CN111104661A - Distributed biometric verification - Google Patents

Distributed biometric verification Download PDF

Info

Publication number
CN111104661A
CN111104661A CN201911395214.2A CN201911395214A CN111104661A CN 111104661 A CN111104661 A CN 111104661A CN 201911395214 A CN201911395214 A CN 201911395214A CN 111104661 A CN111104661 A CN 111104661A
Authority
CN
China
Prior art keywords
comparison result
result data
data string
biological characteristics
comparison
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911395214.2A
Other languages
Chinese (zh)
Inventor
黄策
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201911395214.2A priority Critical patent/CN111104661A/en
Publication of CN111104661A publication Critical patent/CN111104661A/en
Priority to PCT/CN2020/133511 priority patent/WO2021135799A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Bioethics (AREA)
  • Multimedia (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Human Computer Interaction (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention provides a brand-new authentication method taking biological characteristics as an authentication target. The authentication method is characterized in that target biological characteristics used for authentication are stored at a terminal side, and a result data string of the biological characteristic authentication is stored at a server side. The authentication process is that the terminal collects the biological characteristics of the authenticated body and completes comparison, and then the comparison result data string is sent to the server. And the server compares the received comparison result data string with a target comparison result data string stored in the server side to finish final comparison verification. The method has the advantages of high verification speed, high accuracy, biological characteristics which are not afraid of being stolen and cannot be stolen, and the like. The method can effectively avoid two general defects of the currently and commonly used centralized biological characteristic verification method. The disadvantages are as follows: once the biological characteristics are stolen, the object to be detected has no defect of availability of the detected object. The disadvantages are as follows: the detected biological characteristics are at risk of being stolen on-line or off-line and cannot be avoided.

Description

Distributed biometric verification
Technical Field
The invention relates to a verification method for distributed biometric verification.
Background
Authentication is the basis for all network applications. It can be said that there is no network application without authentication. Authentication can be divided into two broad categories, depending on the subject matter to be authenticated: password authentication and biometric authentication. These two kinds of verification have advantages and disadvantages respectively.
The password authentication has the advantages that: 1) the privacy of the verification target is strong. 2) The demand of storage resources on the server is small, and the verification speed is high. 3) Once the server is compromised or the password is stolen, replacing the password can repair the stolen authentication object.
The disadvantages of password authentication are: 1) the correlation between the strength of the password and the length and complexity of the password directly creates a strength paradox between the strength of the password and the memory ability of the holder of the password: short passwords are easily hacked-passwords are too short to work with. Long passwords test the memory of the person-passwords are too long to be practical. 2) In the present day, a plurality of applications are held by one person, and the excessive applications present a more serious challenge to the application and the use of the human body. For most people, it is impossible to remember an independent password for an application. For the absolutely most common people, the number of passwords is too large. And one password covering multiple applications becomes a password policy that most people have to adopt. This strategy, in turn, makes the application under the same password virtually increase the risk of uncontrollable.
The advantages of biometric verification: without remembering the password, this essentially overcomes all the disadvantages of password authentication.
Disadvantages of biometric verification: 1) biological characteristics are susceptible to leakage, and there are numerous leakage points, whether off-line or on-line. 2) Once a server is compromised or a password is revealed, it faces two fatal hazards, hazard 1: the biological characteristics to be detected cannot be replaced. Hazard 2: the attacker can lock the account owner in the reverse direction by using the biometric features stolen from the server side. 3) The biological characteristic verification method has huge demand on storage resources of the server and has low verification speed.
There is a need in the art for an authentication method that maintains the advantages of both password authentication and biometric authentication, but overcomes the disadvantages of both.
Disclosure of Invention
In order to overcome the defects of password authentication and biological characteristic authentication and keep the advantages of the password authentication and the biological characteristic authentication, the invention provides a brand new authentication method, namely a distributed biological characteristic authentication method.
The technical scheme of the invention is that the biological characteristics of the verified target are stored at the terminal side, and the server side stores the verification comparison result data string corresponding to the biological characteristics of the verified target. The terminal completes the collection and comparison of the biological characteristics of the verified target locally, and sends the comparison result data string to the server, and the server compares the received comparison result data string with the comparison result data string stored in the server, thereby completing the verification process of the distributed biological characteristic verification method.
In the method, the biometric features include, but are not limited to, fingerprints, voiceprints, face images, and the like, and may also include specific pictures, images of objects, or a combination of the above biometric features and specific pictures or objects. The combination may be a same-frame combination of the targets at the acquisition time, or a time-sharing combination of all or part of the targets in the effective acquisition time period.
In the method, the comparison result data string is composed of a fixed comparison result data segment and a dynamic comparison result data segment. The fixed comparison result data segment is characterized in that: the data of the data segment is directly associated with the detected object and cannot be changed once generated unless regenerated; after the terminal finishes the biological characteristic comparison, the terminal reports the fixed comparison result data string associated with the detected object. The data segment of the dynamic comparison result includes, but is not limited to, the precision, similarity, time or place of comparison, serial number of comparison times, and the like of the comparison result.
The authentication method has the advantages of not only integrating all the advantages of password authentication and biometric authentication, but also overcoming all the disadvantages of the two types of authentication methods. The authentication scheme also has its own advantages. The method has the advantages that: whether the space is the offline space or the online space, the verification data of the other space cannot be obtained by intercepting the verification data. The method has the advantages that: the length of the data segment of the fixed comparison result can be lengthened to set up a verification password which is not more complex.
Detailed Description
The present invention will be described in detail with reference to specific examples.
And (5) carrying out online silver face brushing verification.
Stage 1: and acquiring the biological characteristics of the verified target and generating a corresponding comparison result data string.
And the account owner performs one-time face data acquisition by taking the specific picture as a background to generate two fixed comparison result data segments. The fixed comparison result data segment 1 is associated with the biological characteristics of the face + the specific picture, and the fixed comparison result data segment 2 is associated with the biological characteristics of the face. The two fixed comparison result data segments are endowed with different transfer limits and are respectively stored by the server and the mobile phone of the account owner.
And (2) stage: authentication
When the account owner performs the account transfer operation, the mobile phone is used for refreshing the face. And the mobile phone sends out a comparison result data string according to the acquired biological features of the human face and the background. Wherein the fixed comparison result data segment 1 or the fixed comparison result data segment 2 is given according to different biological characteristics. And after receiving the comparison result data string sent by the mobile phone, the server completes corresponding verification.
In this embodiment, different transfer limits set by different backgrounds give the bank account owner additional security assurance. The account owner can only "steal" a low limit of account funds at most even if the same-ovum twin brother of the bank account owner as long as background information is not revealed. In addition, if the mobile phone is not attacked, even if the photo face recognition technology which is generally regarded as the most unsafe in the industry at present is adopted, the attack of photos taken at any angle of any account owner on the highest transfer limit can be resisted.

