CN110808966A - Identity information generation method and device and storage medium - Google Patents

Identity information generation method and device and storage medium Download PDF

Info

Publication number
CN110808966A
CN110808966A CN201911013048.5A CN201911013048A CN110808966A CN 110808966 A CN110808966 A CN 110808966A CN 201911013048 A CN201911013048 A CN 201911013048A CN 110808966 A CN110808966 A CN 110808966A
Authority
CN
China
Prior art keywords
information
identity
identity information
network equipment
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911013048.5A
Other languages
Chinese (zh)
Inventor
叶霆
庞志斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin Hualai Technology Co Ltd
Original Assignee
Tianjin Hualai Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin Hualai Technology Co Ltd filed Critical Tianjin Hualai Technology Co Ltd
Priority to CN201911013048.5A priority Critical patent/CN110808966A/en
Publication of CN110808966A publication Critical patent/CN110808966A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides an identity information generation method, an identity information generation device and a storage medium, wherein the method comprises the following steps: the method comprises the steps that first network equipment obtains first information, wherein the first information comprises user identity characteristic information; the first network equipment acquires second information, and the second information is used for obfuscating encryption; the first network equipment combines the first information with the second information to generate first identity information; the first network device uses the first identity information for data encryption and/or authentication. The identity information is generated through the steps, so that the user can use the identity characteristic information of the user to encrypt and/or verify the identity of the user, the identity characteristic information cannot be leaked, and the safety of the data and the communication process is improved.

