CN115955345A - Security management authentication method and device combining biological characteristics - Google Patents

Security management authentication method and device combining biological characteristics Download PDF

Info

Publication number
CN115955345A
CN115955345A CN202211642198.4A CN202211642198A CN115955345A CN 115955345 A CN115955345 A CN 115955345A CN 202211642198 A CN202211642198 A CN 202211642198A CN 115955345 A CN115955345 A CN 115955345A
Authority
CN
China
Prior art keywords
biological characteristic
information
certificate
authenticated
template
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211642198.4A
Other languages
Chinese (zh)
Inventor
曹靖怡
周亮
朱亚运
缪思薇
姜琳
张晓娟
蔺子卿
韩丽芳
应欢
张梦迪
王海翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Electric Power Research Institute Co Ltd CEPRI
Original Assignee
China Electric Power Research Institute Co Ltd CEPRI
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Electric Power Research Institute Co Ltd CEPRI filed Critical China Electric Power Research Institute Co Ltd CEPRI
Priority to CN202211642198.4A priority Critical patent/CN115955345A/en
Publication of CN115955345A publication Critical patent/CN115955345A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a security management authentication method combining biological characteristics, which comprises the following steps: acquiring registered personal information and corresponding biological characteristic information; generating a biological characteristic template according to the biological characteristic information, issuing a corresponding digital certificate according to the personal information, and establishing an index relationship between the biological characteristic template and the digital certificate; respectively signing the biological characteristic template and the digital certificate by using PKI/CA; receiving a verification request of the digital certificate, analyzing the verification request, and acquiring corresponding biological characteristic information to be authenticated and personal information; matching the biological characteristic information to be authenticated in a biological characteristic library, and further acquiring personal information corresponding to the biological characteristic information to be authenticated in a certificate database after the biological characteristic information to be authenticated is successfully matched; and when the personal information to be authenticated is successfully matched with the personal information, finishing the safety management authentication. The dual identity authentication of the certificate and the biological characteristics is realized, and the safety requirements of various scenes are met.

Description

Security management authentication method and device combining biological characteristics
Technical Field
The invention relates to the technical field of information security, in particular to a security management authentication method and device combining biological characteristics.
Background
At present, the PKI authentication system is an identity authentication mechanism which is most widely applied and mature, but requires that a user must safely store a secret key thereof. On one hand, complex passwords are difficult to remember, and on the other hand, simple password passwords are easy to crack by hackers in various ways to cause security threats, so that other methods are needed to protect the passwords in higher security requirements or special occasions. Biometric authentication is a means of performing identity authentication using a person's biometric feature. With the development of computers and the continuous improvement of various algorithms, biometric authentication technology is being widely applied to various fields requiring identity authentication as an accurate, fast and efficient identity authentication method.
In the prior art, a method, an apparatus and an electronic device for authentication based on a block chain are provided: the method comprises the steps of adopting a block chain technology, obtaining applicant information and a user public key in a request message by receiving the request message for applying for a digital certificate sent by a client, obtaining a sub-secret key of a preset node in a block chain, generating a signature key, signing the applicant information and the user public key by utilizing the signature key to form signature information, correspondingly storing the signature information, the applicant information and the user public key in a block of the block chain, and forming the digital certificate of the request message for the client.
The existing technical scheme can meet the safety requirements of certain scenes to a certain extent, but the scene types which can be met are single, and the application range is small. In some special scenes requiring different security levels, the technical scheme cannot meet various security requirements of the scenes.
Disclosure of Invention
In view of the above technical problems, the present invention provides a security management authentication method combining biometrics, comprising:
acquiring registered personal information and corresponding biological characteristic information;
generating a biological characteristic template according to the biological characteristic information, issuing a corresponding digital certificate according to the personal information, and establishing an index relationship between the biological characteristic template and the digital certificate; signing the biological characteristic template and the digital certificate by using PKI/CA respectively; storing the digital certificate in a certificate database, and storing a biological characteristic template in a biological characteristic database;
receiving a verification request of a digital certificate, analyzing the verification request, and acquiring corresponding biological characteristic information and personal information to be authenticated;
matching the biological characteristic information to be authenticated in a biological characteristic library, and further acquiring personal information corresponding to the biological characteristic information to be authenticated in a certificate database after the biological characteristic information to be authenticated is successfully matched; and when the personal information to be authenticated is successfully matched with the personal information, completing the security management authentication.
Further, generating a biometric template according to the biometric information includes:
the biological characteristic template is used for storing biological characteristic information, wherein the biological characteristic identification in the biological characteristic template is used for calculating the HASH value of the biological characteristic information content as the filling value of the item and has uniqueness.
Further, the digital certificate stores the personal information in a certificate format of the x.509v3 standard.
Further, establishing an index relationship between the biometric template and the digital certificate includes:
and establishing an index relationship between the biological characteristic template and the digital certificate through the biological characteristic identification.
Further, receiving an authentication request of the digital certificate, and after parsing the authentication request, the method further includes:
and if the corresponding biological characteristic information and/or personal information to be authenticated cannot be obtained after the verification request is analyzed, ending the verification.
Further, after matching the biometric information to be authenticated in the biometric database, the method further includes:
and if the matching of the biological characteristic information to be authenticated in the biological characteristic library fails, finishing the verification.
Further, the method also comprises the following steps: and when the matching of the personal information to be authenticated and the personal information fails, finishing the verification.
The invention also provides a security management authentication device combined with biological characteristics, which comprises:
an information acquisition unit for acquiring registered personal information and corresponding biometric information;
the template and certificate generating unit is used for generating a biological characteristic template according to the biological characteristic information, issuing a corresponding digital certificate according to the personal information and establishing an index relationship between the biological characteristic template and the digital certificate; signing the biological characteristic template and the digital certificate by using PKI/CA respectively; storing the digital certificate in a certificate database, and storing a biological characteristic template in a biological characteristic database;
the analysis unit is used for receiving a verification request of the digital certificate, analyzing the verification request and acquiring corresponding biological characteristic information and personal information to be authenticated;
the verification unit is used for matching the biological characteristic information to be authenticated in a biological characteristic database, and further acquiring personal information corresponding to the biological characteristic information to be authenticated in a certificate database after the biological characteristic information to be authenticated is successfully matched; and when the personal information to be authenticated is successfully matched with the personal information, finishing the safety management authentication.
Further, the template and certificate generating unit includes:
and the index relation establishing subunit is used for establishing the index relation between the biological characteristic template and the digital certificate through the biological characteristic identifier.
Further, the parsing unit further includes:
and the analysis subunit is used for finishing the verification if the corresponding biometric information and/or personal information to be authenticated cannot be obtained after the verification request is analyzed.
The invention provides a security management authentication method and device combining biological characteristics, which respectively designs a certificate library and a biological characteristic information library in the aspect of security, thereby realizing the logical isolation of certificate information and biological characteristic information. The personal certificate is based on an X.509V3 standard certificate format, and is signed by using a certificate authority issuing organization in a PKI/CA system, so that the integrity and the credibility of information in the certificate are ensured. Meanwhile, the stored biometric information template data is subjected to signature protection by using a certificate authority issuing organization in a PKI/CA system, so that the integrity and the credibility of the stored biometric information template data are ensured. In the aspect of effectiveness, various types of identity authentication can be provided to meet different application scenarios with safety requirements: issuing a digital certificate to meet the traditional scene requirements of identity authentication based on the certificate and general safety requirements; the certificate and the individual biological characteristic information can be bound, the dual identity authentication of the certificate and the biological characteristic is realized, and the application scene requirements of high safety and strict identity authentication requirements are met.
Drawings
FIG. 1 is a flow chart of a security management authentication method incorporating biometrics according to the present invention;
FIG. 2 is a conceptual diagram of the design of security management authentication incorporating biometrics in accordance with the present invention;
FIG. 3 is a certificate and biometric data template to which the present invention relates;
FIG. 4 is a schematic diagram of the verification of biometric template data items involved in the present invention;
FIG. 5 is a process of registering an application digital certificate to which the present invention relates;
FIG. 6 is a 3 flow diagram of certificate verification being performed by a certificate issued by a system to which the present invention relates;
fig. 7 is a schematic structural diagram of a security management authentication device incorporating biometrics according to the present invention.
Detailed Description
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein, but rather construed as limited to the embodiments set forth herein.
The invention relates to the definition of related abbreviations and key terms:
PKI: public Key Infrastructure;
CA: the short for certificate authority, certificate issuing authority, is an entity responsible for issuing and maintaining certificates, typically of a third party.
Identity authentication: security measures dedicated to determining the validity of a transmission, message or originator, or means to verify the authorization of a person to accept a particular class of information.
The biological characteristic authentication technology is a technology for extracting physiological characteristics or behavior modes with uniqueness as authentication bases. The whole authentication process is divided into four steps: extracting biological characteristics, generating a characteristic template, comparing characteristic strategies and characteristics and matching the characteristics. The biological characteristic authentication system firstly extracts the biological characteristics of a person, and extracts the unique characteristics of the person after digital-to-analog conversion. These feature descriptions are then further generalized and summarized to generate a feature template. When the authentication system verifies the identity of a person, the authentication system acquires the characteristics of the person by using the corresponding sensor, converts the characteristics into a predefined digital format, compares the measurement result with the characteristic template, and judges the legality of the person according to the matching degree.
Fig. 1 is a schematic flow chart of a security management authentication method combining biometrics, and the method provided by the present invention is described in detail below with reference to fig. 1.
Step S101, registered personal information and corresponding biological characteristic information are obtained.
The biological characteristic is used as an authentication factor, which means that the biological characteristic information is stored as a certificate item or an expansion item of a digital certificate in a PKI/CA system, so that the digital certificate of an individual can be bound with the biological characteristic information thereof, and a technical means is provided for double authentication. When the digital certificate is used for identity authentication, the digital certificate completes the traditional certificate authentication process part; completing identification and authentication process based on biological characteristics by the biological characteristic information in the certificate; and finally, the two authentication results are combined together to be used as an authentication result to be fed back. Only certificate-based authentication or biometric authentication may be performed according to actual needs. Generally, this method is applied to a scenario with a high security level. The combination mode improves the flexibility and the safety of the PKI/CA authentication system and meets the application requirements of different certificates.
The invention is designed by adopting a loose coupling mode based on the idea that the biological characteristics are taken as authentication factors. The biological characteristic data information is not stored in the certificate, and only a digital certificate capable of indexing the biological characteristic information is issued by a PKI/CA system, so that a certificate + biological characteristic double-factor mechanism is realized. In particular, PKI/CA systems employ X.509 digital certificates to associate biometric-related information with certificates. However, the biometric data information itself is not stored in the certificate, and only the index mark of the biometric information is stored in the certificate extension item. The corresponding biological characteristic data information base at the back end can be retrieved through the index mark item. The biological characteristic data information base of the back end and the certificate data information base of the PKI/CA are independent respectively. The design principle is shown in fig. 2.
Step S102, generating a biological characteristic template according to the biological characteristic information, issuing a corresponding digital certificate according to the personal information, and establishing an index relationship between the biological characteristic template and the digital certificate; signing the biological characteristic template and the digital certificate respectively by using PKI/CA; and storing the digital certificate in a certificate database, and storing the biological characteristic template in a biological characteristic database.
The biological characteristic template is used for storing biological characteristic information, wherein the biological characteristic identification in the biological characteristic template is used for calculating the HASH value of the biological characteristic information content as the filling value of the item and has uniqueness.
In the invention, basic information related to an individual is stored in a certificate format of an X.509V3 standard, the basic information is issued by PKI/CA, a biological characteristic template is designed to store biological characteristic information related to the individual, the biological characteristic template and a digital certificate are established through biological characteristic identification, and an index relationship is established through the biological characteristic identification. In the present invention, the certificate and the biometric template storage data are shown in fig. 3.
The certificate issued by the system is composed of a basic certificate domain and a certificate extension. The basic certificate domain is basic information for filling related certificate information, and the certificate extension provides additional properties of associated users or public keys and a method for managing a verification hierarchy, and allows customized private extension, so that the certificate has unique information. The basic certificate field comprises version, serial number, user subject, validity period, issuer subject, certificate public key information, extension, issuer signature and the like. Besides the certificate extension item of the X.509 standard, the certificate extension item defines a biological characteristic information identification item in a self-defining mode, and the standard certificate and the corresponding biological characteristic information can be associated through the biological characteristic information identification item.
The biometric template is mainly composed of the following items.
Biological characteristic identification: the only one is the key item of the certificate and the biological characteristic data information. Typically, the computing biometric data information content computing HASH value may be used as a padding value for the item to ensure its uniqueness.
The data information content is as follows: stored biometric specific content. This term is used in this design as a baseline value for biometric verification.
And (3) biometric algorithm: an algorithm used when biometric authentication is performed is specified.
The characteristic types are as follows: corresponding biometric types are specified, such as 0 for a fingerprint, 1 for a facial photograph, etc.
Code rate identification: a tolerable identification verification deviation, such as 1%, for a given biometric indicates that the biometric information identification verification error is acceptable within ± 1%.
And (3) validity period: a validity period of the biometric data information is specified.
Issuer signature: and signing the biological characteristic data information template to protect the integrity and the authenticity of the biological characteristic data information template. The item is signed by the same authority issuer as the digital certificate.
The principle of authentication based on the biometric template data items described above is shown in fig. 4. In fig. 4, the biometric data is calculated by a corresponding algorithm, and then compared with the biometric reference data, and if the deviation is within the range of the recognition rate, the biometric data is considered to be matched, otherwise, the biometric data is considered to be not matched.
The process of applying for a data word certificate in conjunction with biometric enrollment is shown in fig. 5.
The certificate application flow is described as follows: when applying for a certificate through the system, personal information is registered and filled in, and meanwhile, the biometric information of an individual is submitted. The system respectively verifies the validity of the submitted personal information and the submitted biological characteristic information. Through the checked information, the system generates corresponding template data according to the biological characteristic information and issues a digital certificate corresponding to the template data. And finally, the system respectively stores the certificate information into a certificate database and stores the biological characteristic template information into a biological characteristic database.
Step S103, receiving a verification request of the digital certificate, analyzing the verification request, and acquiring corresponding biological characteristic information and personal information to be authenticated.
And receiving a verification request of the digital certificate, analyzing the verification request, and ending the verification if the corresponding biological characteristic information and/or personal information to be authenticated cannot be obtained after the verification request is analyzed. Otherwise, the following steps are continued.
Step S104, matching the biological characteristic information to be authenticated in a biological characteristic database, and further acquiring personal information corresponding to the biological characteristic information to be authenticated in a certificate database after the biological characteristic information to be authenticated is successfully matched; and when the personal information to be authenticated is successfully matched with the personal information, finishing the safety management authentication.
And matching the biological characteristic information to be authenticated in a biological characteristic library, and finishing the verification if the matching of the biological characteristic information to be authenticated in the biological characteristic library fails. And when the matching of the personal information to be authenticated and the personal information fails, finishing the verification.
The specific flow of the issued certificate when performing certificate verification is shown in fig. 6. Description of certificate verification flow: after receiving the certificate verification request information, the system firstly analyzes whether the request contains the certificate and the biological characteristic information of the verified person. If the biometric information is contained, acquiring a feature information identifier by analyzing an expansion item in the certificate, searching a feature information base through the feature information identifier, acquiring corresponding biometric reference data, and verifying the biometric information of the person to be verified. And after the verification of the biological characteristic information, the validity verification is carried out on the personal certificate.
The invention can effectively apply the biological characteristics of personal fingerprint, facial image and the like to the traditional PKI/CA system, and respectively meets the application scenes of double authentication based on certificate only, biological characteristics only or certificate + biological characteristics in a desk management system:
application scenario Authentication type Safety performance
General function use Based only on certificates In general terms
Personal file browsing, etc Based on biometric features only High (a)
Browsing confidential documents, etc Certificate + biometric Super high
Based on the same inventive concept, the present invention also provides a security management authentication apparatus 700 combining biometric features, as shown in fig. 7, comprising:
an information acquisition unit 710 for acquiring registered personal information and corresponding biometric information;
a template and certificate generating unit 720, configured to generate a biometric template according to the biometric information, issue a corresponding digital certificate according to the personal information, and establish an index relationship between the biometric template and the digital certificate; signing the biological characteristic template and the digital certificate by using PKI/CA respectively; storing the digital certificate in a certificate database, and storing a biological characteristic template in a biological characteristic database;
the analysis unit 730 is used for receiving a verification request of the digital certificate, analyzing the verification request and acquiring corresponding biological characteristic information and personal information to be authenticated;
a verification unit 740, configured to match the biometric information to be authenticated in a biometric database, and further obtain, in a certificate database, personal information corresponding to the biometric information to be authenticated after the biometric information to be authenticated is successfully matched; and when the personal information to be authenticated is successfully matched with the personal information, completing the security management authentication.
Further, the template and certificate generating unit includes:
and the index relation establishing subunit is used for establishing the index relation between the biological characteristic template and the digital certificate through the biological characteristic identifier.
Further, the parsing unit further includes:
an analysis subunit, configured to, if the corresponding biometric information and/or personal information to be authenticated cannot be obtained after the verification request is analyzed, end the verification
The invention provides a security management authentication method and device combining biological characteristics, which respectively designs a certificate library and a biological characteristic information library in the aspect of security, thereby realizing the logical isolation of certificate information and biological characteristic information. The personal certificate is based on an X.509V3 standard certificate format and is signed by a certificate authority issuing organization in a PKI/CA system, so that the integrity and the credibility of information in the certificate are ensured. Meanwhile, the stored biometric information template data is protected by using the signature of a certificate authority in the PKI/CA system, so that the integrity and the credibility of the data are ensured. In the aspect of effectiveness, various types of identity authentication can be provided to meet different application scenarios with safety requirements: issuing a digital certificate to meet the conventional scene requirements of identity authentication based on the certificate and general safety requirements; the certificate and the individual biological characteristic information can be bound, the dual identity authentication of the certificate and the biological characteristic is realized, and the application scene requirements of high safety and strict identity authentication requirements are met.
Finally, it should be noted that: although the present invention has been described in detail with reference to the above embodiments, it should be understood by those skilled in the art that various changes may be made and equivalents may be substituted for elements thereof without departing from the spirit and scope of the invention.

Claims (10)

1. A security management authentication method combining biometrics, characterized by comprising:
acquiring registered personal information and corresponding biological characteristic information;
generating a biological characteristic template according to the biological characteristic information, issuing a corresponding digital certificate according to the personal information, and establishing an index relationship between the biological characteristic template and the digital certificate; signing the biological characteristic template and the digital certificate respectively by using PKI/CA; storing the digital certificate in a certificate database, and storing a biological characteristic template in a biological characteristic database;
receiving a verification request of a digital certificate, analyzing the verification request, and acquiring corresponding biological characteristic information to be authenticated and personal information;
matching the biological characteristic information to be authenticated in a biological characteristic library, and further acquiring personal information corresponding to the biological characteristic information to be authenticated in a certificate database after the biological characteristic information to be authenticated is successfully matched; and when the personal information to be authenticated is successfully matched with the personal information, finishing the safety management authentication.
2. The method of claim 1, wherein generating a biometric template from the biometric information comprises:
the biological characteristic template is used for storing biological characteristic information, wherein the biological characteristic identification in the biological characteristic template is used as the filling value of the item by calculating the HASH value of the biological characteristic information content and has uniqueness.
3. The method of claim 1, wherein the digital certificate stores the personal information in a certificate format of a x.509v3 standard.
4. The method of claim 1 or 2, wherein establishing an indexed relationship between the biometric template and a digital certificate comprises:
and establishing an index relationship between the biological characteristic template and the digital certificate through the biological characteristic identification.
5. The method of claim 1, wherein receiving an authentication request for a digital certificate, after parsing the authentication request, further comprises:
and if the corresponding biological characteristic information and/or personal information to be authenticated cannot be obtained after the verification request is analyzed, ending the verification.
6. The method according to claim 1, further comprising, after matching the biometric information to be authenticated in a biometric library:
and if the matching of the biological characteristic information to be authenticated in the biological characteristic library fails, ending the verification.
7. The method of claim 1, further comprising: and when the matching of the personal information to be authenticated and the personal information fails, finishing the verification.
8. A biometric-integrated security management authentication apparatus, comprising:
an information acquisition unit for acquiring registered personal information and corresponding biometric information;
the template and certificate generating unit is used for generating a biological characteristic template according to the biological characteristic information, issuing a corresponding digital certificate according to the personal information and establishing an index relationship between the biological characteristic template and the digital certificate; signing the biological characteristic template and the digital certificate respectively by using PKI/CA; storing the digital certificate in a certificate database, and storing a biological characteristic template in a biological characteristic database;
the analysis unit is used for receiving a verification request of the digital certificate, analyzing the verification request and acquiring corresponding biological characteristic information to be authenticated and personal information;
the verification unit is used for matching the biological characteristic information to be authenticated in a biological characteristic database, and further acquiring personal information corresponding to the biological characteristic information to be authenticated in a certificate database after the biological characteristic information to be authenticated is successfully matched; and when the personal information to be authenticated is successfully matched with the personal information, completing the security management authentication.
9. The apparatus of claim 8, wherein the template and certificate generation unit comprises:
and the index relation establishing subunit is used for establishing the index relation between the biological characteristic template and the digital certificate through the biological characteristic identifier.
10. The apparatus of claim 8, wherein the parsing unit further comprises:
and the analysis subunit is used for ending the verification if the corresponding biometric information and/or personal information to be authenticated cannot be obtained after the verification request is analyzed.
CN202211642198.4A 2022-12-20 2022-12-20 Security management authentication method and device combining biological characteristics Pending CN115955345A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211642198.4A CN115955345A (en) 2022-12-20 2022-12-20 Security management authentication method and device combining biological characteristics

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211642198.4A CN115955345A (en) 2022-12-20 2022-12-20 Security management authentication method and device combining biological characteristics

Publications (1)

Publication Number Publication Date
CN115955345A true CN115955345A (en) 2023-04-11

Family

ID=87282065

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211642198.4A Pending CN115955345A (en) 2022-12-20 2022-12-20 Security management authentication method and device combining biological characteristics

Country Status (1)

Country Link
CN (1) CN115955345A (en)

Similar Documents

Publication Publication Date Title
US11496310B2 (en) Methods and systems for universal storage and access to user-owned credentials for trans-institutional digital authentication
US9716698B2 (en) Methods for secure enrollment and backup of personal identity credentials into electronic devices
EP2053777B1 (en) A certification method, system, and device
EP1791073B1 (en) Processing device, helper data generating device, terminal device, authentication device and biometrics authentication system
JP4460763B2 (en) Encryption key generation method using biometric data
CN1717896B (en) Digital signature method, computer equipment and system for electronic document
US20030101348A1 (en) Method and system for determining confidence in a digital transaction
US20040010697A1 (en) Biometric authentication system and method
EP2087641B1 (en) Fuzzy biometrics based signatures
US20070031009A1 (en) Method and system for string-based biometric authentication
JPWO2007094165A1 (en) Identification system and program, and identification method
JP2008538146A (en) Architecture for privacy protection of biometric templates
Sarier Comments on biometric-based non-transferable credentials and their application in blockchain-based identity management
WO1999012144A1 (en) Digital signature generating server and digital signature generating method
CN113934993A (en) Electronic seal based on electronic handwriting signature technology
JP2010114725A (en) Evidence preservation apparatus, method of preserving evidence, and program
Hamer et al. Private digital identity on blockchain
JP2001216270A (en) Authentication station, authentication system and authentication method
KR100546775B1 (en) Method for issuing a note of authentication and identification of MOC user using human features
CN115955345A (en) Security management authentication method and device combining biological characteristics
WO2021250930A1 (en) System and authentication device
JPH1188322A (en) Digital signature generation method
KR20110115256A (en) Electronic signature management method using signer identification
CN113691366A (en) Desensitized secure biometric identity authentication system
KR20210025277A (en) Electronic terminal apparatus providing authority for secure document through user authentication based on matching rate of face image and operating method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination