CN111104661A - Distributed biometric verification - Google Patents
Distributed biometric verification Download PDFInfo
- Publication number
- CN111104661A CN111104661A CN201911395214.2A CN201911395214A CN111104661A CN 111104661 A CN111104661 A CN 111104661A CN 201911395214 A CN201911395214 A CN 201911395214A CN 111104661 A CN111104661 A CN 111104661A
- Authority
- CN
- China
- Prior art keywords
- comparison result
- result data
- data string
- biological characteristics
- comparison
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/172—Classification, e.g. identification
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Bioethics (AREA)
- Multimedia (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Human Computer Interaction (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention provides a brand-new authentication method taking biological characteristics as an authentication target. The authentication method is characterized in that target biological characteristics used for authentication are stored at a terminal side, and a result data string of the biological characteristic authentication is stored at a server side. The authentication process is that the terminal collects the biological characteristics of the authenticated body and completes comparison, and then the comparison result data string is sent to the server. And the server compares the received comparison result data string with a target comparison result data string stored in the server side to finish final comparison verification. The method has the advantages of high verification speed, high accuracy, biological characteristics which are not afraid of being stolen and cannot be stolen, and the like. The method can effectively avoid two general defects of the currently and commonly used centralized biological characteristic verification method. The disadvantages are as follows: once the biological characteristics are stolen, the object to be detected has no defect of availability of the detected object. The disadvantages are as follows: the detected biological characteristics are at risk of being stolen on-line or off-line and cannot be avoided.
Description
Technical Field
The invention relates to a verification method for distributed biometric verification.
Background
Authentication is the basis for all network applications. It can be said that there is no network application without authentication. Authentication can be divided into two broad categories, depending on the subject matter to be authenticated: password authentication and biometric authentication. These two kinds of verification have advantages and disadvantages respectively.
The password authentication has the advantages that: 1) the privacy of the verification target is strong. 2) The demand of storage resources on the server is small, and the verification speed is high. 3) Once the server is compromised or the password is stolen, replacing the password can repair the stolen authentication object.
The disadvantages of password authentication are: 1) the correlation between the strength of the password and the length and complexity of the password directly creates a strength paradox between the strength of the password and the memory ability of the holder of the password: short passwords are easily hacked-passwords are too short to work with. Long passwords test the memory of the person-passwords are too long to be practical. 2) In the present day, a plurality of applications are held by one person, and the excessive applications present a more serious challenge to the application and the use of the human body. For most people, it is impossible to remember an independent password for an application. For the absolutely most common people, the number of passwords is too large. And one password covering multiple applications becomes a password policy that most people have to adopt. This strategy, in turn, makes the application under the same password virtually increase the risk of uncontrollable.
The advantages of biometric verification: without remembering the password, this essentially overcomes all the disadvantages of password authentication.
Disadvantages of biometric verification: 1) biological characteristics are susceptible to leakage, and there are numerous leakage points, whether off-line or on-line. 2) Once a server is compromised or a password is revealed, it faces two fatal hazards, hazard 1: the biological characteristics to be detected cannot be replaced. Hazard 2: the attacker can lock the account owner in the reverse direction by using the biometric features stolen from the server side. 3) The biological characteristic verification method has huge demand on storage resources of the server and has low verification speed.
There is a need in the art for an authentication method that maintains the advantages of both password authentication and biometric authentication, but overcomes the disadvantages of both.
Disclosure of Invention
In order to overcome the defects of password authentication and biological characteristic authentication and keep the advantages of the password authentication and the biological characteristic authentication, the invention provides a brand new authentication method, namely a distributed biological characteristic authentication method.
The technical scheme of the invention is that the biological characteristics of the verified target are stored at the terminal side, and the server side stores the verification comparison result data string corresponding to the biological characteristics of the verified target. The terminal completes the collection and comparison of the biological characteristics of the verified target locally, and sends the comparison result data string to the server, and the server compares the received comparison result data string with the comparison result data string stored in the server, thereby completing the verification process of the distributed biological characteristic verification method.
In the method, the biometric features include, but are not limited to, fingerprints, voiceprints, face images, and the like, and may also include specific pictures, images of objects, or a combination of the above biometric features and specific pictures or objects. The combination may be a same-frame combination of the targets at the acquisition time, or a time-sharing combination of all or part of the targets in the effective acquisition time period.
In the method, the comparison result data string is composed of a fixed comparison result data segment and a dynamic comparison result data segment. The fixed comparison result data segment is characterized in that: the data of the data segment is directly associated with the detected object and cannot be changed once generated unless regenerated; after the terminal finishes the biological characteristic comparison, the terminal reports the fixed comparison result data string associated with the detected object. The data segment of the dynamic comparison result includes, but is not limited to, the precision, similarity, time or place of comparison, serial number of comparison times, and the like of the comparison result.
The authentication method has the advantages of not only integrating all the advantages of password authentication and biometric authentication, but also overcoming all the disadvantages of the two types of authentication methods. The authentication scheme also has its own advantages. The method has the advantages that: whether the space is the offline space or the online space, the verification data of the other space cannot be obtained by intercepting the verification data. The method has the advantages that: the length of the data segment of the fixed comparison result can be lengthened to set up a verification password which is not more complex.
Detailed Description
The present invention will be described in detail with reference to specific examples.
And (5) carrying out online silver face brushing verification.
Stage 1: and acquiring the biological characteristics of the verified target and generating a corresponding comparison result data string.
And the account owner performs one-time face data acquisition by taking the specific picture as a background to generate two fixed comparison result data segments. The fixed comparison result data segment 1 is associated with the biological characteristics of the face + the specific picture, and the fixed comparison result data segment 2 is associated with the biological characteristics of the face. The two fixed comparison result data segments are endowed with different transfer limits and are respectively stored by the server and the mobile phone of the account owner.
And (2) stage: authentication
When the account owner performs the account transfer operation, the mobile phone is used for refreshing the face. And the mobile phone sends out a comparison result data string according to the acquired biological features of the human face and the background. Wherein the fixed comparison result data segment 1 or the fixed comparison result data segment 2 is given according to different biological characteristics. And after receiving the comparison result data string sent by the mobile phone, the server completes corresponding verification.
In this embodiment, different transfer limits set by different backgrounds give the bank account owner additional security assurance. The account owner can only "steal" a low limit of account funds at most even if the same-ovum twin brother of the bank account owner as long as background information is not revealed. In addition, if the mobile phone is not attacked, even if the photo face recognition technology which is generally regarded as the most unsafe in the industry at present is adopted, the attack of photos taken at any angle of any account owner on the highest transfer limit can be resisted.
Claims (6)
1. The distributed biological characteristic verification method is characterized in that: the biological characteristics of the verified target exist at the terminal side, and the server side stores a verification comparison result data string corresponding to the biological characteristics of the target; the verification process of the verification method is that the terminal locally finishes the acquisition and comparison of the biological characteristics of the verified target, the comparison result data string is sent to the server, and the server compares the received comparison result data string with the comparison result data string stored at the server end, so that the verification process of the distributed biological characteristic verification method is finished.
2. The biometric feature of claim 1, wherein: the biometric features include, but are not limited to, fingerprints, voiceprints, face images, and other biometric features, and may also include specific pictures, object images, or a combination of the above biometric features and specific picture information or object information.
3. The combination of claim 2, wherein: the combination can be the same frame combination of the biological characteristics and the acquisition time of some pictures or article information, or the time-sharing combination of all or part of the combination in the effective acquisition time period.
4. The alignment result data string of claim 1, wherein: the comparison result data string is composed of a fixed comparison result data section and a dynamic comparison result data section.
5. The data segment of claim 4, wherein: the data of the data segment is directly associated with the detected object and cannot be changed once generated unless regenerated; after the terminal finishes the biological characteristic comparison, the terminal reports the fixed comparison result data string associated with the detected object.
6. The data segment of dynamic alignment result of claim 4, wherein: the data segment of the dynamic comparison result includes, but is not limited to, the precision, similarity, time or place of comparison, serial number of comparison times, and the like of the comparison result.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911395214.2A CN111104661A (en) | 2019-12-30 | 2019-12-30 | Distributed biometric verification |
PCT/CN2020/133511 WO2021135799A1 (en) | 2019-12-30 | 2020-12-03 | Distributed biological feature verification method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911395214.2A CN111104661A (en) | 2019-12-30 | 2019-12-30 | Distributed biometric verification |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111104661A true CN111104661A (en) | 2020-05-05 |
Family
ID=70425616
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911395214.2A Pending CN111104661A (en) | 2019-12-30 | 2019-12-30 | Distributed biometric verification |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN111104661A (en) |
WO (1) | WO2021135799A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021135799A1 (en) * | 2019-12-30 | 2021-07-08 | 黄策 | Distributed biological feature verification method |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101075874A (en) * | 2007-06-28 | 2007-11-21 | 腾讯科技(深圳)有限公司 | Certifying method and system |
CN101420301A (en) * | 2008-04-21 | 2009-04-29 | 林格灵 | Human face recognizing identity authentication system |
CN101640682A (en) * | 2009-06-04 | 2010-02-03 | 深圳市汇海科技开发有限公司 | Method for improving safety of Web service |
CN103346888B (en) * | 2013-07-02 | 2016-08-10 | 山东科技大学 | A kind of remote identity authentication method based on password, smart card and biological characteristic |
CN108090339A (en) * | 2017-12-28 | 2018-05-29 | 上海闻泰电子科技有限公司 | Tripper, method and electronic equipment based on recognition of face |
CN110213725A (en) * | 2019-05-30 | 2019-09-06 | 刘雪琼 | A kind of emergency call method based on living things feature recognition, system and equipment |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7552467B2 (en) * | 2006-04-24 | 2009-06-23 | Jeffrey Dean Lindsay | Security systems for protecting an asset |
CN101256700A (en) * | 2008-03-31 | 2008-09-03 | 浙江大学城市学院 | ATM of mixed type user identification authentication |
CN107292152A (en) * | 2017-05-24 | 2017-10-24 | 舒翔 | A kind of biological characteristic authentication system and biometric authentication method |
CN111104661A (en) * | 2019-12-30 | 2020-05-05 | 黄策 | Distributed biometric verification |
-
2019
- 2019-12-30 CN CN201911395214.2A patent/CN111104661A/en active Pending
-
2020
- 2020-12-03 WO PCT/CN2020/133511 patent/WO2021135799A1/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101075874A (en) * | 2007-06-28 | 2007-11-21 | 腾讯科技(深圳)有限公司 | Certifying method and system |
CN101420301A (en) * | 2008-04-21 | 2009-04-29 | 林格灵 | Human face recognizing identity authentication system |
CN101640682A (en) * | 2009-06-04 | 2010-02-03 | 深圳市汇海科技开发有限公司 | Method for improving safety of Web service |
CN103346888B (en) * | 2013-07-02 | 2016-08-10 | 山东科技大学 | A kind of remote identity authentication method based on password, smart card and biological characteristic |
CN108090339A (en) * | 2017-12-28 | 2018-05-29 | 上海闻泰电子科技有限公司 | Tripper, method and electronic equipment based on recognition of face |
CN110213725A (en) * | 2019-05-30 | 2019-09-06 | 刘雪琼 | A kind of emergency call method based on living things feature recognition, system and equipment |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021135799A1 (en) * | 2019-12-30 | 2021-07-08 | 黄策 | Distributed biological feature verification method |
Also Published As
Publication number | Publication date |
---|---|
WO2021135799A1 (en) | 2021-07-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3460697B1 (en) | Identity authentication method and apparatus | |
TWI650666B (en) | Authentication method and system, and server data processing method and server | |
US9411946B2 (en) | Fingerprint password | |
US9710631B2 (en) | Method for enrolling data in a base to protect said data | |
AU2016201759B2 (en) | Methods and Systems for Detecting User Head Motion During an Authentication Transaction | |
CN104281836B (en) | A kind of living creature characteristic recognition system and method | |
US11663306B2 (en) | System and method for confirming a person's identity | |
US11521208B2 (en) | System and method for authenticating transactions from a mobile device | |
US20140133713A1 (en) | Method, Apparatus, and Computer-Readable Recording Medium for Authenticating a User | |
CN107395369B (en) | Authentication method, access method and system for self-contained equipment of mobile Internet | |
CN106372481A (en) | Fingerprint permutation and combination password | |
JP2009544092A (en) | Hybrid biometric system | |
CN104270253A (en) | Method, devices and system for user identity authentication | |
WO2015070549A1 (en) | Skin texture collection and identity recognition method and system | |
Bodepudi et al. | Cloud-Based Biometric Authentication Techniques for Secure Financial Transactions: A Review | |
CN111104661A (en) | Distributed biometric verification | |
US10157328B2 (en) | Method and device for authentification of a user | |
US20190007400A1 (en) | Method for authentication via a combination of biometric parameters | |
CN109271771A (en) | Account information method for retrieving, device, computer equipment | |
US11775631B1 (en) | System and method for perfecting and accelerating biometric identification via evolutionary biometrics via continual registration | |
US20210141882A1 (en) | Apparatus and method for authenticating user based on multiple biometric information | |
CN103647769A (en) | Human ear information coding encryption and application method | |
EP4002166A1 (en) | Method and system for biometric authentication for large numbers of enrolled persons | |
Kurian et al. | Graphical Password Authentication using Images Sequence | |
Reshma et al. | Identity of user thrashing and privacy protection of fingerprints |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200505 |