeds a set threshold is judged, if the similarity exceeds the set threshold, the information A4 is identical, and if the similarity exceeds the set threshold, the identity of the user is legal, the user is not legal. The threshold value is obtained by reversely pushing the interval of the degree of identity obtained by testing a plurality of users with legal identities for a plurality of times.
The processor of the face and iris verification system and the processor of the face and iris coding system may be in communication connection with each other or the face and iris verification system stores the corresponding rules of the first confusion coding, the second confusion coding and the third confusion coding in the face and iris coding system, so that the processor can quickly decrypt according to the corresponding confusion coding rules.
Further, an embodiment is: step S182 further includes the following steps after reading the information A5 of the biometric identification card: and reading the ID codes in the biological feature-identified identity card, searching corresponding confusion rules of the corresponding first confusion code, the second confusion code and the third confusion code according to the ID codes, and performing reverse-pushing quick and sequential decoding according to the corresponding confusion rules of the ID codes.
Referring to fig. 4, the step S140 specifically includes the following steps:
s141: and (3) digitally signing the information A3 by using a digital certificate stored in a server or using a certificate of a third-party authority digital certificate authentication center, and then packaging to generate information A4 of a signature envelope, wherein the format of the signature envelope is an international standard signature envelope format or a national standard signature envelope format. Thereby enhancing the security reliability of the information A4 thereof.
Referring to fig. 5, step S184 preferably specifically includes the steps of:
s1841: judging whether the information A4 is legal and not tampered, if so, acquiring the information A3, executing the next step, and if not, stopping executing the next step or alarming if the authentication fails. Specifically, the input private key can be received, whether the input private key is correct or not is judged, so that the information A4 is legal or not and is not tampered, if the private key is correct, the information A3 is obtained by decoding the information A4 through the private key, if the private key is incorrect, the retry can be prompted, and after the verification fails for a plurality of times, the identity verification is confirmed to fail, the next step is stopped or the alarm is performed, so that the safety of the personal identity information is ensured.
Referring to fig. 6, step S187 preferably specifically includes the steps of:
s1871: judging whether the initial information A1 in the identity card identified by the biological characteristics is the same as the acquired information A1 to be verified of the user, if so, the identity of the user is legal; if not, the user identity is illegal, and an alarm is given.
The processor can be electrically connected with an alarm, and specifically can judge whether the similarity of the processor and the alarm exceeds a set threshold value, if so, the processor and the alarm are the same, if not, the user identity is legal, and the alarm is used for reminding by the alarm. The threshold value is obtained by reversely pushing the acquired acquaintance through the test for a plurality of users with legal identities for a plurality of times. Thereby enhancing the security of personal identity information.
Referring to fig. 3, step S187 preferably further includes the following steps:
s188: and verifying whether the personal identity information is legal or not, and if so, executing the next step.
The processor can be electrically connected with an identity card reader, the identity card reader is used for identifying the identity card number information of the individual in the identity card, and the identity card number information in the identity card is compared with the identity card number information in the individual identity information decoded in the identity card with biological characteristics to judge whether the identity card number information is the same; the camera can shoot the face information, and the shot face information is compared with the portrait information in the personal identity information decoded in the identity card with biological feature recognition to judge whether the face information is similar. And when the identity card number information in the personal identity information is the same as the identity card number in the identity card and the shot face information is similar to the portrait information in the decoded personal identity information, executing the next step. Thereby enhancing the security of personal identity information.
Referring to fig. 3, step S188 preferably further comprises the following steps:
s189: and verifying the authority information, judging whether the authority information records the authority of the application system to be accessed, if so, executing the next step, and if not, stopping executing the next step or giving an alarm.
The authority information is used for security check, access control, equipment access login ports and the like in certain scenes needing special authorities, and can be the authority information such as the effective period of the identification card identified by the most basic biological characteristics, and the personal authority information in the biological information identification card can be verified according to the personal requirements of the user and the authority given after being licensed, so that whether the user has the corresponding authority can be judged. The function of the identity card for biological feature recognition is more varied, and the use is more convenient.
The foregoing specific embodiments and beneficial effects of the face and iris encoding system are the same as those of the first specific embodiment and beneficial effects of the face and iris encoding and verification method, and are not described in detail herein, and the foregoing specific embodiments and beneficial effects of the face and iris authentication system are the same as those of the second specific embodiment and beneficial effects of the face and iris encoding and verification method, and are not described in detail herein.
The foregoing description is only of the preferred embodiments of the present invention and is not intended to limit the scope of the invention, and all equivalent structural changes made by the description of the present invention and the accompanying drawings or direct/indirect application in other related technical fields are included in the scope of the invention.

