CN110752914B - Identification device and identity authentication system - Google Patents

Identification device and identity authentication system Download PDF

Info

Publication number
CN110752914B
CN110752914B CN201910828406.1A CN201910828406A CN110752914B CN 110752914 B CN110752914 B CN 110752914B CN 201910828406 A CN201910828406 A CN 201910828406A CN 110752914 B CN110752914 B CN 110752914B
Authority
CN
China
Prior art keywords
information
user
encrypted
characteristic information
information carrier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910828406.1A
Other languages
Chinese (zh)
Other versions
CN110752914A (en
Inventor
徐华斌
李镇旭
郑耀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qingdao Novelbeam Technology Co ltd
Original Assignee
Qingdao Novelbeam Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qingdao Novelbeam Technology Co ltd filed Critical Qingdao Novelbeam Technology Co ltd
Priority to CN201910828406.1A priority Critical patent/CN110752914B/en
Publication of CN110752914A publication Critical patent/CN110752914A/en
Application granted granted Critical
Publication of CN110752914B publication Critical patent/CN110752914B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/13Sensors therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/168Feature extraction; Face representation
    • G06V40/169Holistic features and representations, i.e. based on the facial image taken as a whole
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/168Feature extraction; Face representation
    • G06V40/171Local features and components; Facial parts ; Occluding parts, e.g. glasses; Geometrical relationships
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/18Eye characteristics, e.g. of the iris
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/14Vascular patterns

Abstract

The present disclosure provides an identification device, comprising: the camera device is used for acquiring images of a user; and the control processing device comprises an information acquisition part, an asymmetric encryption module and a code information carrier generator, wherein the information acquisition part acquires the identity characteristic information of the user, the information acquisition part also acquires the biological characteristic information of the user based on the image of the user, the asymmetric encryption module encrypts the identity characteristic information and the biological characteristic information of the user by using a public key in an asymmetric key, and the code information carrier generator generates an encrypted code information carrier based on the encrypted identity characteristic information and the biological characteristic information of the user. The present disclosure also provides an identity authentication system including the above-mentioned identification apparatus.

Description

Identification device and identity authentication system
Technical Field
The present disclosure belongs to the field of biometric identification technologies, and in particular, to an identification apparatus, an identity authentication system, and an identity authentication method.
Background
The extracted biometric point information of each person is managed in a data format. Although the biometric matching system based on feature points has high accuracy, the more the number of users increases, the more time it takes to perform the process, when performing the operation of comparing the similarity degrees of the feature points.
The applicant has previously developed a technology of "dynamic matching system and method" which requires an entire DB (static DB, DB is Database) that keeps all user information, and requires an additional identification device, network transmission, and matching device in order to generate a dynamic DB. This technique essentially adopts 1: the N matching method (Identification) only adopts the technology to greatly reduce the comparison range, but is still a quite expensive technology for medium and small user management.
In the matching device, 1:1 matching method (Verification): information input → user information search → comparison → result output, which is just a comparison of the similarity of feature points. The Identification (Identification) of the user who finds the corresponding biometric point information among all users is: inputting the biometric information of the user → performing comparison operation with the biometric point information of all the users → outputting the result. The time of this comparison process varies based on the total number of users. In the field of identification technology, the speed of comparison operation has a great influence on the whole system. In the case of a DB with a small total number of users (1. However, if the number of users is expanded to a medium/large scale (1.
Since biometric authentication devices are different in type, the size of the feature point template collected by the biometric authentication device is different from a dozen KB to a dozen KB, and the biometric authentication device is associated with other information of the user and then stored together. This means that not only the biometric authentication device but also a server for user information management is added to the existing system, and an additional security device must be added to prevent network hacking and the like. By adopting a Verification (Verification) mode, important data required by the biological authentication can be delivered to a user for management, and the construction of a database is reduced to the greatest extent, so that the overall equipment cost is greatly reduced, and the personal information safety can be improved. Additional equipment still needs to be added and the use becomes complicated.
The biometric identification system in Verification mode directly stores the acquired biometric information of the user in the ID card or the mobile phone of the user, and when Verification is needed, the biometric identification system reads the user information (the user and the feature point information) from the ID card or the mobile phone of the user and compares the user information with the currently acquired biometric information of the user to acquire a result.
There are generally two ways of transmitting user information (user + feature point information) stored in an identification card, an IC card, or the like to an authentication apparatus: (1) contact: based on the ISO 7816 standard technology, data in the IC card is read by close contact. However, the card and the card reader are worn by continuous contact friction, and the durability of the card is the biggest problem. (2) non-contact type: the RF/NFC card and the related smart phone are supported based on the technology of the wireless communication technology ISO 14443 standard. The non-contact type is a widely applied technology, and the main problems are that: the data volume of the transmission is very small, and only the minimum personal identification information (card is provided with a number, an identity card number and the like) of a few byte levels is sent, so the transmission and processing speed is very high. But it has many limitations in transmitting large-capacity data such as photographs, biometric information, etc. because the basic transmission rate is slow, there is a large data loss in establishing secure communication, and stability of data communication is limited due to overlapping of a large number of RF/NFC cards and interference of surrounding electromagnetic fields such as metallic substances. In order to use this contact/non-contact card reading method, an additional card reading device must be added in addition to the addition of the biometric device.
It is also possible to use coded information carriers (bar codes, two-dimensional codes, three-dimensional codes, etc.) as a method of data transmission, which are fast to identify and not affected by the surrounding environment, and which are easy to use for the user. But there are also problems: (1) An additional encoded information carrier reading device, such as a two-dimensional code reading device, is required for reading the encoded information carrier. (2) The coded information carrier, such as a two-dimensional code, is exposed to the outside, easily causing leakage of personal information.
Disclosure of Invention
In order to solve at least one of the above technical problems, the present disclosure provides an identification device and an identity authentication system including the same.
According to an aspect of the present disclosure, an identification apparatus includes:
the camera device is used for acquiring images of a user; and
the control processing device comprises an information acquisition part, an asymmetric encryption module and a code information carrier generator, wherein the information acquisition part acquires identity characteristic information of a user, the information acquisition part also acquires biological characteristic information of the user based on an image of the user, the asymmetric encryption module encrypts the identity characteristic information and the biological characteristic information of the user by using a public key in an asymmetric key, and the code information carrier generator generates an encrypted code information carrier based on the encrypted identity characteristic information and the biological characteristic information of the user.
According to at least one embodiment of the present disclosure, the control processing apparatus further includes an information preprocessing module, the information preprocessing module determines the total data size of the encrypted user identity characteristic information and the encrypted biological characteristic information, if the total data size is greater than a data size threshold, the information preprocessing module divides the encrypted user identity characteristic information and the encrypted biological characteristic information into a plurality of data units, and the encoded information carrier generator generates corresponding sub-encrypted encoded information carriers based on each of the plurality of data units.
According to at least one embodiment of the present disclosure, the data amount of each of the plurality of data units is the same.
According to at least one embodiment of the present disclosure, each data unit further includes public key version information and data unit serial number information for identifying a total data size, the number of sub-encrypted encoded information carriers, and a serial number of a current sub-encrypted encoded information carrier.
According to at least one embodiment of the present disclosure, the control processing apparatus further includes an encoded information carrier reader and an asymmetric decryption module, the camera apparatus is further configured to collect an encrypted encoded information carrier provided by a user, the encoded information carrier reader is configured to read the encrypted encoded information carrier of the user and obtain the identity characteristic information and the biometric characteristic information of the user, which are encrypted by a public key in an asymmetric key, and the asymmetric decryption module decrypts the identity characteristic information and the biometric characteristic information of the user by using a private key in the asymmetric key.
According to at least one embodiment of the present disclosure, the control processing apparatus further includes an encoded information carrier reader and an asymmetric decryption module, the camera apparatus is further configured to collect a plurality of sub-encrypted encoded information carriers provided by the user, the encoded information carrier reader is configured to read each sub-encrypted encoded information carrier of the user and obtain the identity characteristic information and the biometric characteristic information of the user, which are encrypted by the public key in the asymmetric key, and the asymmetric decryption module decrypts the identity characteristic information and the biometric characteristic information of the user by using the private key in the asymmetric key.
According to at least one embodiment of the disclosure, the control processing device further includes an encoded information carrier reader and an asymmetric decryption module, the camera device is further configured to collect a plurality of sub-encrypted encoded information carriers provided by a user, the encoded information carrier reader is configured to read each sub-encrypted encoded information carrier of the user and obtain identity characteristic information and biometric characteristic information of the user, the identity characteristic information and the biometric characteristic information are encrypted by a public key in an asymmetric key, the encoded information carrier reader merges the sub-encrypted encoded information carriers, whether the reading of the encoded information carrier of the user is complete is judged based on data unit serial number information of each sub-encrypted encoded information carrier, and if the reading is complete, the asymmetric decryption module decrypts the identity characteristic information and the biometric characteristic information of the user by using a private key in the asymmetric key.
According to another aspect of the present disclosure, an identity authentication system includes: terminal equipment and one of the above-mentioned identification means; the identification device transmits the identity characteristic information and the biological characteristic information of the user in the form of the encrypted coded information carrier or the plurality of sub-encrypted coded information carriers to the terminal equipment; or the identification device transmits the identity characteristic information and the biological characteristic information of the user acquired by the information acquisition part and the public key in the asymmetric key to the terminal equipment.
According to at least one embodiment of the present disclosure, the terminal device displays the received encrypted encoded information carrier or the plurality of sub-encrypted encoded information carriers, and the identification means identifies the encrypted encoded information carrier or the plurality of sub-encrypted encoded information carriers displayed by the terminal device.
According to at least one embodiment of the disclosure, the terminal device receives the identity characteristic information and the biological characteristic information of the user and the public key in the asymmetric key, which are sent by the identification device, modifies the identity characteristic information of the user, encrypts the biological characteristic information of the user and the modified identity characteristic information of the user by using the public key, generates an encrypted coding information carrier based on the encrypted biological characteristic information and the encrypted identity characteristic information of the user, and displays the encrypted coding information carrier; the identification means identifies the encrypted encoded information carrier presented by the terminal device.
According to at least one embodiment of the present disclosure, the terminal device includes a receiving part configured to receive the identity characteristic information and the biometric characteristic information of the user in the form of the encrypted encoded information carrier or the plurality of sub-encrypted encoded information carriers transmitted by the identification apparatus, and a display module configured to display the received encrypted encoded information carrier or the plurality of sub-encrypted encoded information carriers.
According to at least one embodiment of the present disclosure, a terminal device includes a receiving unit, a display module, a modification module, an asymmetric encryption module, and a coded information carrier generator, where the receiving unit is configured to receive identity feature information and biometric feature information of a user and a public key in an asymmetric key, which are sent by an identification device, the modification module modifies the identity feature information of the user, the asymmetric encryption module encrypts the biometric feature information of the user and the modified identity feature information of the user using the public key, the coded information carrier generator generates a coded information carrier based on the encrypted biometric feature information and the identity feature information of the user, and the display module displays the coded information carrier generated by the coded information carrier generator.
According to at least one embodiment of the present disclosure, a camera device includes a first camera for capturing an image of a user and a second camera for capturing an encrypted encoded information carrier or a plurality of sub-encrypted encoded information carriers provided by the user.
According to at least one embodiment of the present disclosure, the control processing apparatus further includes an asymmetric key generation module that generates an asymmetric key.
According to at least one embodiment of the present disclosure, the recognition device further includes a distance sensor, the distance sensor acquires the distance of the user in real time, and when the distance of the user reaches a distance threshold, the processing unit is controlled to start the camera device.
According to at least one embodiment of the present disclosure, the recognition device further includes an illumination unit, the distance sensor acquires the distance of the user in real time, and the control processing unit starts the image pickup device and the illumination unit when the distance of the user reaches a distance threshold.
According to yet another aspect of the present disclosure, an identity authentication method includes:
acquiring coding information provided by a user and stored in a coding information carrier;
acquiring an image of a user, and acquiring biological characteristic information of the user based on the image of the user; and
and comparing the biological characteristic information of the user in the coded information with the biological characteristic information obtained based on the image of the user to generate a comparison result.
According to at least one embodiment of the present disclosure, the encoded information carrier is a bar code, a two-dimensional code, or a three-dimensional code, but the encoded information carrier may also be other forms of information storage, transmission, and/or identification carriers (e.g., optical labels).
According to at least one embodiment of the present disclosure, encoded information provided by a user and stored in an encoded information carrier is acquired using an imaging device.
According to at least one embodiment of the disclosure, after the encoded information provided by the user and stored in the encoded information carrier is obtained, the encoded information is decrypted to decrypt the biometric information of the user.
Drawings
The accompanying drawings, which are included to provide a further understanding of the disclosure and are incorporated in and constitute a part of this specification, illustrate exemplary embodiments of the disclosure and together with the description serve to explain the principles of the disclosure.
Fig. 1 is a block diagram of a structure of an identification device according to an embodiment of the present disclosure.
Fig. 2 is a block diagram of a control processing device of a recognition device according to an embodiment of the present disclosure.
Fig. 3 is a block diagram of a control processing device of a recognition device according to an embodiment of the present disclosure.
Fig. 4 is a block diagram of a structure of an identification device according to an embodiment of the present disclosure.
Fig. 5 is a block diagram of a control processing device of a recognition device according to an embodiment of the present disclosure.
Fig. 6 is an exemplary diagram of a user's identity characteristic information and biometric information segmented into three data units according to one embodiment of the present disclosure.
Fig. 7 is a block diagram of a structure of an identification device according to an embodiment of the present disclosure.
Fig. 8 is a block diagram of a control processing device of a recognition device according to an embodiment of the present disclosure.
Fig. 9 is a block diagram of a structure of an identification device according to an embodiment of the present disclosure.
Fig. 10 is a block diagram of a control processing device of a recognition device according to an embodiment of the present disclosure.
Fig. 11 is a block diagram of a control processing device of a recognition device according to an embodiment of the present disclosure.
Fig. 12 is a block diagram of a control processing device of a recognition device according to an embodiment of the present disclosure.
Fig. 13 is a block diagram of a control processing device of a recognition device according to an embodiment of the present disclosure.
Fig. 14 is a block diagram of the configuration of an identity authentication system according to an embodiment of the present disclosure.
Fig. 15 is a block diagram of a terminal device of an identity authentication system according to an embodiment of the present disclosure.
Fig. 16 is a block diagram of a terminal device of an identity authentication system according to an embodiment of the present disclosure.
Fig. 17 is a block diagram showing the structure of an identification device of an authentication system according to an embodiment of the present disclosure.
Fig. 18 is a block diagram of a structure of an identification device according to an embodiment of the present disclosure.
Fig. 19 is a block diagram of a structure of an identification device according to an embodiment of the present disclosure.
Fig. 20 is a flow diagram of an identity authentication method according to one embodiment of the present disclosure.
