WO2021135799A1 - 分布式生物特征验证法 - Google Patents

分布式生物特征验证法 Download PDF

Info

Publication number
WO2021135799A1
WO2021135799A1 PCT/CN2020/133511 CN2020133511W WO2021135799A1 WO 2021135799 A1 WO2021135799 A1 WO 2021135799A1 CN 2020133511 W CN2020133511 W CN 2020133511W WO 2021135799 A1 WO2021135799 A1 WO 2021135799A1
Authority
WO
WIPO (PCT)
Prior art keywords
comparison result
result data
biological feature
verification
data string
Prior art date
Application number
PCT/CN2020/133511
Other languages
English (en)
French (fr)
Inventor
黄策
Original Assignee
黄策
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 黄策 filed Critical 黄策
Publication of WO2021135799A1 publication Critical patent/WO2021135799A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification

Definitions

  • the invention relates to a verification method for distributed biometric verification.
  • Verification is the foundation of all network applications. It can be said that there is no network application without verification. Depending on the subject matter to be verified, verification can be divided into two categories: password verification and biometric verification. Each of these two types of verification has advantages and disadvantages.
  • the advantages of password verification are: 1) The privacy of the verification subject is strong. 2) The storage resource demand of the server is small, and the verification speed is fast. 3) Once the server is compromised or the password is stolen, the stolen verification object can be repaired by changing the password.
  • the disadvantages of password verification are: 1) The strength of the password is related to the length and complexity of the password, which directly leads to a strength paradox between the strength of the password and the memory capacity of the password holder: short passwords are easy to be compromised-too much password Short will not work. Long passwords test people's memory-too long passwords won't work. 2) Today, when one person holds multiple applications, too many applications create a more severe challenge for applications to use the human body. For most people, remembering an independent password for an application is an impossible task. For an absolute number of ordinary people, too many passwords are not enough. And a password covering multiple applications has become a password strategy that most people have to adopt. And this strategy makes applications under the same password virtually increase uncontrollable risks.
  • Biometrics are easy to leak, and there are countless leaks whether offline or online. 2) Once the server is compromised or the password is leaked, it will face two fatal hazards. Hazard 1: The biometrics of the inspected cannot be replaced. Harm 2: The attacker can reversely lock the account owner with the biometrics stolen from the server. 3) The biometric verification method requires a huge amount of storage resources of the server, and the verification speed is slow.
  • the industry needs a verification method that not only maintains the advantages of the two verification methods of password verification and biometric verification, but also overcomes the shortcomings of these two verification methods.
  • the present invention provides a brand-new verification method-distributed biometric verification method.
  • the technical solution of the present invention is to store the biological characteristics of the verified target on the terminal side, and the server side stores the verification comparison result data string corresponding to the biological characteristics of the verified target.
  • the terminal completes the collection and comparison of the biological characteristics of the verified target locally, and sends the comparison result data string to the server, and the server compares the received comparison result data string with the comparison result data string stored on the server side , Thereby completing the verification process of the distributed biometric verification method.
  • the biological characteristics include, but are not limited to, fingerprints, voiceprints, facial images and other biological characteristics, and can also include specific pictures, item images, or a combination of the above biological characteristics and specific pictures or items .
  • the combination may be the same frame combination of the object at the collection time, or all or part of the time-sharing combination of the object within the effective collection time period.
  • the comparison result data string is composed of a fixed comparison result data segment and a dynamic comparison result data segment.
  • the fixed comparison result data segment is characterized in that: the data of the data segment is directly associated with the detected target, and once it is generated, it will not change unless it is regenerated; after the terminal completes the biometric comparison, it will both report and be The associated fixed comparison result data string of the inspection target.
  • the dynamic comparison result data segment includes, but is not limited to, the accuracy of the comparison result, the similarity, the time or place when the comparison occurs, and the serial number of the comparison number and other descriptive data for the comparison result.
  • the advantage of the verification method is that it not only brings together all the advantages of password verification and biometric verification, but also overcomes all the disadvantages of these two types of verification methods.
  • the verification scheme has its own unique advantages.
  • Advantage 1 Whether it is in offline space or online space, the interception of verification data will not be able to obtain verification data in another space.
  • Advantage 2 By lengthening the length of the data segment of the fixed comparison result, an extremely “complex” verification "password” can be set.
  • Stage 1 The collection of the biological characteristics of the verified target and the generation of the corresponding comparison result data string.
  • the account owner conducts a face data collection with a specific picture as the background, and generates two fixed comparison result data segments.
  • the fixed comparison result data segment 1 is associated with the biological characteristics of "human face + specific picture”
  • the fixed comparison result data segment 2 is associated with the biological characteristics of "human face”.
  • the two fixed comparison result data segments are given different transfer limits and are stored in the server and the account owner's mobile phone respectively.
  • the mobile phone When the account owner performs the transfer operation, use the mobile phone to perform the face-swiping operation.
  • the mobile phone sends out the comparison result data string according to the obtained human face biometrics and background.
  • the fixed comparison result data segment 1 or the fixed comparison result data segment 2 is given according to different biological characteristics.
  • the server completes the corresponding verification after receiving the comparison result data string sent by the mobile phone.

Abstract

一种以生物特征为认证标的认证方法,其中,用于认证的标的生物特征存储在终端侧,生物特征认证的结果数据串存在服务器端。认证过程为:终端采集被认证体的生物特征并完成比对,而后将比对结果数据串发送到服务器。服务器将收到的比对结果数据串同存储在服务器端的目标比对结果数据串进行比对,完成最后的比对验证。该方法具有验证速度快,准确度高,生物特征不怕被盗且无法被盗等优点,可以有效避免现在普遍使用的集中式生物特征验证法普遍存在的两大弊端:弊端1:被检生物特征一旦被盗,被检目标就无被检物可用的弊端;弊端2:被检生物特征在线下或线上都有被盗风险,且无法规避。

Description

分布式生物特征验证法 技术领域
本发明涉及一种分布式生物特征验证的验证方法。
背景技术
验证是所有网络应用的基础。可以这样讲,没有验证就没有网络应用。以被验证标的物的不同,可将验证分为两大类别:密码验证和生物特征验证。这两种验证各有优缺点。
密码验证的优点是:1)验证标的的私密性强。2)对服务器的存储资源需求量少,验证速度快。3)一旦服务器被攻陷或密码被盗,更换密码就可修复被盗的验证标的。
密码验证的缺点是:1)密码强度同密码长短和复杂度之间相关,这就直接造成了一个密码强度同密码持有人记忆能力之间的强度悖论:短密码容易被攻陷-密码太短不行。长密码考验人的记忆力-密码太长也不行。2)在一个人持有多个应用的今天,过多的应用,又给应用使用人体出了一个更为严峻的挑战。对大多数人而言,要记住一个应用对应的一个独立的密码,是一个不可能完成的任务。对绝对多的普通人而言,密码个数太多也不行。而一个密码涵盖多个应用就成为了大多数人不得不采用的密码策略。而这种策略就又使得同一密码下的应用,无形中增加了不可控的风险。
生物特征验证的优点:不用记密码,这就基本上克服了密码验证的所有缺点。
生物特征验证的缺点:1)生物特征易泄露,无论是在线下或是线上,都有无数的泄露点。2)服务器一旦被攻陷或密码泄露,则面 临着两个致命危害,危害1:被检生物特征无法更换。危害2:攻击方用从服务器端所盗取的生物特征可以反向锁定账号所有人。3)生物特征验证法对服务器的存储资源需求量巨大,验证速度慢。
业内需要一种既保持密码验证和生物特征验证两种验证方法的优点,又可克服这两种验证缺点的验证方法。
发明内容
为克服密码验证和生物特征验证的缺点,保持密码验证和生物特征验证的优点,本发明提供了一种全新的验证方法-分布式生物特征验证法。
本发明的技术方案是将被验证目标的生物特征存储在终端侧,服务器端存储于被验证目标的生物特征相对应的验证比对结果数据串。终端在本地完成被验证目标的生物特征的采集和比对,并将比对结果数据串发送到服务器,服务器将收到的比对结果数据串同存储在服务器端的比对结果数据串进行比对,从而完成所述的分布式生物特征验证法的验证过程。
在所述的方法中,所述的生物特征包括但不限于指纹、声纹、脸图等生物特征,也可包括特定的图片、物品图像,亦或是以上生物特征同特定图片或物品的组合。所述的组合既可以是所述标的在采集时刻的同框组合,也可是所述标的在有效采集时间段内的全部或部分的分时组合。
在所述的方法中,所述的比对结果数据串由固定比对结果数据段和动态比对结果数据段组成。所述的固定比对结果数据段,其特征在 于:该数据段的数据与被检标的直接关联,一旦生成,就不会改变,除非重新生成;终端完成生物特征比对后,既上报与被检标的相关联的固定比对结果数据串。所述的动态比对结果数据段包含但不限于对比对结果的精度、相似度、比对发生的时间或地点、比对次数流水号等对于比对结果的描述性数据。
所述验证方法的优点是既汇集了密码验证和生物特征验证的所有优点,又克服了这两类验证方法的所有缺点。另外所述验证方案还具有其特有的优点。优点1:无论是在线下空间或线上空间,进行验证数据的拦截,都无法获得另外一个空间的验证数据。优点2:可以通过加长固定比对结果数据段长度的办法,设置出无比“复杂”的验证“密码”。
具体实施方式
下面结合具体实施例对本发明内容进行详细说明。
网银刷脸验证。
阶段1:被验证目标的生物特征的采集与对应的比对结果数据串的生成。
账户所有人以特定图画为背景进行一次人脸数据采集,生成两个固定比对结果数据段。固定比对结果数据段1与“人脸+特定图画”的生物特征相关联,固定比对结果数据段2与“人脸”的生物特征相关联。两个固定比对结果数据段被赋予不同的转账限额,并分别被服务器和账户所有人的手机所存储。
阶段2:验证
账户所有人进行转账操作时,用手机进行刷脸操作。手机根据获得人脸生物特征既背景,发出比对结果数据串。其中根据不同的生物特征给出固定比对结果数据段1或固定比对结果数据段2。服务器在收到手机发来的比对结果数据串后,完成相应的验证。
在本实施例中,背景的不同所设定的不同的转账限额,给银行账户所有人以额外的安全保证。账户所有人只要不泄露背景信息,则即使是银行账户所有人的同卵双生兄弟,也最多只能“盗转”低限额的账户资金。另外,如果手机不被攻陷,则即使采用当前业界普遍认为最不安全的照片式人脸识别技术,也可以抵挡任何账户所有人的任何角度拍摄的照片对最高转账限额的攻击。

Claims (6)

  1. 分布式生物特征验证法,其特征在于:被验证目标的生物特征存在终端侧,服务器端存储与目标的生物特征相对应的验证比对结果数据串;所述的验证法的验证过程为终端在本地完成被验证目标的生物特征的采集和比对,并将比对结果数据串发送到服务器,服务器将收到的比对结果数据串同存储在服务器端的比对结果数据串进行比对,从而完成所述的分布式生物特征验证法的验证过程。
  2. 根据权利要求1所述的生物特征,其特征在于:所述的生物特征包括但不限于指纹、声纹、脸图等生物特征,也可包括特定的图片、物品图像,亦或是以上生物特征同特定图片信息或物品信息的组合。
  3. 根据权利要求2所述的组合,其特征在于:所述的组合既可以是所述生物特征同某些图片或物品信息的采集时刻的同框组合,也可以是所述组合的全部或部分在有效采集时间段内的分时组合。
  4. 根据权利要求1所述的比对结果数据串,其特征在于:所述的比对结果数据串由固定比对结果数据段和动态比对结果数据段组成。
  5. 根据权利要求4所述的固定比对结果数据段,其特征在于:该数据段的数据与被检标的直接关联,一旦生成,就不会改变,除非重新生成;终端完成生物特征比对后,既上报与被检标的相关联的固定比对结果数据串。
  6. 根据权利要求4所述的动态比对结果数据段,其特征在于:所述的动态比对结果数据段包含但不限于对比对结果的精度、相似度、比对发生的时间或地点、比对次数流水号等对于比对结果的描述性数据。
PCT/CN2020/133511 2019-12-30 2020-12-03 分布式生物特征验证法 WO2021135799A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201911395214.2 2019-12-30
CN201911395214.2A CN111104661A (zh) 2019-12-30 2019-12-30 分布式生物特征验证法

Publications (1)

Publication Number Publication Date
WO2021135799A1 true WO2021135799A1 (zh) 2021-07-08

Family

ID=70425616

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/133511 WO2021135799A1 (zh) 2019-12-30 2020-12-03 分布式生物特征验证法

Country Status (2)

Country Link
CN (1) CN111104661A (zh)
WO (1) WO2021135799A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111104661A (zh) * 2019-12-30 2020-05-05 黄策 分布式生物特征验证法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101256700A (zh) * 2008-03-31 2008-09-03 浙江大学城市学院 一种混合型用户身份认证的自动取款机
US20090259588A1 (en) * 2006-04-24 2009-10-15 Jeffrey Dean Lindsay Security systems for protecting an asset
CN107292152A (zh) * 2017-05-24 2017-10-24 舒翔 一种生物特征认证系统及生物特征认证方法
CN111104661A (zh) * 2019-12-30 2020-05-05 黄策 分布式生物特征验证法

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101075874B (zh) * 2007-06-28 2010-06-02 腾讯科技(深圳)有限公司 认证方法和认证系统
CN101420301A (zh) * 2008-04-21 2009-04-29 林格灵 人脸识别身份认证系统
CN101640682B (zh) * 2009-06-04 2012-05-30 深圳市汇海科技有限公司 一种改善Web服务安全性的方法
CN103346888B (zh) * 2013-07-02 2016-08-10 山东科技大学 一种基于密码、智能卡和生物特征的远程身份认证方法
CN108090339A (zh) * 2017-12-28 2018-05-29 上海闻泰电子科技有限公司 基于人脸识别的解锁装置、方法及电子设备
CN110213725A (zh) * 2019-05-30 2019-09-06 刘雪琼 一种基于生物特征识别的紧急呼救方法、系统和设备

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090259588A1 (en) * 2006-04-24 2009-10-15 Jeffrey Dean Lindsay Security systems for protecting an asset
CN101256700A (zh) * 2008-03-31 2008-09-03 浙江大学城市学院 一种混合型用户身份认证的自动取款机
CN107292152A (zh) * 2017-05-24 2017-10-24 舒翔 一种生物特征认证系统及生物特征认证方法
CN111104661A (zh) * 2019-12-30 2020-05-05 黄策 分布式生物特征验证法

Also Published As

Publication number Publication date
CN111104661A (zh) 2020-05-05

Similar Documents

Publication Publication Date Title
EP3196801B1 (en) Face recognition method, device and computer readable storage medium
CN101310286B (zh) 改进的单点登录
Lewis et al. Real time motion-based authentication for smartwatch
US20210089635A1 (en) Biometric identity verification and protection software solution
CN109802942B (zh) 一种隐私保护的声纹认证方法
CN107895155A (zh) 一种人脸识别方法及装置
JP2009544092A (ja) ハイブリッドバイオメトリックシステム
WO2021047482A1 (en) Method and system for performing steganographic technique
US20180232569A1 (en) System and method for in motion identification
US20200019968A1 (en) System and method for authenticating transactions from a mobile device
US20210294880A1 (en) System and Method for Confirming a Person's Identity
US11269983B2 (en) Thermally enriched multi-modal and multi-channel biometric authentication
WO2021135799A1 (zh) 分布式生物特征验证法
CN104486306B (zh) 基于指静脉识别和云服务进行身份认证的方法
Jain et al. Dynamic handwritten signature and machine learning based identity verification for keyless cryptocurrency transactions
Biswas et al. Password security system with 2-way authentication
US10157328B2 (en) Method and device for authentification of a user
Venugopal et al. A robust and secure authentication mechanism in online banking
WO2007030977A1 (fr) Procede de cryptage et identification d'image a empreintes digitales dans un systeme d'identification d'empreintes digitales
US20170293409A1 (en) Biometric shortcuts
US20170293410A1 (en) Biometric state switching
CN110956468A (zh) 一种指纹支付系统
EP4147415A1 (en) Access authentication using obfuscated biometrics
JP7434291B2 (ja) 非特定化されたデータに基づいてアイデンティティ認証を実行するためのシステムおよび方法
Plata et al. How to save your face: a facial recognition method robust against image reconstruction

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20909238

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20909238

Country of ref document: EP

Kind code of ref document: A1