Claims (10)

1. The face and iris coding and verifying method is characterized by comprising the following steps:
s100: collecting initial face information and initial iris information of a user;
s110: combining the initial face information and the initial iris information to form initial information A1;
s120: carrying out first confusion coding on the initial information A1 to generate information A2;
s130: carrying out a second confusion coding on the information A2 by combining the personal identity information and the authority information of the user to generate information A3;
s140: packaging the information A3 by digital envelopes to generate information A4;
s150: carrying out third confusion coding on the information A4 to generate information A5;
s160: recording the information A5 into an identity card for biological feature recognition;
s180: and synchronously verifying the face information to be verified and the iris to be verified of the user through the identity card identified by the biological characteristics.
2. The face and iris encoding and verification method as claimed in claim 1, wherein the step S180 comprises the steps of:
s181: collecting face information to be verified and iris information to be verified of a user, and combining the face information to be verified and the iris information to be verified to form information a1 to be verified;
s182: reading information A5 of the identification card identified by the biological characteristics;
s183: decoding the information A5 into digital envelope information A4;
s184: verifying the information A4, and obtaining information A3 after the verification is passed;
s185: decoding the information A3 to obtain information A2 and stored personal identity information and authority information;
s186: decoding the information A2 to obtain initial information A1;
s187: and comparing the initial information A1 in the identity card identified by the biological characteristics with the information A1 to be verified to judge whether the identity of the user is legal or not.
3. The face and iris encoding and verification method as claimed in claim 1, wherein the step S140 comprises the steps of:
s141: and (3) digitally signing the information A3 by using a digital certificate stored in a server or using a certificate of a third-party authority digital certificate authentication center, and then packaging to generate information A4 of a signature envelope, wherein the format of the signature envelope is an international standard signature envelope format or a national standard signature envelope format.
4. The method of face and iris coding and verification of claim 1, further comprising the steps of, after step S160:
s170: writing the ID code into an identity card for biological feature recognition; the ID codes are ID codes which are correspondingly set for each processor and are used for calling confusion coding rules corresponding to the processors.
5. The method of face and iris coding and verification of claim 2 wherein step S184 specifically comprises the steps of:
s1841: judging whether the information A4 is legal and not tampered, if so, acquiring the information A3, executing the next step, and if not, stopping executing the next step or alarming if the authentication fails.
6. The face and iris encoding and verification method as claimed in claim 2, wherein the step S187 comprises the steps of:
s1871: judging whether the initial information A1 in the identity card identified by the biological characteristics is the same as the acquired information A1 to be verified of the user, if so, the identity of the user is legal; if not, the user identity is illegal, and an alarm is given.
7. The method of face and iris coding and verification of claim 2 wherein step S187 is followed by the further step of:
s188: and verifying whether the personal identity information is legal or not, and if so, executing the next step.
8. The method of face and iris coding and verification of claim 7 wherein step S188 is followed by the steps of:
s189: and verifying the authority information, judging whether the authority information records the authority of the application system to be accessed, if so, executing the next step, and if not, stopping executing the next step or giving an alarm.
9. A face and iris encoding and verification system, the face and iris encoding and verification system comprising: a memory, a processor, and a face and iris encoding and verification program stored on the memory and executable on the processor, wherein:
the face and iris encoding and verification program when executed by the processor performs the steps of the face and iris encoding and verification method as claimed in any one of claims 1 to 8.
10. A computer readable storage medium, wherein a face and iris encoding and verification program is stored on the computer readable storage medium, which when executed by a processor, implements the steps of the face and iris encoding and verification method according to any one of claims 1 to 8.
CN201910452926.7A 2019-05-28 2019-05-28 Face and iris coding and verification method, system and computer storage medium Active CN110175573B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910452926.7A CN110175573B (en) 2019-05-28 2019-05-28 Face and iris coding and verification method, system and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910452926.7A CN110175573B (en) 2019-05-28 2019-05-28 Face and iris coding and verification method, system and computer storage medium

Publications (2)

Publication Number Publication Date
CN110175573A CN110175573A (en) 2019-08-27
CN110175573B true CN110175573B (en) 2023-05-23

Family

ID=67695828

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910452926.7A Active CN110175573B (en) 2019-05-28 2019-05-28 Face and iris coding and verification method, system and computer storage medium

Country Status (1)