Fig. 21 is a flow diagram of an identity authentication method according to yet another embodiment of the present disclosure.
Detailed Description
The present disclosure will be described in further detail with reference to the drawings and embodiments. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant matter and not restrictive of the disclosure. It should be further noted that, for the convenience of description, only the portions relevant to the present disclosure are shown in the drawings.
It should be noted that the embodiments and features of the embodiments in the present disclosure may be combined with each other without conflict. Technical solutions of the present disclosure will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
Unless otherwise indicated, the illustrated exemplary embodiments/examples are to be understood as providing exemplary features of various details of some ways in which the technical concepts of the present disclosure may be practiced. Accordingly, unless otherwise indicated, features of the various embodiments may be additionally combined, separated, interchanged, and/or rearranged without departing from the technical concept of the present disclosure.
The use of cross-hatching and/or shading in the drawings is generally used to clarify the boundaries between adjacent components. As such, unless otherwise specified, the presence or absence of cross-hatching or shading does not convey or indicate any preference or requirement for a particular material, material property, size, proportion, commonality among the illustrated components and/or any other characteristic, attribute, property, etc., of a component. Further, in the drawings, the size and relative sizes of components may be exaggerated for clarity and/or descriptive purposes. While example embodiments may be practiced differently, the specific process sequence may be performed in a different order than that described. For example, two processes described consecutively may be performed substantially simultaneously or in reverse order to that described. In addition, like reference numerals denote like parts.
When an element is referred to as being "on" or "on," "connected to" or "coupled to" another element, it can be directly on, connected or coupled to the other element or intervening elements may be present. However, when an element is referred to as being "directly on," "directly connected to" or "directly coupled to" another element, there are no intervening elements present. For purposes of this disclosure, the term "connected" may refer to physically, electrically, etc., and may or may not have intermediate components.
For descriptive purposes, the present disclosure may use spatially relative terms such as "below … …", "below … …", "below … …", "below", "above … …", "above … …", "higher", and "side (e.g., as in" side wall "), to describe the relationship of one component to another (other) component as shown in the figures. Spatially relative terms are intended to encompass different orientations of the device in use, operation, and/or manufacture in addition to the orientation depicted in the figures. For example, if the device in the figures is turned over, elements described as "below" or "beneath" other elements or features would then be oriented "above" the other elements or features. Thus, the exemplary term "below … …" can encompass both an orientation of "above" and "below". Further, the devices may be otherwise positioned (e.g., rotated 90 degrees or at other orientations) and the spatially relative descriptors used herein interpreted accordingly.
The terminology used herein is for the purpose of describing particular embodiments and is not intended to be limiting. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. Furthermore, when the terms "comprises" and/or "comprising" and variations thereof are used in this specification, the stated features, integers, steps, operations, elements, components and/or groups thereof are stated to be present but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components and/or groups thereof. It is also noted that, as used herein, the terms "substantially," "about," and other similar terms are used as approximate terms and not as degree terms, and as such, are used to interpret inherent deviations in measured values, calculated values, and/or provided values that would be recognized by one of ordinary skill in the art.
According to one aspect of the present disclosure, an identification apparatus is provided. Fig. 1 is a block diagram of a configuration of a recognition device according to an embodiment of the present disclosure, and fig. 2 is a block diagram of a configuration of a control processing device of the recognition device according to the embodiment of the present disclosure. As shown in fig. 1 and 2, the recognition apparatus 100 includes: the camera device 101, the camera device 101 is used for collecting the image of the user; and a control processing device 102, the control processing device 102 includes an information obtaining part 1021, an asymmetric encryption module 1022 and a code information carrier generator 1023, the information obtaining part 1021 obtains the identity characteristic information of the user, the information obtaining part 1021 also obtains the biological characteristic information of the user based on the image of the user, the asymmetric encryption module 1022 encrypts the identity characteristic information and the biological characteristic information of the user using a public key in an asymmetric key, and the code information carrier generator 1023 generates an encrypted code information carrier based on the encrypted identity characteristic information and the biological characteristic information of the user.
It will be understood by those skilled in the art that the image pickup device 101 is capable of acquiring at least a still image or a moving image of a subject to be photographed. The image pickup device 101 may employ an image pickup device in the related art. The image of the user may be a face image of the user, a palm image of the user, a vein image, an iris image, or the like. The control processing device 102 is a device capable of running a computer program, such as a computer, a portable device having a processor, or the like. The information acquiring unit 1021 can receive user identification information input via a touch panel, a keyboard, a voice device, or the like, the user identification information including a user name, a user gender, and/or an identification number (the identification number may be an identification number, a military officer license number, or the like). The information obtaining part 1021 is preferably configured in the form of a program module.
The asymmetric encryption module 1022 encrypts the identity information and biometric information of the user using the public key in the asymmetric key. The asymmetric cryptographic module 1022 is preferably configured in the form of a program module. The asymmetric Key comprises a Public Key and a Private Key, and is a Key pair obtained through an algorithm, wherein the Public Key is a Public part of the Key pair, and the Private Key is a non-Public part. The generation of asymmetric keys is prior art, and the algorithm for generating key pairs is not particularly limited in this disclosure. The public key of the asymmetric key used by the asymmetric cryptographic module 1022 may be pre-configured in the asymmetric cryptographic module 1022. Preferably, the control processing device 102 further includes an asymmetric key generation module 1024, and more preferably, the asymmetric key generation module 1024 generates different asymmetric keys for each user (of course, the same asymmetric key may be generated for each user). Fig. 3 is a block diagram of the control processing device 102 according to the embodiment of the present disclosure. The coded information carrier generator 1023 is preferably configured in the form of a program module. The asymmetric key generation module 1024 is preferably configured in the form of a program module.
The biometric information of the user may be facial feature information, palm print feature information, or palm vein feature information.
Preferably, fig. 4 is a block diagram of a recognition device according to still another embodiment of the present disclosure. The identification device 100 further comprises a communication device 103, by means of which communication device 103 the cryptographically encoded information carrier generated by the control processing means 102 is sent to a server (not shown in fig. 4) or other identification device (not shown in fig. 4) for storage.
Preferably, as shown in fig. 5, the control processing device 102 further includes an information preprocessing module 1025, the information preprocessing module 1025 determines the total data size of the encrypted user identification feature information and biometric information, if the total data size is larger than a data size threshold, the information preprocessing module 1025 divides the encrypted user identification feature information and biometric information into a plurality of data units, and the encoded information carrier generator 1023 generates a corresponding sub-encrypted encoded information carrier based on each data unit in the plurality of data units. The information pre-processing module 1025 is preferably configured in the form of a program module.
Fig. 6 shows an example in which the user's identification feature information and biometric information are divided into three data units (i.e., data 1, data 2, and data 3), and a two-dimensional code is taken as an example of the encoded information carrier, and the encoded information carrier generator 1023 generates corresponding sub-encrypted two-dimensional codes (i.e., two-dimensional code 1, two-dimensional code 2, and two-dimensional code 3) based on each of the three data units. Generally, the data size transmitted by the two-dimensional code is about 3Kbyte, which can satisfy the transmission of the characteristic information of most biometric systems, however, in the case that the data size is greater than 3Kbyte, the data can be divided into a plurality of data units, and 3Kbyte can be used as the aforementioned data size threshold, however, in order to increase the transmission rate, the skilled person can make appropriate adjustment to the data size threshold, and the disclosure does not particularly limit the value of the data size threshold.
When data division is performed, the data is preferably divided into a plurality of data units with the same data volume, each data unit comprises a part of identity characteristic information and/or biological characteristic information, public key version information and data unit serial number information, and the data unit serial number information is used for identifying the total data volume size, the number of the sub-encrypted two-dimensional codes and the serial number of the current sub-encrypted two-dimensional code. The above-mentioned public key version information should be understood as identification information of the public key, which makes the public key distinguished from other public keys. In a preferred embodiment, the identity information and the biometric information of each user are encrypted using a version of the public key. When data division is performed, the data size of a data unit, that is, the data size of a fixed data unit, may also be set in advance, so that the data unit has a fixed data size, and a portion less than a fixed data size is used as a data unit.
Preferably, the sub-encrypted two-dimensional codes can also be implemented by two-dimensional codes of different colors, for example, the two-dimensional code 1 is green, the two-dimensional code 2 is yellow, and the two-dimensional code 3 is blue, and of course, the number of the sub-encrypted two-dimensional codes can be more.
According to still another embodiment of the present disclosure, as shown in fig. 7 and 8, the recognition device 200 includes an image pickup device 201 and a control processing device 202. The control processing device 202 comprises an encoded information carrier reader 2026 and an asymmetric decryption module 2027, the camera device 201 is used for acquiring an encrypted encoded information carrier provided by a user, the encoded information carrier reader 2026 is used for reading the encrypted encoded information carrier of the user and acquiring the identity characteristic information and the biological characteristic information of the user, which are encrypted by a public key in an asymmetric key, and the asymmetric decryption module 2027 decrypts the identity characteristic information and the biological characteristic information of the user by using a private key in the asymmetric key. The encoded information carrier reader 2026 is preferably configured in the form of program modules. Asymmetric decryption module 2027 is preferably configured in the form of a program module.
Preferably, the control processing device 200 includes an encoded information carrier reader 2026 and an asymmetric decryption module 2027, the camera 201 is configured to collect a plurality of sub-encrypted encoded information carriers provided by the user, the encoded information carrier reader 2026 is configured to read each sub-encrypted encoded information carrier of the user and obtain the identity characteristic information and the biometric characteristic information of the user, which are encrypted by the public key in the asymmetric key, and the asymmetric decryption module 2027 decrypts the identity characteristic information and the biometric characteristic information of the user by using the private key in the asymmetric key.
More preferably, the control processing device 200 includes an encoded information carrier reader 2026 and an asymmetric decryption module 2027, the camera device 201 is configured to collect multiple sub-encrypted encoded information carriers provided by the user, the encoded information carrier reader 2026 is configured to read each sub-encrypted encoded information carrier of the user and obtain the identity information and the biometric information of the user, which are encrypted by the public key in the asymmetric key, the encoded information carrier reader 2026 merges each sub-encrypted encoded information carrier, and determines whether the reading of the encoded information carrier of the user is complete based on the serial number information of the data unit of each sub-encrypted encoded information carrier, and if the reading is complete, the asymmetric decryption module 2027 decrypts the identity information and the biometric information of the user by using the private key in the asymmetric key.
According to still another embodiment of the present disclosure, as shown in fig. 9 and 10, the recognition device 300 includes an image pickup device 301 and a control processing device 302. The control processing apparatus 302 includes an information acquisition section 3021, an asymmetric encryption module 3022, an encoded information carrier generator 3023, an encoded information carrier reader 3026, and an asymmetric decryption module 3027.
Preferably, as shown in fig. 11, the control processing apparatus 302 includes an information acquisition section 3021, an asymmetric encryption module 3022, an encoded information carrier generator 3023, an asymmetric key generation module 3024, an encoded information carrier reader 3026, and an asymmetric decryption module 3027.
Preferably, as shown in fig. 12, the control processing apparatus 302 includes an information acquisition section 3021, an asymmetric encryption module 3022, an encoded information carrier generator 3023, an information preprocessing module 3025, an encoded information carrier reader 3026, and an asymmetric decryption module 3027.
Preferably, as shown in fig. 13, the control processing apparatus 302 includes an information acquisition section 3021, an asymmetric encryption module 3022, an encoded information carrier generator 3023, an asymmetric key generation module 3024, an information preprocessing module 3025, an encoded information carrier reader 3026, and an asymmetric decryption module 3027.
The camera device 301 is configured to collect an encrypted encoded information carrier provided by a user, the encoded information carrier reader 3026 is configured to read the encrypted encoded information carrier of the user and obtain the identity characteristic information and the biometric characteristic information of the user, which are encrypted by a public key in an asymmetric key, and the asymmetric decryption module 3027 decrypts the identity characteristic information and the biometric characteristic information of the user by using a private key in the asymmetric key. Encoded information carrier reader 3026 is preferably configured in the form of a program module. The asymmetric decryption module 3027 is preferably configured in the form of a program module.
Preferably, the camera device 301 is configured to collect a plurality of sub-encrypted encoded information carriers provided by a user, the encoded information carrier reader 3026 is configured to read each sub-encrypted encoded information carrier of the user and obtain the identity information and the biometric information of the user encrypted by a public key in the asymmetric key, and the asymmetric decryption module 3027 is configured to decrypt the identity information and the biometric information of the user by using a private key in the asymmetric key.
More preferably, the camera device 301 is configured to collect a plurality of sub-encrypted encoded information carriers provided by a user, the encoded information carrier reader 3026 is configured to read each sub-encrypted encoded information carrier of the user and obtain the identity characteristic information and the biometric characteristic information of the user encrypted by a public key in the asymmetric key, the encoded information carrier reader 3026 merges each sub-encrypted encoded information carrier, and determines whether the reading of the encoded information carrier of the user is complete based on the data unit serial number information of each sub-encrypted encoded information carrier, and if the reading is complete, the asymmetric decryption module 3027 decrypts the identity characteristic information and the biometric characteristic information of the user by using a private key in the asymmetric key.
According to another aspect of the present disclosure, there is provided an identity authentication system including: terminal equipment and an identification device as described above.
It should be understood by those skilled in the art that the terminal device may be a portable device such as a mobile phone or a tablet computer.
Fig. 14 is a block diagram of the configuration of an identity authentication system according to an embodiment of the present disclosure. The identity authentication system 1000 includes an identification device and a terminal device, data transmission can be performed between the identification device and the terminal device through a communication device such as a bluetooth device, the structure of the communication device belongs to the prior art, and the disclosure does not particularly limit the structure of the communication device.