Claims (6)

1. The distributed biological characteristic verification method is characterized in that: the biological characteristics of the verified target exist at the terminal side, and the server side stores a verification comparison result data string corresponding to the biological characteristics of the target; the verification process of the verification method is that the terminal locally finishes the acquisition and comparison of the biological characteristics of the verified target, the comparison result data string is sent to the server, and the server compares the received comparison result data string with the comparison result data string stored at the server end, so that the verification process of the distributed biological characteristic verification method is finished.
2. The biometric feature of claim 1, wherein: the biometric features include, but are not limited to, fingerprints, voiceprints, face images, and other biometric features, and may also include specific pictures, object images, or a combination of the above biometric features and specific picture information or object information.
3. The combination of claim 2, wherein: the combination can be the same frame combination of the biological characteristics and the acquisition time of some pictures or article information, or the time-sharing combination of all or part of the combination in the effective acquisition time period.
4. The alignment result data string of claim 1, wherein: the comparison result data string is composed of a fixed comparison result data section and a dynamic comparison result data section.
5. The data segment of claim 4, wherein: the data of the data segment is directly associated with the detected object and cannot be changed once generated unless regenerated; after the terminal finishes the biological characteristic comparison, the terminal reports the fixed comparison result data string associated with the detected object.
6. The data segment of dynamic alignment result of claim 4, wherein: the data segment of the dynamic comparison result includes, but is not limited to, the precision, similarity, time or place of comparison, serial number of comparison times, and the like of the comparison result.
CN201911395214.2A 2019-12-30 2019-12-30 Distributed biometric verification Pending CN111104661A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201911395214.2A CN111104661A (en) 2019-12-30 2019-12-30 Distributed biometric verification
PCT/CN2020/133511 WO2021135799A1 (en) 2019-12-30 2020-12-03 Distributed biological feature verification method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911395214.2A CN111104661A (en) 2019-12-30 2019-12-30 Distributed biometric verification

Publications (1)

Publication Number Publication Date
CN111104661A true CN111104661A (en) 2020-05-05

Family

ID=70425616

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911395214.2A Pending CN111104661A (en) 2019-12-30 2019-12-30 Distributed biometric verification

Country Status (2)

Country Link
CN (1) CN111104661A (en)
WO (1) WO2021135799A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021135799A1 (en) * 2019-12-30 2021-07-08 黄策 Distributed biological feature verification method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101075874A (en) * 2007-06-28 2007-11-21 腾讯科技(深圳)有限公司 Certifying method and system
CN101420301A (en) * 2008-04-21 2009-04-29 林格灵 Human face recognizing identity authentication system
CN101640682A (en) * 2009-06-04 2010-02-03 深圳市汇海科技开发有限公司 Method for improving safety of Web service
CN103346888B (en) * 2013-07-02 2016-08-10 山东科技大学 A kind of remote identity authentication method based on password, smart card and biological characteristic
CN108090339A (en) * 2017-12-28 2018-05-29 上海闻泰电子科技有限公司 Tripper, method and electronic equipment based on recognition of face
CN110213725A (en) * 2019-05-30 2019-09-06 刘雪琼 A kind of emergency call method based on living things feature recognition, system and equipment

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7552467B2 (en) * 2006-04-24 2009-06-23 Jeffrey Dean Lindsay Security systems for protecting an asset
CN101256700A (en) * 2008-03-31 2008-09-03 浙江大学城市学院 ATM of mixed type user identification authentication
CN107292152A (en) * 2017-05-24 2017-10-24 舒翔 A kind of biological characteristic authentication system and biometric authentication method
CN111104661A (en) * 2019-12-30 2020-05-05 黄策 Distributed biometric verification

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101075874A (en) * 2007-06-28 2007-11-21 腾讯科技(深圳)有限公司 Certifying method and system
CN101420301A (en) * 2008-04-21 2009-04-29 林格灵 Human face recognizing identity authentication system
CN101640682A (en) * 2009-06-04 2010-02-03 深圳市汇海科技开发有限公司 Method for improving safety of Web service
CN103346888B (en) * 2013-07-02 2016-08-10 山东科技大学 A kind of remote identity authentication method based on password, smart card and biological characteristic
CN108090339A (en) * 2017-12-28 2018-05-29 上海闻泰电子科技有限公司 Tripper, method and electronic equipment based on recognition of face
CN110213725A (en) * 2019-05-30 2019-09-06 刘雪琼 A kind of emergency call method based on living things feature recognition, system and equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021135799A1 (en) * 2019-12-30 2021-07-08 黄策 Distributed biological feature verification method

Also Published As

Publication number Publication date
WO2021135799A1 (en) 2021-07-08

Similar Documents

Publication Publication Date Title
EP3460697B1 (en) Identity authentication method and apparatus
TWI650666B (en) Authentication method and system, and server data processing method and server
US9411946B2 (en) Fingerprint password
US9710631B2 (en) Method for enrolling data in a base to protect said data
AU2016201759B2 (en) Methods and Systems for Detecting User Head Motion During an Authentication Transaction
CN104281836B (en) A kind of living creature characteristic recognition system and method
US11663306B2 (en) System and method for confirming a person's identity
US11521208B2 (en) System and method for authenticating transactions from a mobile device
US20140133713A1 (en) Method, Apparatus, and Computer-Readable Recording Medium for Authenticating a User
CN107395369B (en) Authentication method, access method and system for self-contained equipment of mobile Internet
CN106372481A (en) Fingerprint permutation and combination password
JP2009544092A (en) Hybrid biometric system
CN104270253A (en) Method, devices and system for user identity authentication
WO2015070549A1 (en) Skin texture collection and identity recognition method and system
Bodepudi et al. Cloud-Based Biometric Authentication Techniques for Secure Financial Transactions: A Review
CN111104661A (en) Distributed biometric verification
US10157328B2 (en) Method and device for authentification of a user
US20190007400A1 (en) Method for authentication via a combination of biometric parameters
CN109271771A (en) Account information method for retrieving, device, computer equipment
US11775631B1 (en) System and method for perfecting and accelerating biometric identification via evolutionary biometrics via continual registration
US20210141882A1 (en) Apparatus and method for authenticating user based on multiple biometric information
CN103647769A (en) Human ear information coding encryption and application method
EP4002166A1 (en) Method and system for biometric authentication for large numbers of enrolled persons
Kurian et al. Graphical Password Authentication using Images Sequence
Reshma et al. Identity of user thrashing and privacy protection of fingerprints

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200505