Country Link
CN (1) CN110175573B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112422491A (en) * 2020-05-08 2021-02-26 上海幻电信息科技有限公司 Encryption and decryption method for digital codes, server and storage medium
CN113268769A (en) * 2021-05-25 2021-08-17 平安普惠企业管理有限公司 Method, system and storage medium for processing biological characteristic data based on random confusion
CN113378226A (en) * 2021-06-24 2021-09-10 平安普惠企业管理有限公司 Biological data processing method, device, equipment and computer readable storage medium
CN115085974A (en) * 2022-05-20 2022-09-20 武汉虹旭信息技术有限责任公司 Flow confusion method and device
CN115620358B (en) * 2022-09-21 2024-02-09 联通数字科技有限公司 Express delivery detection method and device and computer readable storage medium
CN116776386B (en) * 2023-07-05 2023-11-17 深圳钰丰信息技术有限公司 Cloud service data information security management method and system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001338248A (en) * 2000-05-26 2001-12-07 Nec Corp Card information certifying system
WO2002091291A1 (en) * 2001-05-04 2002-11-14 Velasquez Leon Carlos Guillerm Complete personal identification system
CN103701977A (en) * 2013-12-25 2014-04-02 深圳市江波龙电子有限公司 Portable electronic device, communication system and information authentication method
CN107896226A (en) * 2017-12-13 2018-04-10 北京无线电计量测试研究所 A kind of network identification system based on iris recognition
CN108134791A (en) * 2017-12-22 2018-06-08 郑州云海信息技术有限公司 A kind of data center's total management system login validation method
CN108446909A (en) * 2018-04-02 2018-08-24 福州安佳智电子科技有限公司 A kind of electronic signature method based on biological characteristic electronic business card
CN109101803A (en) * 2018-07-25 2018-12-28 腾讯科技(深圳)有限公司 Biometric apparatus and method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070145121A1 (en) * 2005-12-23 2007-06-28 Menashe Fouad Dallal Authentication system for the authorization of a transaction using a credit card, ATM card, or secured personal ID card
US8831677B2 (en) * 2010-11-17 2014-09-09 Antony-Euclid C. Villa-Real Customer-controlled instant-response anti-fraud/anti-identity theft devices (with true-personal identity verification), method and systems for secured global applications in personal/business e-banking, e-commerce, e-medical/health insurance checker, e-education/research/invention, e-disaster advisor, e-immigration, e-airport/aircraft security, e-military/e-law enforcement, with or without NFC component and system, with cellular/satellite phone/internet/multi-media functions

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001338248A (en) * 2000-05-26 2001-12-07 Nec Corp Card information certifying system
WO2002091291A1 (en) * 2001-05-04 2002-11-14 Velasquez Leon Carlos Guillerm Complete personal identification system
CN103701977A (en) * 2013-12-25 2014-04-02 深圳市江波龙电子有限公司 Portable electronic device, communication system and information authentication method
CN107896226A (en) * 2017-12-13 2018-04-10 北京无线电计量测试研究所 A kind of network identification system based on iris recognition
CN108134791A (en) * 2017-12-22 2018-06-08 郑州云海信息技术有限公司 A kind of data center's total management system login validation method
CN108446909A (en) * 2018-04-02 2018-08-24 福州安佳智电子科技有限公司 A kind of electronic signature method based on biological characteristic electronic business card
CN109101803A (en) * 2018-07-25 2018-12-28 腾讯科技(深圳)有限公司 Biometric apparatus and method

Also Published As

Publication number Publication date
CN110175573A (en) 2019-08-27

Similar Documents

Publication Publication Date Title
CN110175573B (en) Face and iris coding and verification method, system and computer storage medium
US10824714B2 (en) Method and system for securing user access, data at rest, and sensitive transactions using biometrics for mobile devices with protected local templates
US7131009B2 (en) Multiple factor-based user identification and authentication
JP5049962B2 (en) Transaction authentication by token, subject to individual presence
US6185316B1 (en) Self-authentication apparatus and method
EP1759330B1 (en) Biometric template similarity based on feature locations
US20070180261A1 (en) Biometric template protection and feature handling
EP0983662A4 (en) Identification and security using biometric measurements
KR101823145B1 (en) Robust biometric feature extraction with and without reference point
EP1584035A1 (en) Authorized anonymous authentication
US11741263B1 (en) Systems and processes for lossy biometric representations
KR20180003113A (en) Server, device and method for authenticating user
US20160283944A1 (en) Method and apparatus for personal virtual authentication and authorization using digital devices and as an alternative for chip card or smart card
US20070106903A1 (en) Multiple Factor-Based User Identification and Authentication
CN109886662A (en) Block chain wallet application method and system, terminal and computer readable storage medium
CN110175444B (en) Iris encoding and verifying method, system and computer readable storage medium
Kannavara et al. Topics in biometric human-machine interaction security
Cimato et al. Biometrics and privacy
Toli et al. Provoking security: Spoofing attacks against crypto-biometric systems
JP2019050014A (en) Account opening system, account opening method, and program
US11681787B1 (en) Ownership validation for cryptographic asset contracts using irreversibly transformed identity tokens
JP2012048728A (en) Token-based transaction authentication under condition of presence of individual
Yang et al. Review of recent patents on cancelable biometrics
Maciej et al. Just look at to open it up
Smiatacz et al. Just look at to open it up: A biometric verification facility for password autofill to protect electronic documents

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant