CN104065487A - Random secret value IBC identity authentication method based on digital fingerprint - Google Patents

Random secret value IBC identity authentication method based on digital fingerprint Download PDF

Info

Publication number
CN104065487A
CN104065487A CN201410322752.XA CN201410322752A CN104065487A CN 104065487 A CN104065487 A CN 104065487A CN 201410322752 A CN201410322752 A CN 201410322752A CN 104065487 A CN104065487 A CN 104065487A
Authority
CN
China
Prior art keywords
user
identity
server
print
fingerprint characteristic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410322752.XA
Other languages
Chinese (zh)
Inventor
刘桂雄
余长庚
徐静
洪晓斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
South China University of Technology SCUT
Original Assignee
South China University of Technology SCUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by South China University of Technology SCUT filed Critical South China University of Technology SCUT
Priority to CN201410322752.XA priority Critical patent/CN104065487A/en
Publication of CN104065487A publication Critical patent/CN104065487A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses a random secret value IBC identity authentication method based on a digital fingerprint. The random secret value IBC identity authentication method based on the digital fingerprint comprises the steps that (1) a user private key is jointly generated according to a user ID, a password PW and a system main secret key generated by a PKG server, digital fingerprint information of the user is encrypted, and user identity mark information is generated; (2) the PKG server generates a user identity credential according to the user ID, the password PW, a fingerprint feature ciphertext and a user identity credential time limit and sends and stores the user identity credential to a user authentication server; (3) the user authentication server deduces the authenticity of the user identity mark information according to stored user identity credential information and a fingerprint feature threshold value. The random secret value IBC identity authentication method based on the digital fingerprint has good authentication, privacy and non-repudiation performance, and is suitable for identity authentication among entities in a monitoring system.

Description

A kind of based on digital finger-print with secret value IBC identity identifying method
Technical field
The present invention relates to a kind of authentication method, particularly a kind of based on digital finger-print the method with secret value IBC authentication, belong to information system security and digital finger-print recognition technology field.
Background technology
Along with computer technology, the network communications technology are in the application of supervisory control system, make different geographical equipment or environmental monitoring become very convenient, user whenever and wherever possible login system conveniently checks various information.When information-based, networking brings advantage to the user, the threats such as network attack, information are distorted, viral wooden horse have been caused also to system confidence level and have a strong impact on.
It is credible that network illegal invasion and identity personation have influence on subject identity in system platform, and authentication is exactly the discriminating service by its identity attribute of the side of being verified being produced to relevant identify label, to determine its identity legitimacy.
Existing identity identifying technology relies on many factors, as the information aggregate A known to user 1={ password A 11, password A 12..., user gathers around anything set A 2={ token A 21, smart card A 22..., user's biological characteristic set A 3={ fingerprint A 31, iris A 32... etc., these certified sides' security factor set A S={A 1, A 2, A 3produce its evidence of identity, relatively obtain authentication result with authenticating party evidence of identity desired value.From identification authentication security and feature: (1) is based on information aggregate A 1auth method is easy to be easy-to-use, but password has generally acknowledged weak link, easily has leakage, danger is stolen; (2) the information aggregate A known to user 1gather around anything set A with user 2composition is based on two-factor authentication method, and the method can fundamentally be improved information authentication secret mode because the potential safety hazard causing revealed in password, and password (or its digest value) is ravesdropping and the Replay Attack that causes in Internet Transmission; (3) based on biometric identity authentication techniques, due to biological characteristic have generality, uniqueness and not reproducible, lose and forget; Have reliability high, application facilitates feature.In addition, existing based on a shortcoming of biometric identity authentication techniques existence, storage biometric templates information easily causes leakage, and feature templates is safely safe biologic tag system key issue.
Summary of the invention
The present invention is directed to biometric templates safety problem, combining with biological characteristic authentication techniques and conventional cipher learn a skill, propose a kind of have good authentication property, privacy and non repudiation based on digital finger-print with secret value IBC identity identifying method.
The present invention is achieved through the following technical solutions with secret value IBC identity identifying method based on digital finger-print:
A kind of based on digital finger-print with secret value IBC identity identifying method, 1), the system master key that produces with user ID, password PW, PKG server generates private key for user jointly concrete steps comprise:, meanwhile, PKG server carries out digital signature to private key for user; 2), gather number finger print information and be encrypted, generation User Identity information; 3), PKG server generates user identity voucher according to user ID, password PW, User Identity information, user identity voucher time limit and digital signature, send and be saved in subscriber authentication server, simultaneously, subscriber authentication server will be registered parameter read-in in user USBKey, and registration completes; 4) gather and need authenticated user digital finger-print characteristic vector, form ciphertext and send to subscriber authentication server after encrypting, subscriber authentication server carries out merging close value and calculating at random according to randomizer, and sends to and need authenticated user; 5), need authenticated user user private key to the deciphering of the close value of random fusion, decrypted result is recycled to subscriber authentication server, and then infers User Identity information authenticity, authentication process completes.
Described step 1) specifically comprise:
1.1), the initialization of PKG server, structure meets Diffie-Hellman hypothesis elliptic curve E p, choose elliptic curve E pupper rank are the basic point G of n, make user ID meet mapping function: F iD: { 0,1} m→ E p, produce large prime number k mas PKG system master key, then obtain PKG PKI P m=k mg.
1.2), PKG server by utilizing system master key k m, PKG PKI P m, user provides ID, password value PW, produces private key for user k u, k umeet ID||PW=U iD=k ug.
1.3), PKG server uses digital signature function Sig (k m, k u) to private key for user ku digital signature S u={ k u, Sig (k m, k u), user receives private key for user digital signature S uafter, use digital signature authentication function Ver (P m, S u) whether authentication of users private key mate with digital signature, determines private key for user k ulegitimacy.
Described step 2) specifically comprise:
2.1), gather user fingerprints, extraction user fingerprints characteristic vector group W i: { W 1, W 2, W 3..., generate fingerprint characteristic threshold tau according to user fingerprints characteristic vector.
2.2), user uses RSA cryptographic algorithms to fingerprint vector group vector W iencryption obtains the fingerprint characteristic ciphertext E (W as template i)=E (U iD, W i), fingerprint characteristic ciphertext E (W i) and fingerprint characteristic threshold tau formation authentication User Identity information.
Described step 3) specifically comprise: PKG server by utilizing user ID, password PW, fingerprint characteristic ciphertext E (W i), fingerprint characteristic threshold tau, user identity voucher time limit T and digital signature Sig (k m, τ || T||E (W i)) generation user identity voucher C u:
C u={U ID,PW,E(W i),τ,Sig(k m,τ||T||E(W i))}
Meanwhile, subscriber authentication server uses digital signature authentication function Ver (P m, C u), identifying user identity voucher C ulegitimacy, and by user ID, password PW, user fingerprints feature ciphertext E (W i), fingerprint characteristic threshold tau and identity documents time limit T be stored in identity documents database, PKG server notification user registration success, and will register parameter { k u, G, Ver (P m, C u) write access customer USBKey.
Described step 4) specifically comprise:
4.1), utilize fingerprint acquisition instrument collection to need authenticated user fingerprint, and extract digital finger-print feature vector, X u: { x 1, x 2..., x n, user's PKI U iDto X uuse RSA Algorithm is encrypted, fingerprint characteristic vector ciphertext E (x i)=E (U iD, x i), by fingerprint characteristic vector ciphertext E (x i) be sent to subscriber authentication server.
4.2), subscriber authentication server randomizer produces k random number ρ j, a kn random number r ji, and ρ j, r jimeet constraints:
4.3), use RSA Algorithm to random number r jiencryption obtains the close value E (r of random number ji)=E (U iD, r ji).
4.4), the close value of the fingerprint characteristic of subscriber authentication server using user as template E (W i), fingerprint characteristic vector ciphertext E (x i) and the close value of random number E (r ji) calculate and merge at random close value E (W ix ir ji)=E (W i) E (x i) E (r ji), and will merge at random close value E (W ix ir ji) send to and need authenticated user.
Described step 5) specifically comprise:
5.1), need authenticated user user private key k uto the close value of random fusion E (W ix ir ji) deciphering, obtain randomization fingerprint characteristic W ix ir ji; Calculate randomization fingerprint characteristic vector sum and by R jbe sent to subscriber authentication server.
5.2), subscriber authentication server is according to R jcalculate and need authenticated user fingerprint characteristic validation value R to be:
R = Σ j = 1 k ρ j · R j = Σ j = 1 k ρ j Σ i = 1 n W i x i r ji = Σ i = 1 n Σ j = 1 k ρ j W i r ji = Σ i = 1 n W i x i Σ j = 1 k ρ j r ji = Σ i = 1 n W i x i
If R > is τ, authenticating user identification passes through; If R < is τ, authenticating user identification failure, and authentication result is returned and needed authenticated user.
Compared with prior art, beneficial effect of the present invention comprises:
1, conventional cipher and biometrics identification technology are combined with secret value IBC identity identifying method based on digital finger-print, for verification process provides good authentication property, privacy and non repudiation, be widely used in the authentication of each inter-entity in supervisory control system.
2, by User Identity Information generation identity documents and with secret value decision method, make system needn't directly store user fingerprints characteristic information, can not obtain user fingerprints characteristic information even if assailant can enter database, realize the highly confidential property of digital finger-print template.
3, directly do not utilize fingerprint as unique authentication information, user is without providing fingerprint template to server.
4, the authentication method information of certificate server, to user transparent, makes system in enjoying the good authentication property of biological characteristic, has ensured user fingerprints template and certificate server resource privacy.
Brief description of the drawings
Accompanying drawing is used to provide a further understanding of the present invention, and forms a part for specification,, does not form the present invention is limited jointly for explaining the present invention with embodiments of the invention.Wherein:
Fig. 1 be in the method for the invention based on digital finger-print the structural representation block diagram with secret value IBC authentication user registration course;
Fig. 2 is the structural representation block diagram that shows process in the method for the invention based on digital finger-print with secret value IBC authentication subscriber authentication.
Embodiment
Of the present invention is to carry out authentication based on fingerprint characteristic vector sum with secret value analytic method based on digital finger-print with secret value IBC identity identifying method, and its process is divided into two parts: user's registration and subscriber authentication.
Comprise with secret value IBC authentication user registration course based on digital finger-print: the system master key 1, producing with user ID, password PW, PKG server generates private key for user jointly, and meanwhile, PKG server carries out digital signature to private key for user; 2), gather number finger print information and be encrypted, generation User Identity information; 3), PKG server generates user identity voucher according to user ID, password PW, User Identity information, user identity voucher time limit and digital signature, send and be saved in subscriber authentication server, simultaneously, subscriber authentication server will be registered parameter read-in in user USBKey, and registration completes.
Specifically comprise with secret value IBC authentication subscriber authentication process based on digital finger-print: 1) gather and need authenticated user digital finger-print characteristic vector, after encrypting, form ciphertext and send to subscriber authentication server, subscriber authentication server carries out random merge close value and calculating according to randomizer, and sends to and need authenticated user; 2), need authenticated user user private key to the deciphering of the close value of random fusion, decrypted result is recycled to subscriber authentication server, and then infers User Identity information authenticity, authentication process completes.
Below in conjunction with accompanying drawing 1 to being described in further detail with secret value IBC authentication user registration course based on digital finger-print:
Step 1, the initialization of PKG server, structure meets Diffie-Hellman hypothesis elliptic curve E p, choose elliptic curve E pupper rank are the basic point G of n, make user ID meet mapping function: F iD: { 0,1} m→ E p, produce large prime number k mas PKG system master key, then obtain PKG PKI P m=k mg.
Step 2, PKG server by utilizing system master key k m, PKG PKI P m, user provides ID, password value PW, produces private key for user k u, k umeet ID||PW=U iD=k ug.
Step 3, PKG server use digital signature function Sig (k m, k u) to private key for user ku digital signature S u={ k u, Sig (k m, k u), to improve k utransmission security; When user receives private key for user digital signature S uafter, use digital signature authentication function Ver (P m, S u) whether authentication of users private key mate with digital signature, thereby determine private key for user k ulegitimacy.
Step 4, collection user fingerprints, extract user fingerprints characteristic vector group W i: { W 1, W 2, W 3..., generate fingerprint characteristic threshold tau according to user fingerprints characteristic vector.
Step 5, user use RSA cryptographic algorithms to fingerprint vector group vector W iencryption obtains the fingerprint characteristic ciphertext E (W as template i)=E (U iD, W i), fingerprint characteristic ciphertext E (W i) and fingerprint characteristic threshold tau formation authentication User Identity information.
Step 6, PKG server by utilizing user ID, password PW, fingerprint characteristic ciphertext E (W i), fingerprint characteristic threshold tau, user identity voucher time limit T and digital signature Sig (k m, τ || T||E (W i)) generation user identity voucher C u:
C u={U ID,PW,E(W i),τ,Sig(k m,τ||T||E(W i))}
Meanwhile, subscriber authentication server uses digital signature authentication function Ver (P m, C u), identifying user identity voucher C ulegitimacy, and by user ID, password PW, user fingerprints feature ciphertext E (W i), fingerprint characteristic threshold tau and identity documents time limit T be stored in identity documents database, PKG server notification user registration success, and will register parameter { k u, G, Ver (P m, C u) write access customer USBKey.
Below in conjunction with accompanying drawing 2 to being described in further detail with secret value IBC authentication subscriber authentication process based on digital finger-print:
Step 1, utilize fingerprint acquisition instrument collection to need authenticated user fingerprint, and extract digital finger-print feature vector, X u: { x 1, x 2..., x n, user's PKI U iDto X uuse RSA Algorithm is encrypted, fingerprint characteristic vector ciphertext E (x i)=E (U iD, x i), by fingerprint characteristic vector ciphertext E (x i) be sent to subscriber authentication server.
Step 2, subscriber authentication server randomizer produce k random number ρ j, a kn random number r ji, and ρ j, r jimeet constraints:
Step 3, use RSA Algorithm are to random number r jiencryption obtains the close value E (r of random number ji)=E (U iD, r ji).
Step 4, the close value of the fingerprint characteristic of subscriber authentication server using user as template E (W i), fingerprint characteristic vector ciphertext E (x i) and the close value of random number E (r ji) calculate and merge at random close value E (W ix ir ji)=E (W i) E (x i) E (r ji), and will merge at random close value E (W ix ir ji) send to and need authenticated user.
Step 5, need authenticated user user private key ku to the close value E (W of random fusion ix ir ji) deciphering, obtain randomization fingerprint characteristic W ix ir ji; Calculate randomization fingerprint characteristic vector sum and by R jbe sent to subscriber authentication server.
Step 6, subscriber authentication server are according to R jcalculate and need authenticated user fingerprint characteristic validation value R to be:
R = &Sigma; j = 1 k &rho; j &CenterDot; R j = &Sigma; j = 1 k &rho; j &Sigma; i = 1 n W i x i r ji = &Sigma; i = 1 n &Sigma; j = 1 k &rho; j W i r ji = &Sigma; i = 1 n W i x i &Sigma; j = 1 k &rho; j r ji = &Sigma; i = 1 n W i x i
If R > is τ, authenticating user identification passes through; If R < is τ, authenticating user identification failure, and authentication result is returned and needed authenticated user.
Of the present inventionly be not limited in the description in specification and embodiment based on digital finger-print with secret value IBC identity identifying method.Within the spirit and principles in the present invention all, any amendment of making, equal replacement, improvement etc., within being all included in claim scope of the present invention.

Claims (6)

  1. Based on digital finger-print with a secret value IBC identity identifying method, it is characterized in that, concrete steps comprise:
    One, register with secret value IBC authentication user based on digital finger-print
    1), the system master key that produces with user ID, password PW, PKG server generates private key for user jointly, meanwhile, PKG server carries out digital signature to private key for user;
    2), gather number finger print information and be encrypted, generation User Identity information;
    3), PKG server generates user identity voucher according to user ID, password PW, User Identity information, user identity voucher time limit and digital signature, send and be saved in subscriber authentication server, simultaneously, subscriber authentication server will be registered parameter read-in in user USBKey, and registration completes;
    Two, based on digital finger-print with secret value IBC authentication subscriber authentication
    4) gather and need authenticated user digital finger-print characteristic vector, form ciphertext and send to subscriber authentication server after encrypting, subscriber authentication server carries out merging close value and calculating at random according to randomizer, and sends to and need authenticated user;
    5), need authenticated user user private key to the deciphering of the close value of random fusion, decrypted result is recycled to subscriber authentication server, and then infers User Identity information authenticity, authentication process completes.
  2. According to claim 1 based on digital finger-print with secret value IBC identity identifying method, it is characterized in that described step 1) specifically comprise:
    1.1), the initialization of PKG server, structure meets Diffie-Hellman hypothesis elliptic curve E p, choose elliptic curve E pupper rank are the basic point G of n, make user ID meet mapping function: F iD: { 0,1} m→ E p, produce large prime number k mas PKG system master key, then obtain PKG PKI P m=k mg;
    1.2), PKG server by utilizing system master key k m, PKG PKI P m, user provides ID, password value PW, produces private key for user k u, k umeet ID||PW=U iD=k ug;
    1.3), PKG server uses digital signature function Sig (k m, k u) to private key for user ku digital signature S u={ k u, Sig (k m, k u), user receives private key for user digital signature S uafter, use digital signature authentication function Ver (P m, S u) whether authentication of users private key mate with digital signature, determines private key for user k ulegitimacy.
  3. According to claim 1 based on digital finger-print with secret value IBC identity identifying method, it is characterized in that described step 2) specifically comprise:
    2.1), gather user fingerprints, extraction user fingerprints characteristic vector group W i: { W 1, W 2, W 3..., generate fingerprint characteristic threshold tau according to user fingerprints characteristic vector;
    2.2), user uses RSA cryptographic algorithms to fingerprint vector group vector W iencryption obtains the fingerprint characteristic ciphertext E (W as template i)=E (U iD, W i), fingerprint characteristic ciphertext E (W i) and fingerprint characteristic threshold tau formation authentication User Identity information.
  4. According to claim 1 based on digital finger-print with secret value IBC identity identifying method, it is characterized in that described step 3) specifically comprise:
    PKG server by utilizing user ID, password PW, fingerprint characteristic ciphertext E (W i), fingerprint characteristic threshold tau, user identity voucher time limit T and digital signature Sig (k m, τ || T||E (W i)) generation user identity voucher C u:
    C u={U ID,PW,E(W i),τ,Sig(k m,τ||T||E(W i))}
    Meanwhile, subscriber authentication server uses digital signature authentication function Ver (P m, C u), identifying user identity voucher C ulegitimacy, and by user ID, password PW, user fingerprints feature ciphertext E (W i), fingerprint characteristic threshold tau and identity documents time limit T be stored in identity documents database, PKG server notification user registration success, and will register parameter { k u, G, Ver (P m, C u) write access customer USBKey.
  5. According to claim 1 based on digital finger-print with secret value IBC identity identifying method, it is characterized in that described step 4) specifically comprise:
    4.1), utilize fingerprint acquisition instrument collection to need authenticated user fingerprint, and extract digital finger-print feature vector, X u: { x 1, x 2..., x n, user's PKI U iDto X uuse RSA Algorithm is encrypted, fingerprint characteristic vector ciphertext E (x i)=E (U iD, x i), by fingerprint characteristic vector ciphertext E (x i) be sent to subscriber authentication server;
    4.2), subscriber authentication server randomizer produces k random number ρ j, a kn random number r ji, and ρ j, r jimeet constraints:
    4.3), use RSA Algorithm to random number r jiencryption obtains the close value E (r of random number ji)=E (U iD, r ji);
    4.4), the close value of the fingerprint characteristic of subscriber authentication server using user as template E (W i), fingerprint characteristic vector ciphertext E (x i) and the close value of random number E (r ji) calculate and merge at random close value E (W ix ir ji)=E (W i) E (x i) E (r ji), and will merge at random close value E (W ix ir ji) send to and need authenticated user.
  6. According to claim 1 based on digital finger-print with secret value IBC identity identifying method, it is characterized in that described step 5) specifically comprise:
    5.1), need authenticated user user private key k uto the close value of random fusion E (W ix ir ji) deciphering, obtain randomization fingerprint characteristic W ix ir ji; Calculate randomization fingerprint characteristic vector sum and by R jbe sent to subscriber authentication server;
    5.2), subscriber authentication server is according to R jcalculate and need authenticated user fingerprint characteristic validation value R to be:
    R = &Sigma; j = 1 k &rho; j &CenterDot; R j = &Sigma; j = 1 k &rho; j &Sigma; i = 1 n W i x i r ji = &Sigma; i = 1 n &Sigma; j = 1 k &rho; j W i r ji = &Sigma; i = 1 n W i x i &Sigma; j = 1 k &rho; j r ji = &Sigma; i = 1 n W i x i
    If R > is τ, authenticating user identification passes through; If R < is τ, authenticating user identification failure, and authentication result is returned and needed authenticated user.
CN201410322752.XA 2014-07-08 2014-07-08 Random secret value IBC identity authentication method based on digital fingerprint Pending CN104065487A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410322752.XA CN104065487A (en) 2014-07-08 2014-07-08 Random secret value IBC identity authentication method based on digital fingerprint

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410322752.XA CN104065487A (en) 2014-07-08 2014-07-08 Random secret value IBC identity authentication method based on digital fingerprint

Publications (1)

Publication Number Publication Date
CN104065487A true CN104065487A (en) 2014-09-24

Family

ID=51553031

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410322752.XA Pending CN104065487A (en) 2014-07-08 2014-07-08 Random secret value IBC identity authentication method based on digital fingerprint

Country Status (1)

Country Link
CN (1) CN104065487A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105743853A (en) * 2014-12-09 2016-07-06 航天信息股份有限公司 Fingerprint USB KEY and fingerprint center server for identity authentication, and system and method
CN105897429A (en) * 2016-06-06 2016-08-24 宇龙计算机通信科技(深圳)有限公司 Authentication method, authentication device and terminal
CN106789096A (en) * 2017-03-30 2017-05-31 山东超越数控电子有限公司 A kind of biological characteristic cipher authentication method and device
CN107046524A (en) * 2016-11-29 2017-08-15 深圳智乐信息科技有限公司 It is a kind of based on ultrasonic wave use intelligent entrance guard method and system
CN107733933A (en) * 2017-11-30 2018-02-23 中国电力科学研究院有限公司 A kind of double factor identity authentication method and system based on biological identification technology
CN107819587A (en) * 2017-12-13 2018-03-20 陈智罡 Authentication method and user equipment and certificate server based on full homomorphic cryptography
CN109660512A (en) * 2018-11-12 2019-04-19 全球能源互联网研究院有限公司 A kind of sensitive information flows to vectorization method, abnormal flows to recognition methods and device
CN110084224A (en) * 2019-05-08 2019-08-02 电子科技大学 Finger print safety Verification System and method on a kind of cloud
CN111131153A (en) * 2019-11-18 2020-05-08 西安电子科技大学 Biological identity information authentication method based on 5G cloud and mist mixed unified authentication platform
CN111355921A (en) * 2020-04-13 2020-06-30 随锐科技集团股份有限公司 Video conference encryption method and system
CN111859435A (en) * 2020-07-29 2020-10-30 北京千丁互联科技有限公司 Data security processing method and device
CN113704728A (en) * 2021-07-19 2021-11-26 桂林电子科技大学 Fingerprint authentication method based on D-H key exchange and key sharing

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6490680B1 (en) * 1997-12-04 2002-12-03 Tecsec Incorporated Access control and authorization system
GB2452116A (en) * 2007-07-05 2009-02-25 Honeywell Int Inc A unique user identify created from a biometric value
CN101661599A (en) * 2009-09-25 2010-03-03 浙江维尔生物识别技术股份有限公司 Method for authenticating validity of self-contained software of equipment system
CN103607282A (en) * 2013-11-22 2014-02-26 成都卫士通信息产业股份有限公司 Identity fusion authentication method based on biological characteristics

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6490680B1 (en) * 1997-12-04 2002-12-03 Tecsec Incorporated Access control and authorization system
GB2452116A (en) * 2007-07-05 2009-02-25 Honeywell Int Inc A unique user identify created from a biometric value
CN101661599A (en) * 2009-09-25 2010-03-03 浙江维尔生物识别技术股份有限公司 Method for authenticating validity of self-contained software of equipment system
CN103607282A (en) * 2013-11-22 2014-02-26 成都卫士通信息产业股份有限公司 Identity fusion authentication method based on biological characteristics

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
CHANGGENG YU: "Authentication Methods Based on Digital Fingerprint Random Encryption IBC", 《JOURNAL OF SOFTWARE》 *

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105743853A (en) * 2014-12-09 2016-07-06 航天信息股份有限公司 Fingerprint USB KEY and fingerprint center server for identity authentication, and system and method
CN105897429A (en) * 2016-06-06 2016-08-24 宇龙计算机通信科技(深圳)有限公司 Authentication method, authentication device and terminal
CN105897429B (en) * 2016-06-06 2019-05-14 宇龙计算机通信科技(深圳)有限公司 Method for authenticating, authentication device and terminal
CN107046524A (en) * 2016-11-29 2017-08-15 深圳智乐信息科技有限公司 It is a kind of based on ultrasonic wave use intelligent entrance guard method and system
CN106789096A (en) * 2017-03-30 2017-05-31 山东超越数控电子有限公司 A kind of biological characteristic cipher authentication method and device
CN107733933A (en) * 2017-11-30 2018-02-23 中国电力科学研究院有限公司 A kind of double factor identity authentication method and system based on biological identification technology
CN107733933B (en) * 2017-11-30 2021-08-17 中国电力科学研究院有限公司 Method and system for double-factor identity authentication based on biological recognition technology
CN107819587B (en) * 2017-12-13 2020-08-11 陈智罡 Authentication method based on fully homomorphic encryption, user equipment and authentication server
CN107819587A (en) * 2017-12-13 2018-03-20 陈智罡 Authentication method and user equipment and certificate server based on full homomorphic cryptography
CN109660512A (en) * 2018-11-12 2019-04-19 全球能源互联网研究院有限公司 A kind of sensitive information flows to vectorization method, abnormal flows to recognition methods and device
CN109660512B (en) * 2018-11-12 2021-06-22 全球能源互联网研究院有限公司 Sensitive information flow direction vectorization method, abnormal flow direction identification method and device
CN110084224A (en) * 2019-05-08 2019-08-02 电子科技大学 Finger print safety Verification System and method on a kind of cloud
CN111131153A (en) * 2019-11-18 2020-05-08 西安电子科技大学 Biological identity information authentication method based on 5G cloud and mist mixed unified authentication platform
CN111131153B (en) * 2019-11-18 2021-11-23 西安电子科技大学 Biological identity information authentication method based on 5G cloud and mist mixed unified authentication platform
CN111355921A (en) * 2020-04-13 2020-06-30 随锐科技集团股份有限公司 Video conference encryption method and system
CN111859435A (en) * 2020-07-29 2020-10-30 北京千丁互联科技有限公司 Data security processing method and device
CN111859435B (en) * 2020-07-29 2023-06-23 北京千丁互联科技有限公司 Data security processing method and device
CN113704728A (en) * 2021-07-19 2021-11-26 桂林电子科技大学 Fingerprint authentication method based on D-H key exchange and key sharing
CN113704728B (en) * 2021-07-19 2024-03-01 桂林电子科技大学 Fingerprint authentication method based on D-H key exchange and key sharing

Similar Documents

Publication Publication Date Title
CN104065487A (en) Random secret value IBC identity authentication method based on digital fingerprint
US20200396076A1 (en) Public/Private Key Biometric Authentication System
CN103124269B (en) Based on the Bidirectional identity authentication method of dynamic password and biological characteristic under cloud environment
JP6973385B2 (en) Authentication system, authentication method and program
US20140019766A1 (en) Signature Generation and Verification System and Signature Verification Apparatus
Li et al. Fuzzy extractors for biometric identification
CN106878318A (en) A kind of block chain real time polling cloud system
CN101420301A (en) Human face recognizing identity authentication system
CN103368954B (en) A kind of smart card registration entry based on password and biological characteristic
CN103701787A (en) User name password authentication method implemented on basis of public key algorithm
CN103780393A (en) Virtual-desktop security certification system and method facing multiple security levels
CN106936775A (en) A kind of authentication method and system based on fingerprint recognition
US20190007218A1 (en) Second dynamic authentication of an electronic signature using a secure hardware module
US7739500B2 (en) Method and system for consistent recognition of ongoing digital relationships
Bringer et al. An application of the Boneh and Shacham group signature scheme to biometric authentication
CN104618113A (en) Method for authenticating identity of mobile terminal and constructing safety channel
CN106953731A (en) The authentication method and system of a kind of terminal management person
CN110224810A (en) A kind of method for anti-counterfeit of two dimensional code
KR101468192B1 (en) Secure User Authentication Scheme Based on Facial Recognition for Smartwork Environment
CN101567033A (en) Biological authentication method for resisting privacy disclosure
Cavoukian et al. Keynote paper: Biometric encryption: Technology for strong authentication, security and privacy
CN102413148B (en) Biological characteristic remote authentication method based on visual codes
Om et al. A password authentication method for remote users based on smart card and biometrics
Deswarte et al. A Proposal for a Privacy-preserving National Identity Card.
Barman et al. An approach to cryptographic key exchange using fingerprint

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20140924

RJ01 Rejection of invention patent application after publication