Description

Identity information generation method and device and storage medium
Technical Field
The present invention relates to the field of device encryption technologies, and in particular, to an identity information generating method, an identity information generating device, and a readable storage medium.
Background
In recent years, with the development of science and technology, internet of things equipment is widely applied to meet various requirements of people. But also brings more security problems, such as privacy disclosure, camera leakage, intrusion of security systems, and the like. With the increasing importance of people on personal privacy and security, encryption processing on internet of things equipment is very necessary. In a general network device encryption method, a password is generated according to a fingerprint or a personal password generator and is used as an encryption password to encrypt a network device, but once communication is intercepted or a server providing services for the network device is attacked, important identity information such as a personal fingerprint is leaked, and serious potential safety hazard is brought.
It is therefore desirable to provide a method for generating identity information.
Disclosure of Invention
In view of this, embodiments of the present invention provide an identity information generating method, an identity information generating apparatus, and a readable storage medium, which can implement generation of identity information.
One aspect of the present invention provides an identity information generating method, including: the method comprises the steps that first network equipment obtains first information, wherein the first information comprises user identity characteristic information; the first network equipment acquires second information, and the second information is used for obfuscating encryption; the first network equipment combines the first information with the second information to generate first identity information; the first network device uses the first identity information for data encryption and/or authentication.
In an embodiment of the present invention, a first network device using first identity information for data encryption and/or authentication includes: the first network equipment receives second identity information, and the second identity information is generated and sent by the second network equipment; the first network equipment compares the second identity information with the first identity information; and if the first identity information is the same as the second identity information, the first network equipment successfully authenticates the second network equipment.
One embodiment of the present invention further comprises: the first network equipment receives a second secret key, wherein the second secret key is used for decrypting information encrypted by the first secret key, and the second identity information is encrypted through the first secret key; the first network device decrypts the second identity information using the second key.
In an embodiment of the present invention, the data encryption and/or authentication performed by the first network device using the first identity information includes: the first network device generates a third key according to the first identity information, and the third key is used for encrypting data of the first network device.
In one embodiment of the present invention, the combining, by the first network device, the first information with the second information includes: the first network device splices the first information with the second information.
In one embodiment of the invention, the second information is sent by a server.
In one embodiment of the present invention, a first network device includes: personal mobile devices and/or network camera devices.
In one embodiment of the present invention, the user identity information includes: user biometric information and/or hardware feature information.
Still another aspect of the present invention provides an identity information generating apparatus, including: the acquisition module is used for acquiring first information, and the first information comprises user identity characteristic information; the acquisition module is further used for acquiring second information, and the second information is used for obfuscating encryption; the generating module is used for combining the first information with the second information to generate first identity information; and the application module is used for carrying out data encryption and/or identity authentication by using the first identity information.
In one embodiment of the present invention, the method further comprises: the receiving module is used for receiving second identity information, and the second identity information is generated and sent by second network equipment; the application module is also used for comparing the second identity information with the first identity information; and if the first identity information is the same as the second identity information, the identity verification of the second network equipment is successful.
In one embodiment of the invention, the method comprises the following steps: the receiving module is further configured to receive a second key, where the second key is used to decrypt information encrypted by the first key, and the second identity information is encrypted by the first key; the application module is further configured to decrypt the second identity information using the second key.
In one embodiment of the invention, the apparatus further comprises: and the application module generates a third key according to the first identity information and encrypts the data by using the third key.
In one embodiment of the present invention, the generating module combining the first information and the second information includes: the generation module splices the first information and the second information.
In one embodiment of the invention, the second information is sent by a server.
In one embodiment of the present invention, the user identity information includes: user biometric information and/or hardware feature information.
Yet another aspect of the present invention provides a computer-readable storage medium having computer-executable instructions stored thereon, wherein the executable instructions, when executed by a processor, implement the method as above.
Yet another aspect of the invention provides a computer apparatus comprising: the system comprises a memory, a processor and executable instructions stored in the memory and executable in the processor, wherein the processor implements the method when executing the executable instructions.
According to the technical scheme provided by the embodiment of the invention, first information is obtained through first network equipment, and the first information comprises user identity characteristic information; the first network equipment acquires second information, and the second information is used for obfuscating encryption; the first network equipment combines the first information with the second information to generate first identity information; the first network equipment uses the first identity information to carry out data encryption and/or identity authentication, and the generation of the identity information is realized through the steps, so that the user can use the identity characteristic information of the user to carry out data encryption and/or identity authentication, the identity characteristic information cannot be leaked, and the safety of data and a communication process is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
Fig. 1 is a flowchart illustrating an identity information generation method according to an exemplary embodiment of the present invention.
Fig. 2 is a flowchart illustrating an identity information generating method and performing identity verification on a second network device according to another exemplary embodiment of the present invention.
Fig. 3 is a flowchart illustrating an identity information generation method according to another exemplary embodiment of the present invention.
Fig. 4 is a block diagram illustrating an identity information generating apparatus according to an exemplary embodiment of the present invention.
Fig. 5 is a block diagram illustrating a computer device for identity information generation according to an exemplary embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a schematic flow chart of an identity information generating method according to an embodiment of the present invention, including:
110: the first network equipment acquires first information, wherein the first information comprises user identity characteristic information.
The first information is identification information containing user characteristics including biological characteristics such as fingerprint, iris and voiceprint, and the first information includes data obtained by electronizing the biological characteristics. The user characteristics also include hardware characteristics corresponding to the user, such as a serial number of the user's handset and/or a string of random numbers generated by a device belonging to the user. The input of the user identity characteristic information can use special input equipment, such as fingerprint input equipment and iris input equipment, or a keyboard can be arranged on the first network equipment so that a user can input numbers and/or characters, or the special input equipment can be integrated on the first network equipment for inputting user information such as fingerprints and irises, and the invention does not limit the input equipment of the user information.
120: the first network device obtains second information, the second information being used for obfuscating the encryption.
The second message may be a random string of characters sent by the server, or a string of characters preset by the user and/or manufacturer.
130: the first network device combines the first information with the second information to generate first identity information.
The combination of the first information and the second information includes, but is not limited to, directly combining the first information and the second information, or confusing and combining the first information and the second information according to a certain algorithm. For example, in the embodiment of the present invention, the first information is a string of 128-bit strings, the second information is another string of 56-bit strings, and the two strings are directly combined to generate a 184-bit string as the first identity information, i.e., the first 128 bits of the first identity information are the first information, and the second 56 bits of the first identity information are the second information. In another embodiment of the present invention, the first message is a 100-bit number string, and the second message is another 100-bit number string, which are combined into the identity information by the following algorithm: all the digits of the first information correspond to odd digits as identity information in sequence, and all the digits of the second information correspond to even digits as the first identity information in sequence, so that a 200-digit string is generated as the first identity information.
The first identity information generated by confusion not only maintains the one-to-one correspondence relationship between the first information and the user, but also cannot directly obtain the characteristic information of the user from the first identity information.
140: the first network device uses the first identity information for data encryption and/or authentication.
When the first network device encrypts data using the first identity information, the first identity information may be used as a password to encrypt the data, or a key may be generated according to the first identity information to encrypt the data, for example, in an embodiment of the present invention, the first identity information is a 32-byte numeric string. When the first network device needs to encrypt the data, the data is encrypted by using the number string as a key of Advanced Encryption Standard (AES).
When the first network device performs authentication using the first identity information, the authentication information sent by the other device may be compared with the first identity information, and if the two are the same, the authentication of the first network device with respect to the other device is successful.
The identity information is generated through the steps, so that the user can use the identity characteristic information of the user to encrypt and/or verify the identity of the user, the identity characteristic information cannot be leaked, and the safety of the data and the communication process is improved.
According to the embodiment of the invention, the combination method of the first information and the second information includes splicing combination, so that the first network device obtains the first identity information by using less computing resources.
According to the embodiment of the invention, the first information comprises the user biological characteristic information and/or the hardware characteristic information, so that the user can conveniently input the first information.
According to the embodiment of the invention, the first equipment comprises the personal mobile equipment and/or the network camera equipment, so that data on the network camera equipment and/or the personal mobile equipment is safer.
According to the embodiment of the invention, the second information is sent by the server, so that the second information can be used as a dynamic password, and the security of the user equipment and the data is further improved.
In an embodiment of the present invention, a first network device using first identity information for data encryption and/or authentication includes: the first network equipment receives second identity information, and the second identity information is generated and sent by the second network equipment; the first network equipment compares the second identity information with the first identity information; and if the first identity information is the same as the second identity information, the first network equipment successfully authenticates the second network equipment.
By comparing the first identity information, the first network equipment can confirm whether the second network equipment is used by the same user, and the communication safety between the first network equipment and the second network equipment is ensured.
For example, in the embodiment of the present invention, the identity information in the second network device is composed of a digital string sent by the server after the fingerprint of the user is digitized. The first network device sends the generated identity information to the second network device for identity confirmation, if the identity information in the first network device is the same as the identity information of the second network device, which means that the user of the first network device is the same as the user of the second network device, the second network device successfully authenticates the identity of the first network device, and can perform the next communication.
One embodiment of the present invention further comprises: the first network equipment receives a second secret key, wherein the second secret key is used for decrypting information encrypted by the first secret key, and the second identity information is encrypted through the first secret key; the first network device decrypts the second identity information using the second key.
Since the identity information includes the characteristic information of the user, the first network device encrypts the identity information in order to prevent the identity information from being acquired by other network devices. For example, in the embodiment of the present invention, the server generates a pair of keys capable of performing asymmetric encryption, the server sends one of the keys to the first network device, and the first network device receives the key and encrypts the identity information using the key. The server sends another key to the device to be decrypted for decrypting the identity information. In another embodiment of the present invention, the server sends a string of characters to the first network device, and the first network device symmetrically encrypts the identity information and uses the characters sent by the server as an encrypted password. And the server sends the same character string to the equipment needing to decrypt the identity information, and the equipment is used for decrypting the information encrypted by the first network equipment.
In an embodiment of the present invention, the data encryption and/or authentication performed by the first network device using the first identity information includes: the first network device generates a third key according to the first identity information, and the third key is used for encrypting data of the first network device.
The identity information contains unique characteristic information of the user, and the user can encrypt the storage data and/or the communication data by using the identity information, so that the encrypted information can be decrypted only by the user himself. For example, in the embodiment of the present invention, the user uses the identity information itself as a key in the AES encryption algorithm to symmetrically encrypt the information stored on the first network device. In another embodiment of the present invention, the first network device extracts feature information of the identity information using a hash algorithm, and encrypts the data of the user using the feature information as a key.
Fig. 2 is a schematic flow chart of an identity information generating method and a process of performing identity verification on a second network device according to another embodiment of the present invention, where the method includes:
step 210: the second network device obtains the first information. The second network device is a mobile phone of a user, and the first information is electronic data of a fingerprint of the user.
Step 220: the second network device obtains the second information. Wherein the second information is a numeric string sent by the server.
Step 230: the second network device combines the first information with the second information. The combination mode is that the first information and the second information are spliced to generate the identity information.
Step 240: the second network device receives key a, which is a pair of asymmetric encryption keys generated by the server.
Step 250: the second network device asymmetrically encrypts the identity information using key a.
Step 260: and the second network equipment sends the encrypted identity information to the first network equipment, wherein the first network equipment is a network camera.
Step 270: and the network camera acquires second information. The second information is a numeric string sent by the server and is the same as the second information received by the mobile phone.
Step 280: the network camera acquires first information. The first information is the electronic data of the user fingerprint and is the same as the first information received by the mobile phone.
Step 290: the network camera combines the first information with the second information. The combination mode is that the first information and the second information are spliced to generate the identity information, and is the same as the combination mode adopted by the mobile phone.
Step 2100: the network camera receives the key B.
Step 2110: and the network camera receives the encrypted identity information sent by the mobile phone.
Step 2120: and the network camera decrypts the encrypted identity information by using the key B.
Step 2130: the network camera compares the decrypted identity information with the identity information generated by the network camera, and if the decrypted identity information is consistent with the identity information generated by the network camera, the identity authentication of the network camera is successful.
Before performing step 210, the user first needs to send an authentication request or the like to the webcam in order to start authentication. The identity authentication process provided by the embodiment of the invention can be a single process or a sub-process in other processes. The embodiment of the present invention is not limited thereto.
The identity information is generated through the steps, so that the user can use the fingerprint of the user to carry out identity verification, the fingerprint cannot be leaked, and the safety of data and a communication process is improved.
Fig. 3 is a schematic flow chart of an identity information generating method according to another embodiment of the present invention, including:
310: the first network device enters the iris of the user.
320: the first network device electronizes the user iris information as first information.
330: and the first network equipment receives the second information sent by the server.
340: the first network device concatenates the first information and the second information to generate first identity information, extracts a Digest of the first identity information through a Message-Digest Algorithm 5 (MD 5), and uses the Digest as a third key.
350: the first network device encrypts the data using the third key.
The identity information is generated through the steps, so that the iris information cannot be leaked when the user can use the iris to encrypt data, and the safety of the data and the communication process is improved.
The following are embodiments of the apparatus of the present invention that may be used to perform embodiments of the method of the present invention. For details which are not disclosed in the embodiments of the apparatus of the present invention, reference is made to the embodiments of the method of the present invention.
Fig. 4 is a block diagram illustrating an identity information generating apparatus 400 according to an embodiment of the present invention. As shown in fig. 4, the apparatus 400 includes:
an obtaining module 410, configured to obtain first information, where the first information includes user identity feature information; the acquisition module is further used for acquiring second information, and the second information is used for obfuscating encryption;
a generating module 420, configured to combine the first information with the second information to generate first identity information;
the application module 430 is configured to perform data encryption and/or authentication using the first identity information.
The identity information is generated through the steps, so that the user can use the identity characteristic information of the user to encrypt and/or verify the identity of the user, the identity characteristic information cannot be leaked, and the safety of the data and the communication process is improved.
In another embodiment of the present invention, the apparatus further includes a receiving module 440, configured to receive second identity information, where the second identity information is generated and sent by a second network device; the application module 430 is further configured to compare the second identity information with the first identity information; and if the first identity information is the same as the second identity information, the identity verification of the second network equipment is successful.
In another embodiment of the present invention, the receiving module 440 is further configured to receive a second key, where the second key is used to decrypt information encrypted by the first key, and the second identity information is encrypted by the first key; the application module 430 is further configured to decrypt the second identity information using the second key.
In another embodiment of the present invention, the application module 430 is further configured to generate a third key according to the first identity information, and encrypt the data using the third key.
In another embodiment of the present invention, the generating module 420 is further configured to splice the first information and the second information.
In another embodiment of the invention, the second information is sent by a server.
In another embodiment of the present invention, the user identity information comprises: user biometric information and/or hardware feature information.
Fig. 5 is a block diagram illustrating a computer device 500 for identity information generation according to an exemplary embodiment of the present invention.
Referring to fig. 5, computer device 500 includes a processing component 510 that further includes one or more processors and memory resources, represented by memory 520, for storing instructions, such as application programs, that are executable by processing component 510. The application programs stored in memory 520 may include one or more modules that each correspond to a set of instructions. Further, the processing component 510 is configured to execute the instructions to perform the above-described method of identity information generation for a network device.
The computer device 500 may also include a power supply component configured to perform power management of the computer device 500, a wired or wireless network interface configured to connect the computer device 500 to a network, and an input output (I/O) interface. The computer device 500 may operate based on an operating system, such as a Windows Server, stored in the memory 520TM,Mac OS XTM,UnixTM,LinuxTM,FreeBSDTMOr the like.
A non-transitory computer-readable storage medium, wherein instructions of the storage medium, when executed by a processor of the computer device 500, enable the computer device 500 to perform an identity information generation method, comprising: the method comprises the steps that first network equipment obtains first information, wherein the first information comprises user identity characteristic information; the first network equipment acquires second information, and the second information is used for obfuscating encryption; the first network equipment combines the first information with the second information to generate first identity information; the first network device uses the first identity information for data encryption and/or authentication.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It will be understood that the invention is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (10)

1. An identity information generation method, comprising:
the method comprises the steps that first network equipment obtains first information, wherein the first information comprises user identity characteristic information;
the first network equipment acquires second information, and the second information is used for obfuscating encryption;
the first network equipment combines the first information with the second information to generate first identity information;
and the first network equipment uses the first identity information to carry out data encryption and/or identity authentication.
2. The method of claim 1, wherein the first network device uses the first identity information for data encryption and/or authentication, comprising:
the first network equipment receives second identity information, and the second identity information is generated and sent by second network equipment;
the first network equipment compares the second identity information with the first identity information;
and if the first identity information is the same as the second identity information, the identity verification of the second network equipment is successful.
3. The method of claim 2, further comprising:
the first network equipment receives a second secret key, wherein the second secret key is used for decrypting information encrypted by the first secret key, and the second identity information is encrypted through the first secret key;
the first network device decrypts the second identity information using a second key.
4. The method of claim 1, wherein the first network device uses the first identity information for data encryption and/or authentication, comprising:
and the first network equipment generates a third key according to the first identity information, wherein the third key is used for encrypting data of the first network equipment.
5. The method of claim 1, wherein the first network device combining the first information with the second information comprises:
and the first network equipment splices the first information and the second information.
6. The method of claim 1, wherein the second information is sent by a server.
7. The method of claim 1, wherein the first network device comprises:
personal mobile devices and/or network camera devices.
8. The method of claim 1, wherein the user identity information comprises:
user biometric information and/or hardware feature information.
9. An identity information generation apparatus, comprising:
the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring first information, and the first information comprises user identity characteristic information;
the obtaining module is further configured to obtain second information, where the second information is used for obfuscating encryption;
the generating module is used for combining the first information with the second information to generate first identity information;
and the application module is used for carrying out data encryption and/or identity authentication by using the first identity information.
10. A storage medium having stored thereon computer-executable instructions, which when executed by a processor implement the method of any one of claims 1 to 8.
CN201911013048.5A 2019-10-23 2019-10-23 Identity information generation method and device and storage medium Pending CN110808966A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911013048.5A CN110808966A (en) 2019-10-23 2019-10-23 Identity information generation method and device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911013048.5A CN110808966A (en) 2019-10-23 2019-10-23 Identity information generation method and device and storage medium