The identification means transmit the user's identity information and biometric information in the form of a coded information carrier or a plurality of sub-encrypted coded information carriers to the terminal device via the communication means.
As shown in fig. 15, the terminal device includes a receiving section 1001 and a presentation module 1002, the receiving section 1001 receives the user's identification feature information and biometric feature information in the form of an encrypted encoded information carrier or a plurality of sub-encrypted encoded information carriers transmitted by the identification means, and the presentation module 1002 presents the received encrypted encoded information carrier or sub-encrypted encoded information carriers.
Preferably, the identification means transmits the identification feature information and biometric information of the user acquired by the information acquisition section and the public key in the asymmetric key to the terminal device via the communication means.
As shown in fig. 16, the terminal device includes a receiving portion 1001, a presentation module 1002, a modification module 1003, an asymmetric encryption module 1004, and an encoded information carrier generator 1005, where the receiving portion 1001 receives the identity characteristic information and the biometric characteristic information of the user and a public key in an asymmetric key, which are sent by the identification apparatus, the modification module 1003 can modify the identity characteristic information of the user, the asymmetric encryption module 1004 encrypts the biometric characteristic information of the user and the identity characteristic information of the user before modification or the identity characteristic information of the user after modification using the public key, and the modification module 1003 can modify the identity information of the user multiple times. The code information carrier generator 1005 generates an encrypted code information carrier based on the biometric information and the identification information of the user after encryption. The presentation module 1002 presents the encrypted encoded information carrier generated by the encoded information carrier generator 1005.
The identity characteristic information of the user is modified, for example, the mobile phone number of the user is modified, the address of the user is modified, and the like.
According to an embodiment of the present disclosure, the control processing device of the identification device of the identity authentication system 1000 further includes a comparison module 1006; when a user uses the terminal equipment to display the encrypted coded information carrier or the plurality of sub-encrypted coded information carriers, the identification device collects the encrypted coded information carrier or the plurality of sub-encrypted coded information carriers displayed by the terminal equipment and decrypts the identity characteristic information and the biological characteristic information of the user; the identification device also collects the image of the user to obtain the biological characteristic information of the user; the comparison module 1006 compares the biometric information of the user obtained currently with the biometric information of the user decrypted by the encrypted encoded information carrier or the plurality of sub-encrypted encoded information carriers, and provides a comparison result, where the comparison result is the same or different.
According to one embodiment of the disclosure, the camera device of the identification device comprises a first camera and a second camera, wherein the first camera is used for collecting images of a user, and the second camera is used for collecting the encrypted coded information carrier or the plurality of sub-encrypted coded information carriers provided by the user. Of course, the camera device may also have only one camera, and is used for collecting the image of the user, and collecting the encrypted encoded information carrier displayed by the terminal device or a plurality of sub-encrypted encoded information carriers.
According to one embodiment of the present disclosure, as shown in fig. 18, the recognition device further includes a distance sensor, the distance sensor acquires the distance of the user in real time, and the control processing unit starts the image pickup device when the distance of the user reaches a distance threshold.
Preferably, as shown in fig. 19, the recognition device further includes an illumination unit, the distance sensor acquires the distance of the user in real time, and the control processing unit activates the image pickup device and the illumination unit when the distance of the user reaches a distance threshold.
According to an embodiment of the present disclosure, the identity authentication is preferably performed by using one of the above-mentioned identification devices or identity authentication systems, as shown in fig. 20, including:
s11, acquiring coding information provided by a user and stored in a coding information carrier;
s12, acquiring an image of a user, and acquiring biological characteristic information of the user based on the image of the user; and
s13, comparing the biological feature information of the user in the coded information with the biological feature information obtained based on the image of the user to generate a comparison result.
Preferably, the encoded information carrier is a bar code, a two-dimensional code or a three-dimensional code.
Preferably, the encoded information provided by the user and stored in the encoded information carrier is acquired using a camera device.
Preferably, after the encoded information stored in the encoded information carrier provided by the user is acquired, the encoded information is decrypted, the biometric information of the user is decrypted, the image of the user is collected, the biometric information of the user is acquired based on the image of the user, and the decrypted biometric information of the user and the biometric information acquired based on the image of the user are compared to generate a comparison result.
Taking a two-dimensional code as an example of the encoded information carrier, one embodiment of the identity authentication method of the present disclosure performs identity authentication using one of the above-mentioned identification devices or identity authentication systems, as shown in fig. 21, and includes the following steps:
s21, collecting the two-dimensional code displayed by the user;
s22, identifying a two-dimensional code displayed by a user;
s23, if a plurality of sub-encrypted two-dimensional codes are identified, combining the plurality of sub-encrypted two-dimensional codes, and performing the step S24; if the plurality of sub-encrypted two-dimensional codes are not identified, directly performing step S24;
s24, decrypting the identified two-dimensional codes or the combined two-dimensional codes by using a private key in the asymmetric key to decrypt the identity characteristic information and the biological characteristic information of the user;
s25, acquiring an image of the user, and acquiring the current biological feature information of the user based on the image of the user;
and S26, comparing the biological characteristic information of the user decrypted in the step S24 with the current biological characteristic information of the user acquired in the step S25 to generate a comparison result.
Preferably, in step S23, if a plurality of sub-encrypted two-dimensional codes are identified, the plurality of sub-encrypted two-dimensional codes are merged, whether the obtained plurality of sub-encrypted two-dimensional codes are complete is determined, if so, step S24 is performed, and if not, the two-dimensional codes displayed by the user are continuously collected.
The identification device and the identity authentication system greatly reduce the system construction cost, increase the safety level of user information and improve the usability of products under the condition of not adding extra information management servers and security equipment. The encrypted encoded information carrier used in the present disclosure is used as a way of user information transmission without adding an additional encoded information carrier code reading device.
In the description herein, reference to the description of the terms "one embodiment/mode," "some embodiments/modes," "example," "specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment/mode or example is included in at least one embodiment/mode or example of the application. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment/mode or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments/modes or examples. Furthermore, the various embodiments/aspects or examples and features of the various embodiments/aspects or examples described in this specification can be combined and combined by one skilled in the art without conflicting therewith.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one of the feature. In the description of the present application, "plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
It will be understood by those skilled in the art that the foregoing embodiments are merely for clarity of illustration of the disclosure and are not intended to limit the scope of the disclosure. Other variations or modifications may occur to those skilled in the art, based on the foregoing disclosure, and are still within the scope of the present disclosure.

Claims (6)

1. An identification device, comprising:
the camera device is used for acquiring an image of a user; and
the control processing device comprises an information acquisition part, an asymmetric encryption module and a code information carrier generator, wherein the information acquisition part acquires identity characteristic information of a user, the information acquisition part also acquires biological characteristic information of the user based on an image of the user, the asymmetric encryption module encrypts the identity characteristic information and the biological characteristic information of the user by using a public key in an asymmetric key, and the code information carrier generator generates an encrypted code information carrier based on the encrypted identity characteristic information and the encrypted biological characteristic information of the user;
the control processing device further comprises an information preprocessing module, the information preprocessing module judges the total data volume of the encrypted identity characteristic information and the encrypted biological characteristic information of the user, if the total data volume is larger than a data volume threshold value, the information preprocessing module divides the encrypted identity characteristic information and the encrypted biological characteristic information of the user into a plurality of data units, and the encoded information carrier generator generates corresponding sub-encrypted encoded information carriers based on each data unit in the plurality of data units;
each data unit comprises public key version information and data unit serial number information, and the data unit serial number information is used for identifying the total data size, the number of sub-encryption coding information carriers and the serial number of the current sub-encryption coding information carrier;
the control processing device also comprises an encoding information carrier reader and an asymmetric decryption module, the camera device is also used for collecting a plurality of sub-encryption encoding information carriers provided by a user, the encoding information carrier reader is used for reading each sub-encryption encoding information carrier of the user and acquiring the identity characteristic information and the biological characteristic information of the user, which are encrypted by a public key in an asymmetric key, the encoding information carrier reader combines each sub-encryption encoding information carrier and judges whether the reading of the encoding information carrier of the user is complete, and if the reading is complete, the asymmetric decryption module decrypts the identity characteristic information and the biological characteristic information of the user by using a private key in the asymmetric key;
when data division is performed, the data size of a data unit is preset, so that the data unit has a fixed data size, and a part which is less than a fixed data size is used as a data unit.
2. The identification device according to claim 1, wherein the control processing device further comprises an encoded information carrier reader and an asymmetric decryption module, the camera device is further configured to collect an encrypted encoded information carrier provided by the user, the encoded information carrier reader is configured to read the encrypted encoded information carrier of the user and obtain the identity information and the biometric information of the user, which are encrypted by a public key in the asymmetric key, and the asymmetric decryption module decrypts the identity information and the biometric information of the user by using a private key in the asymmetric key.
3. The identification device according to claim 1, wherein the control processing device further comprises an encoded information carrier reader and an asymmetric decryption module, the camera device is further configured to collect a plurality of sub-encrypted encoded information carriers provided by the user, the encoded information carrier reader is configured to read each sub-encrypted encoded information carrier of the user and obtain the identity characteristic information and the biometric characteristic information of the user, which are encrypted by a public key in the asymmetric key, and the asymmetric decryption module decrypts the identity characteristic information and the biometric characteristic information of the user by using a private key in the asymmetric key.
4. An identity authentication system, comprising: a terminal device and the identification apparatus of any one of claims 1 to 3;
the identification device transmits the identity characteristic information and the biological characteristic information of the user in the form of the encrypted coded information carrier or the plurality of sub-encrypted coded information carriers to the terminal equipment; or
The identification device transmits the identity characteristic information and the biological characteristic information of the user acquired by the information acquisition part and the public key in the asymmetric key to the terminal equipment.
5. The identity authentication system according to claim 4, wherein the terminal device displays the received encrypted encoded information carrier or the plurality of sub-encrypted encoded information carriers, and the identification means identifies the encrypted encoded information carrier or the plurality of sub-encrypted encoded information carriers displayed by the terminal device.
6. The identity authentication system according to claim 4, wherein the terminal device receives the identity characteristic information and the biometric characteristic information of the user and the public key in the asymmetric key, which are sent by the identification device, modifies the identity characteristic information of the user, encrypts the biometric characteristic information of the user and the modified identity characteristic information of the user by using the public key, generates an encrypted encoded information carrier based on the encrypted biometric characteristic information and the identity characteristic information of the user, and displays the encrypted encoded information carrier; and the identification device identifies the encrypted coding information carrier displayed by the terminal equipment.
CN201910828406.1A 2019-09-03 2019-09-03 Identification device and identity authentication system Active CN110752914B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910828406.1A CN110752914B (en) 2019-09-03 2019-09-03 Identification device and identity authentication system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910828406.1A CN110752914B (en) 2019-09-03 2019-09-03 Identification device and identity authentication system