Publications (1)

Publication Number Publication Date
CN110808966A true CN110808966A (en) 2020-02-18

Family

ID=69488996

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911013048.5A Pending CN110808966A (en) 2019-10-23 2019-10-23 Identity information generation method and device and storage medium

Country Status (1)

Country Link
CN (1) CN110808966A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111740954A (en) * 2020-05-18 2020-10-02 北京索德电气工业有限公司 Elevator main controller and elevator board card communication encryption method
CN114244518A (en) * 2021-11-16 2022-03-25 广东电网有限责任公司 Digital signature confusion encryption method and device, computer equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080131425A1 (en) * 2006-09-19 2008-06-05 Georgia Tech Research Corporation Biomolecular coating for implants
CN106533697A (en) * 2016-12-06 2017-03-22 上海交通大学 Random number generating and extracting method and application thereof to identity authentication
CN107733852A (en) * 2017-08-24 2018-02-23 北京三快在线科技有限公司 A kind of auth method and device, electronic equipment
CN108446638A (en) * 2018-03-21 2018-08-24 广东欧珀移动通信有限公司 Auth method, device, storage medium and electronic equipment
CN108920928A (en) * 2018-09-14 2018-11-30 算丰科技(北京)有限公司 Personal identification method, device, electronic equipment and computer readable storage medium
CN109005144A (en) * 2018-05-31 2018-12-14 杭州闪易科技有限公司 A kind of identity identifying method, equipment, medium and system
CN110084017A (en) * 2019-04-24 2019-08-02 上海互啊佑智能科技有限公司 A kind of ID authentication device, system, method, apparatus and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080131425A1 (en) * 2006-09-19 2008-06-05 Georgia Tech Research Corporation Biomolecular coating for implants
CN106533697A (en) * 2016-12-06 2017-03-22 上海交通大学 Random number generating and extracting method and application thereof to identity authentication
CN107733852A (en) * 2017-08-24 2018-02-23 北京三快在线科技有限公司 A kind of auth method and device, electronic equipment
CN108446638A (en) * 2018-03-21 2018-08-24 广东欧珀移动通信有限公司 Auth method, device, storage medium and electronic equipment
CN109005144A (en) * 2018-05-31 2018-12-14 杭州闪易科技有限公司 A kind of identity identifying method, equipment, medium and system
CN108920928A (en) * 2018-09-14 2018-11-30 算丰科技(北京)有限公司 Personal identification method, device, electronic equipment and computer readable storage medium
CN110084017A (en) * 2019-04-24 2019-08-02 上海互啊佑智能科技有限公司 A kind of ID authentication device, system, method, apparatus and storage medium

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111740954A (en) * 2020-05-18 2020-10-02 北京索德电气工业有限公司 Elevator main controller and elevator board card communication encryption method
CN111740954B (en) * 2020-05-18 2021-05-11 北京索德电气工业有限公司 Elevator main controller and elevator board card communication encryption method
CN114244518A (en) * 2021-11-16 2022-03-25 广东电网有限责任公司 Digital signature confusion encryption method and device, computer equipment and storage medium
CN114244518B (en) * 2021-11-16 2023-10-03 广东电网有限责任公司 Digital signature confusion encryption method, device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
US10681025B2 (en) Systems and methods for securely managing biometric data
CN103124269B (en) Based on the Bidirectional identity authentication method of dynamic password and biological characteristic under cloud environment
JP2019512961A (en) Method and system for user authentication with improved security
JP2017175244A (en) 1:n biometric authentication, encryption, and signature system
CN112637131A (en) User identity authentication method, device, equipment and storage medium
CN107733933B (en) Method and system for double-factor identity authentication based on biological recognition technology
CN111447214A (en) Method for centralized service of public key and password based on fingerprint identification
CN108509787B (en) Program authentication method
CN111401901B (en) Authentication method and device of biological payment device, computer device and storage medium
CN111526007B (en) Random number generation method and system
CN111541713A (en) Identity authentication method and device based on block chain and user signature
US20180225467A1 (en) Method and system for data protection
US20190311100A1 (en) System and methods for securing security processes with biometric data
CN114117386A (en) Conference management method and device, computer readable storage medium and electronic device
CN110808966A (en) Identity information generation method and device and storage medium
JP6151627B2 (en) Biometric authentication system, biometric authentication method, and computer program
Chakraborty et al. Generation and verification of digital signature with two factor authentication
CN114282254A (en) Encryption and decryption method and device, and electronic equipment
CN109586921B (en) Method and system for realizing dynamic password
CN112788046A (en) Method and system for encrypting transmission information
CN111541708A (en) Identity authentication method based on power distribution
CN117896079B (en) Efficient authentication method based on PUF and revocable biological characteristics
KR101298216B1 (en) Authentication system and method using multiple category
CN112287316B (en) Biological authentication method and system based on elliptic curve and removable biological characteristics
WO2020130297A1 (en) Method for storing and recovering confidential information in server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 8 / F, Huaqiao Chuangye building, No. 10, Jinping Road, Ya'an Road, Nankai District, Tianjin (Science and Technology Park)

Applicant after: Tianjin Hualai Technology Co.,Ltd.

Address before: 9 / F, Huaqiao Chuangye building, 10 Jinping Road, Nankai District, Tianjin

Applicant before: TIANJIN HUALAI TECHNOLOGY Co.,Ltd.

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20200218

RJ01 Rejection of invention patent application after publication