Publications (2)

Publication Number Publication Date
CN110752914A CN110752914A (en) 2020-02-04
CN110752914B true CN110752914B (en) 2023-04-18

Family

ID=69276093

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910828406.1A Active CN110752914B (en) 2019-09-03 2019-09-03 Identification device and identity authentication system

Country Status (1)

Country Link
CN (1) CN110752914B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220417744A1 (en) * 2021-06-23 2022-12-29 Capital One Services, Llc User authentication

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1598862A (en) * 2004-09-16 2005-03-23 四川华旗数据软件有限责任公司 Encipher / decipher method for identity information and recognition system
CN104021482A (en) * 2013-03-01 2014-09-03 成都市易恒信科技有限公司 Certificate false-proof verification method base on identification authentication technology
CN104715537A (en) * 2015-04-03 2015-06-17 成都爱维科创科技有限公司 Encryption and decryption method based on digital tags
CN108985409A (en) * 2018-07-18 2018-12-11 金联汇通信息技术有限公司 ID card information read method, device and electronic equipment

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150058633A1 (en) * 2013-04-27 2015-02-26 Li Liu Self-authenticated tag generation method and interpretation method used in the self-authenticated key system
CN107332659B (en) * 2017-05-24 2020-01-07 武汉真元生物数据有限公司 Identity authentication method, storage medium and system based on biological characteristics

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1598862A (en) * 2004-09-16 2005-03-23 四川华旗数据软件有限责任公司 Encipher / decipher method for identity information and recognition system
CN104021482A (en) * 2013-03-01 2014-09-03 成都市易恒信科技有限公司 Certificate false-proof verification method base on identification authentication technology
CN104715537A (en) * 2015-04-03 2015-06-17 成都爱维科创科技有限公司 Encryption and decryption method based on digital tags
CN108985409A (en) * 2018-07-18 2018-12-11 金联汇通信息技术有限公司 ID card information read method, device and electronic equipment

Also Published As

Publication number Publication date
CN110752914A (en) 2020-02-04

Similar Documents

Publication Publication Date Title
JP7142778B2 (en) Identity verification method and its apparatus, computer program and computer equipment
US10681025B2 (en) Systems and methods for securely managing biometric data
US10255040B2 (en) System and method for biometric identification
US20090293119A1 (en) User authentication method and system and password management system
WO2009004498A9 (en) Content delivery system
CN111275122B (en) Label labeling method, device, equipment and readable storage medium
EP1520369A1 (en) Biometric authentication system
KR101675728B1 (en) Method and apparatus for processing user authentification using information processing device
CN111095246B (en) Method and electronic device for authenticating user
CN115336223A (en) Optimized private biometric matching
CN107370601B (en) Intelligent terminal, system and method integrating multiple security authentications
CN111815833A (en) Hotel access control authentication system based on intelligent identification and encryption technology
JP2011165102A (en) Biometrics authentication system and portable terminal
CN110752914B (en) Identification device and identity authentication system
CN113766085B (en) Image processing method and related device
US20190089539A1 (en) Adaptive device for biometric authentication using ultrasound, infrared and contrast visible light photographs, without disclosure, via a decentralised computer network
US20150110361A1 (en) System and method for collection and validation of nutritional data
CN114581091A (en) Identity authentication method and device, computer equipment and storage medium
CN112910837B (en) Identity authentication method and system based on communication network and readable storage medium thereof
KR20220051510A (en) Device, method and computer program for protecting image including personal information
JP5301365B2 (en) Authentication card, card authentication terminal, card authentication server, and card authentication system
CN104732137A (en) Android-based method of recognizing multi-mode AES-encrypted (advanced encryption standard encrypted) QR (quick response) codes
US20190230506A1 (en) Digital identity verification system
KR20170133012A (en) Method for transmitting feature data, user authentication method and system using feature data
CN117240565A (en) Data encryption method, data decryption method, device and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant