CN110391908A - A kind of identity identifying method and system based on biological identification - Google Patents
A kind of identity identifying method and system based on biological identification Download PDFInfo
- Publication number
- CN110391908A CN110391908A CN201810360737.2A CN201810360737A CN110391908A CN 110391908 A CN110391908 A CN 110391908A CN 201810360737 A CN201810360737 A CN 201810360737A CN 110391908 A CN110391908 A CN 110391908A
- Authority
- CN
- China
- Prior art keywords
- user
- verified
- ciphertext
- registration
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 33
- 238000013475 authorization Methods 0.000 claims description 6
- 238000000605 extraction Methods 0.000 claims description 3
- 239000000284 extract Substances 0.000 claims description 2
- 230000008569 process Effects 0.000 claims description 2
- 238000000151 deposition Methods 0.000 claims 1
- 230000001010 compromised effect Effects 0.000 description 3
- 210000003462 vein Anatomy 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000003672 processing method Methods 0.000 description 2
- OTZZZISTDGMMMX-UHFFFAOYSA-N 2-(3,5-dimethylpyrazol-1-yl)-n,n-bis[2-(3,5-dimethylpyrazol-1-yl)ethyl]ethanamine Chemical compound N1=C(C)C=C(C)N1CCN(CCN1C(=CC(C)=N1)C)CCN1C(C)=CC(C)=N1 OTZZZISTDGMMMX-UHFFFAOYSA-N 0.000 description 1
- 241000962514 Alosa chrysochloris Species 0.000 description 1
- 241001441724 Tetraodontidae Species 0.000 description 1
- 210000004556 brain Anatomy 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000012850 discrimination method Methods 0.000 description 1
- 230000005021 gait Effects 0.000 description 1
- 210000003786 sclera Anatomy 0.000 description 1
- 230000001755 vocal effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention discloses a kind of identity identifying methods based on biological identification, it is related to technical field of biometric identification, comprising steps of in user's registration, the biological information for acquiring user, generates corresponding biological identification, generates encryption key according to biological identification, preset plaintext is encrypted, registration ciphertext is obtained, the identity information of user and the linked list of registration ciphertext one-to-one relationship is established, stores into ciphertext database;When user to be verified carries out authentication, biological information is acquired, corresponding biological identification is generated, encryption key is generated according to the biological identification of user to be verified, plaintext when to registration encrypts, and obtains certification ciphertext;Registration ciphertext in the certification ciphertext and ciphertext database of user to be verified is compared, according to whether in the presence of with certification the consistent registration ciphertext of ciphertext, judge whether the authentication of user to be verified passes through.Identity identifying method based on biological identification of the invention, more securely and reliably.
Description
Technical field
The present invention relates to technical field of biometric identification, and in particular to a kind of identity identifying method based on biological identification and is
System.
Background technique
Currently, traditional biometric discrimination method acquires the biological information of user, such as fingerprint, people in registration link
Face, iris refer to vein etc., and the characteristic sequence of user biological characteristic information is extracted using specific algorithm, as biological template
Characteristic sequence, storage in systems, are used for user identity authentication.
In certification link, the corresponding biological information of acquisition user, such as fingerprint, face, iris, refer to vein, and
The characteristic sequence that sample is extracted using algorithm same as registration link, by the template characteristic sequence in sample characteristics sequence and system
Column are compared, and obtain the result of authentication.Therefore, traditional bio-identification identity identifying technology needs in advance by user's
Template characteristic sequence stores in systems, for the use of subsequent certification link.
However, no matter user template characteristic sequence is stored in background server, it is still stored in terminal device, is all suffered from
The risk of user biological characteristic sequence leakage, the template characteristic sequence of user may be stolen, and be illegally used, to make
At the immeasurable consequence such as privacy compromise, property loss, security threat.
Summary of the invention
In view of the deficiencies in the prior art, the purpose of the present invention is to provide a kind of identity based on biological identification to recognize
Card method, this method is more safe and reliable, can thoroughly prevent the leakage of user biological characteristic sequence.
To achieve the above objectives, the technical solution adopted by the present invention is that:
A kind of identity identifying method based on biological identification, comprising steps of
S1: in user's registration, obtaining the identity information of user, acquires the biological information of user, generates corresponding
Biological identification, and encryption key is generated according to the biological identification, preset plaintext is encrypted using the encryption key,
The registration ciphertext of user is obtained, and establishes the identity information of user and the linked list of registration ciphertext one-to-one relationship, and deposit
It stores up in ciphertext database;
S2: when user to be verified carries out authentication, the biological information of user to be verified is acquired, is generated to be verified
The biological identification of user, and it is to be verified using being generated with method identical when registering according to the biological identification of the user to be verified
The encryption key of user, plaintext when using the encryption key of user to be verified to registration encrypt, and obtain user to be verified
Certification ciphertext;
S3: the registration ciphertext in the certification ciphertext and the ciphertext database of user to be verified is compared, according to being
It is no to exist and authenticate the consistent registration ciphertext of ciphertext, judge whether the authentication of user to be verified passes through.
Based on the above technical solution, the specific steps of above-mentioned steps S3 include:
Judge whether to obtain the identity information of user to be verified;
If not obtaining the identity information of user to be verified, by the certification ciphertext of user to be verified and the ciphertext database
In all registration ciphertexts be compared, if it exists with the certification consistent registration ciphertext of ciphertext, the then identity of the user to be verified
Certification passes through, and subscriber identity information corresponding with successfully registration ciphertext is compared is use to be verified in the linked list
The identity information at family;If it does not exist with the certification consistent registration ciphertext of ciphertext, then the authentication of the user to be verified does not pass through;
If obtaining the identity information of user to be verified, search whether that there are users to be verified in the ciphertext database
Identity information, if it does not exist, then the authentication of the user to be verified does not pass through;If it exists, then the use to be verified is extracted
The corresponding registration ciphertext of the identity information at family, and compared using the registration ciphertext of extraction and the certification ciphertext of user to be verified
Right, if comparison result is consistent, the authentication of the user to be verified passes through, if comparison result is inconsistent, the use to be verified
The authentication at family does not pass through.
Based on the above technical solution, the detailed process of encryption key is generated in step S1 according to the biological identification
Are as follows: it is close to generate corresponding encryption using pseudorandom number generator using the biological identification as the seed of pseudorandom number generator
Key.
Based on the above technical solution, encryption is carried out to preset plaintext using the encryption key in step S1 to adopt
Algorithm is symmetric encipherment algorithm or hash function.
Based on the above technical solution, the biological information for acquiring user generates the side of corresponding biological identification
Method are as follows: the characteristic sequence for extracting the biological information is handled the characteristic sequence using special algorithm, generation pair
The biological identification answered.
Based on the above technical solution, the special algorithm is Fuzzy extractor, fuzzy safety box or fuzzy promise
Algorithm.
The present invention also provides a kind of identity authorization systems based on biological identification, including registration module and authentication module;
The registration module is used in user's registration, obtains the identity information of user, acquires the biological characteristic letter of user
Breath generates corresponding biological identification, and generates encryption key according to the biological identification, using the encryption key to preset
It is encrypted in plain text, obtains the registration ciphertext of user, and established the identity information of user and register ciphertext one-to-one relationship
Linked list, and store into ciphertext database;
The authentication module is used to acquire the biological characteristic letter of user to be verified when user to be verified carries out authentication
Breath generates the biological identification of user to be verified, and according to the biological identification of the user to be verified using identical with when registering
Method generates the encryption key of user to be verified, and plaintext when using the encryption key of user to be verified to registration encrypts,
Obtain the certification ciphertext of user to be verified, and by the registration ciphertext in the certification ciphertext and the ciphertext database of user to be verified
Be compared, according to whether in the presence of with certification the consistent registration ciphertext of ciphertext, judge whether the authentication of user to be verified leads to
It crosses.
Based on the above technical solution, the authentication module includes that judging unit, the first authentication unit and second are recognized
Demonstrate,prove unit;
The judging unit is for judging whether to obtain the identity information of user to be verified;
First authentication unit is used for when judging unit judgement does not obtain the identity information of user to be verified, will
All registration ciphertexts in the certification ciphertext and the ciphertext database of user to be verified are compared, if it exists with certification ciphertext
Consistent registration ciphertext, then the authentication of the user to be verified passes through, in the linked list with compare consistent registration
The corresponding subscriber identity information of ciphertext is the identity information of user to be verified;If it does not exist with certification the consistent registration of ciphertext
Ciphertext, then the authentication of the user to be verified does not pass through;
Second authentication unit is used for when the judging unit judges to obtain the identity information of user to be verified, in institute
It states and searches whether that there are the identity informations of user to be verified in ciphertext database, if it does not exist, then the identity of the user to be verified
Certification does not pass through;If it exists, then the corresponding registration ciphertext of identity information of the user to be verified is extracted, and uses the note extracted
Volume ciphertext is compared with the certification ciphertext of user to be verified, if comparison result is consistent, the authentication of the user to be verified
Pass through, if comparison result is inconsistent, the authentication of the user to be verified does not pass through.
Based on the above technical solution, the registration module and authentication module respectively include that a pseudo random number occurs
Device, and the two pseudorandom number generators are consistent;
The registration module is also used to utilize pseudorandom using the biological identification of user as the seed of pseudorandom number generator
Number generator generates corresponding encryption key;
The authentication module is also used to utilize using the biological identification of user to be verified as the seed of pseudorandom number generator
Pseudorandom number generator generates the corresponding encryption key of user to be verified.
Based on the above technical solution, the authentication module adds preset plaintext using the encryption key
The algorithm of close use is symmetric encipherment algorithm or hash function.
Compared with the prior art, the advantages of the present invention are as follows:
(1) identity identifying method of the invention based on biological identification, after collecting the biological information of user,
Corresponding biological identification can be first generated, and encryption key is generated according to the biological identification, using the encryption key in plain text
After being encrypted, registration ciphertext is obtained, then store the registration ciphertext.In this course, the information of storage is registration ciphertext, no
It is user biological characteristic information, more securely and reliably, there is no the risks that user biological characteristic sequence is compromised;
(2) identity identifying method of the invention based on biological identification utilizes the biology of registration user in user's registration
Mark encrypts preset plaintext, obtains registration ciphertext;In user authentication, using the biological identification of certification user to note
Plaintext when volume is used to be encrypted with mode identical when registering, and obtains certification ciphertext, and by directly comparing registration ciphertext
Authentication is carried out with certification ciphertext, such comparison efficiency is higher, so as to shorten the time needed for authentication, improves
The efficiency of authentication.
Detailed description of the invention
Fig. 1 is the schematic diagram of register flow path in the identity identifying method based on biological identification in the embodiment of the present invention;
Fig. 2 is the schematic diagram of identifying procedure in the identity identifying method based on biological identification in the embodiment of the present invention.
Specific embodiment
Invention is further described in detail with reference to the accompanying drawings and embodiments.
Shown in Figure 1, the embodiment of the present invention provides a kind of identity identifying method based on biological identification, including registration flow
Journey and identifying procedure.
The register flow path of the embodiment of the present invention specifically includes that steps are as follows:
A1: in user's registration, obtaining the identity information of user, and acquires the biological information of user, the body of user
Part information includes but is not limited to address name, user identity card number, account name, work number, mailbox number, cell-phone number etc., the life of user
Object characteristic information includes but is not limited to fingerprint, face, iris, refers to vein, gait, vocal print, brain wave, sclera etc.;
A2: according to the biological information of user, the characteristic sequence of the biological information is extracted, and utilizes special algorithm
The characteristic sequence is handled, corresponding biological identification is generated, in embodiments of the present invention, extracts biological information
Characteristic sequence can use the feature extraction algorithm of several groups Gabor filter and phase code, be not specifically limited here.
The special algorithm of use includes but is not limited to Fuzzy extractor, fuzzy safety box or fuzzy promise scheduling algorithm;
A3: it generates and adds using pseudorandom number generator using the biological identification of user as the seed of pseudorandom number generator
Key;
A4: encrypting preset plaintext using the encryption key, obtain the registration ciphertext of user, specific plaintext
Content is the unlimited non-null character string of length, such as random number, address name, user identity card number, account name, mailbox number, mobile phone
Number, account, passport No., the work trade mark, the biological identification etc. of the distribution of bank account, server;
A5: establishing subscriber identity information and registers the linked list of ciphertext one-to-one relationship, and the linked list is deposited
It stores up in ciphertext database, completes identity registration.
Specifically, when being encrypted using the encryption key to preset plaintext, the Encryption Algorithm used adds to be symmetrical
Close algorithm or hash function, such as DES, 3DES, TDEA, Blowfish, RC2, RC4, RC5, IDEA, SKIPJACK, AES, MD5
Deng.
Shown in Figure 2, the identifying procedure of the embodiment of the present invention specifically includes that steps are as follows:
B1: when user to be verified carries out authentication, the biological information of user to be verified is acquired;
B2: according to the biological information of user to be verified, the characteristic sequence of the biological information is extracted, and utilizes spy
Determine algorithm to handle the characteristic sequence, generate corresponding biological identification, to the processing method of characteristic sequence in this step
It is identical as the processing method in register flow path step A2;
B3: use method identical with register flow path step A3, according to the biological identification of the user to be verified generate to
Verify the encryption key of user;
B4: using user to be verified encryption key to registration when using to plaintext encrypt, obtain use to be verified
The certification ciphertext at family;
B5: judge whether to obtain the identity information of user to be verified, if not obtaining the identity information of user to be verified, hold
Row step B6, if obtaining the identity information of user to be verified, go to step B8;
B6: all registration ciphertexts in the certification ciphertext and the ciphertext database of user to be verified are compared;
B7: it judges whether there is and the certification consistent registration ciphertext of ciphertext, and if it exists, then the identity of the user to be verified is recognized
Card passes through, and subscriber identity information corresponding with successfully registration ciphertext is compared is searched in the linked list that step A5 is established,
The subscriber identity information found is the identity information of user to be verified;It is close with the consistent registration of certification ciphertext if it does not exist
Text, then the authentication of the user to be verified does not pass through;
B8: search whether that there are the identity informations of user to be verified in the ciphertext database, and if it exists, then execute step
Rapid B9, if it does not exist, then the authentication of the user to be verified does not pass through;
B9: extracting the corresponding registration ciphertext of identity information of the user to be verified, and using the registration ciphertext extracted with
The certification ciphertext of user to be verified is compared, if comparison result is consistent, the authentication of the user to be verified passes through, if than
Inconsistent to result, then the authentication of the user to be verified does not pass through.
The identity identifying method based on biological identification of the embodiment of the present invention, on the one hand, special in the biology for collecting user
After reference breath, corresponding biological identification can be first generated, and encryption key is generated according to the biological identification, utilize the encryption
Key pair is encrypted in plain text, obtains registration ciphertext, then store the registration ciphertext.In this course, the information of storage is note
Volume ciphertext, is not user biological characteristic information, more securely and reliably, there is no the risks that user biological characteristic sequence is compromised.
On the other hand, in user's registration, preset plaintext is encrypted using the biological identification of registration user, is obtained
Ciphertext is registered, in user authentication, plaintext when using the biological identification of certification user to registration is identical when using with registration
Mode is encrypted, and obtains certification ciphertext, and carry out authentication by directly comparing registration ciphertext and certification ciphertext, such
Comparison efficiency is higher, so as to shorten the time needed for authentication, improves the efficiency of authentication.The embodiment of the present invention is also
Provide a kind of identity authorization system based on biological identification, including registration module and authentication module;
The registration module is used in user's registration, obtains the identity information of user, acquires the biological characteristic letter of user
Breath generates corresponding biological identification, and generates encryption key according to the biological identification, using the encryption key to preset
It is encrypted in plain text, obtains the registration ciphertext of user, and established the identity information of user and register ciphertext one-to-one relationship
Linked list, and store into ciphertext database;
The authentication module is used to acquire the biological characteristic letter of user to be verified when user to be verified carries out authentication
Breath generates the biological identification of user to be verified, and according to the biological identification of the user to be verified using identical with when registering
Method generates the encryption key of user to be verified, and plaintext when using the encryption key of user to be verified to registration encrypts,
Obtain the certification ciphertext of user to be verified, and by the registration ciphertext in the certification ciphertext and the ciphertext database of user to be verified
Be compared, according to whether in the presence of with certification the consistent registration ciphertext of ciphertext, judge whether the authentication of user to be verified leads to
It crosses.
Further, the authentication module includes judging unit, the first authentication unit and the second authentication unit;
The judging unit is for judging whether to obtain the identity information of user to be verified;
First authentication unit is used for when judging unit judgement does not obtain the identity information of user to be verified, will
All registration ciphertexts in the certification ciphertext and the ciphertext database of user to be verified are compared, if it exists with certification ciphertext
Consistent registration ciphertext, then the authentication of the user to be verified passes through, in the linked list with compare consistent registration
The corresponding subscriber identity information of ciphertext is the identity information of user to be verified;If it does not exist with certification the consistent registration of ciphertext
Ciphertext, then the authentication of the user to be verified does not pass through;
Second authentication unit is used for when the judging unit judges to obtain the identity information of user to be verified, in institute
It states and searches whether that there are the identity informations of user to be verified in ciphertext database, if it does not exist, then the identity of the user to be verified
Certification does not pass through;If it exists, then the corresponding registration ciphertext of identity information of the user to be verified is extracted, and uses the note extracted
Volume ciphertext is compared with the certification ciphertext of user to be verified, if comparison result is consistent, the authentication of the user to be verified
Pass through, if comparison result is inconsistent, the authentication of the user to be verified does not pass through.
Specifically, the registration module and authentication module respectively include a pseudorandom number generator, and the two pseudorandoms
Number generator is consistent;
The registration module is also used to utilize pseudorandom using the biological identification of user as the seed of pseudorandom number generator
Number generator generates corresponding encryption key;
The authentication module is also used to utilize using the biological identification of user to be verified as the seed of pseudorandom number generator
Pseudorandom number generator generates the corresponding encryption key of user to be verified.
Further, the authentication module carries out the algorithm of encryption use using the encryption key to preset plaintext
It is symmetric encipherment algorithm or hash function.
The identity authorization system based on biological identification of the embodiment of the present invention, on the one hand, special in the biology for collecting user
After reference breath, corresponding biological identification can be first generated, and encryption key is generated according to the biological identification, utilize the encryption
Key pair is encrypted in plain text, obtains registration ciphertext, then store the registration ciphertext.In this course, the information of storage is note
Volume ciphertext, is not user biological characteristic information, more securely and reliably, there is no the risks that user biological characteristic sequence is compromised.
On the other hand, in user's registration, preset plaintext is encrypted using the biological identification of registration user, is obtained
Register ciphertext;In user authentication, plaintext when using the biological identification of certification user to registration is identical when using with registration
Mode is encrypted, and obtains certification ciphertext, and carry out authentication by directly comparing registration ciphertext and certification ciphertext, such
Comparison efficiency is higher, so as to shorten the time needed for authentication, improves the efficiency of authentication.
It should be understood that system provided by the above embodiment is when carrying out authentication operation, only with above-mentioned each function
The division progress of module can as needed be completed above-mentioned function distribution by different function module for example, in practical application,
The internal structure of system is divided into different functional modules, to complete all or part of the functions described above.
The present invention is not limited to the above-described embodiments, for those skilled in the art, is not departing from
Under the premise of the principle of the invention, several improvements and modifications can also be made, these improvements and modifications are also considered as protection of the invention
Within the scope of.The content being not described in detail in this specification belongs to the prior art well known to professional and technical personnel in the field.
Claims (8)
1. a kind of identity identifying method based on biological identification, which is characterized in that comprising steps of
S1: in user's registration, the identity information of user is obtained, acquires the biological information of user, generates corresponding biology
Mark, and encryption key is generated according to the biological identification, preset plaintext is encrypted using the encryption key, is obtained
The registration ciphertext of user, and the identity information of user and the linked list of registration ciphertext one-to-one relationship are established, and store and arrive
In ciphertext database;
S2: when user to be verified carries out authentication, the biological information of user to be verified is acquired, user to be verified is generated
Biological identification, and identical method generates user to be verified when using and register according to the biological identification of the user to be verified
Encryption key, using user to be verified encryption key to registration when plaintext encrypt, obtain recognizing for user to be verified
Demonstrate,prove ciphertext;
S3: the registration ciphertext in the certification ciphertext and the ciphertext database of user to be verified is compared, according to whether depositing
With certification the consistent registration ciphertext of ciphertext, judge whether the authentication of user to be verified passes through.
2. as described in claim 1 based on the identity identifying method of biological identification, which is characterized in that above-mentioned steps S3's is specific
Step includes:
Judge whether to obtain the identity information of user to be verified;
It, will be in the certification ciphertext and the ciphertext database of user to be verified if not obtaining the identity information of user to be verified
All registration ciphertexts are compared, if it exists with certification the consistent registration ciphertext of ciphertext, then the authentication of the user to be verified
Pass through, subscriber identity information corresponding with successfully registration ciphertext is compared is user to be verified in the linked list
Identity information;If it does not exist with the certification consistent registration ciphertext of ciphertext, then the authentication of the user to be verified does not pass through;
If obtaining the identity information of user to be verified, search whether that there are the bodies of user to be verified in the ciphertext database
Part information, if it does not exist, then the authentication of the user to be verified does not pass through;If it exists, then extract the user's to be verified
The corresponding registration ciphertext of identity information, and be compared using the registration ciphertext of extraction with the certification ciphertext of user to be verified, if
Comparison result is consistent, then the authentication of the user to be verified passes through, if comparison result is inconsistent, the body of the user to be verified
Part certification does not pass through.
3. as described in claim 1 based on the identity identifying method of biological identification, which is characterized in that in step S1 according to
The detailed process of biological identification generation encryption key are as follows: using the biological identification as the seed of pseudorandom number generator, utilize
Pseudorandom number generator generates corresponding encryption key.
4. as described in claim 1 based on the identity identifying method of biological identification, which is characterized in that the biology for acquiring user is special
Reference breath, the method for generating corresponding biological identification are as follows: the characteristic sequence for extracting the biological information utilizes special algorithm
The characteristic sequence is handled, corresponding biological identification is generated.
5. as claimed in claim 4 based on the identity identifying method of biological identification, it is characterised in that: the special algorithm is mould
Paste extractor, fuzzy safety box or fuzzy promise algorithm.
6. a kind of identity authorization system based on biological identification, it is characterised in that: including registration module and authentication module;
The registration module is used in user's registration, is obtained the identity information of user, is acquired the biological information of user, raw
Encryption key is generated at corresponding biological identification, and according to the biological identification, using the encryption key to preset plaintext
It is encrypted, obtains the registration ciphertext of user, and establish the identity information of user and being associated with for registration ciphertext one-to-one relationship
List, and store into ciphertext database;
The authentication module is used to acquire the biological information of user to be verified when user to be verified carries out authentication,
Identical method when generating the biological identification of user to be verified, and being used according to the biological identification of the user to be verified with registration
The encryption key for generating user to be verified, plaintext when using the encryption key of user to be verified to registration are encrypted, are obtained
The certification ciphertext of user to be verified, and the registration ciphertext in the certification ciphertext and the ciphertext database of user to be verified is carried out
Compare, according to whether in the presence of with certification the consistent registration ciphertext of ciphertext, judge whether the authentication of user to be verified passes through.
7. as claimed in claim 6 based on the identity authorization system of biological identification, it is characterised in that: the authentication module includes
Judging unit, the first authentication unit and the second authentication unit;
The judging unit is for judging whether to obtain the identity information of user to be verified;
First authentication unit is used for when judging unit judgement does not obtain the identity information of user to be verified, will be to be tested
All registration ciphertexts demonstrate,proved in the certification ciphertext and the ciphertext database of user are compared, consistent with certification ciphertext if it exists
Registration ciphertext, then the authentication of the user to be verified passes through, in the linked list with compare consistent registration ciphertext
Corresponding subscriber identity information is the identity information of user to be verified;It is close with the consistent registration of certification ciphertext if it does not exist
Text, then the authentication of the user to be verified does not pass through;
Second authentication unit is used for when the judging unit judges to obtain the identity information of user to be verified, described close
Search whether that there are the identity informations of user to be verified in literary database, if it does not exist, then the authentication of the user to be verified
Do not pass through;If it exists, then the corresponding registration ciphertext of identity information of the user to be verified is extracted, and close using the registration extracted
Literary to be compared with the certification ciphertext of user to be verified, if comparison result is consistent, the authentication of the user to be verified passes through,
If comparison result is inconsistent, the authentication of the user to be verified does not pass through.
8. as claimed in claim 6 based on the identity authorization system of biological identification, it is characterised in that: the registration module and recognize
Demonstrate,proving module respectively includes a pseudorandom number generator, and the two pseudorandom number generators are consistent;
The registration module is also used to send out using the biological identification of user as the seed of pseudorandom number generator using pseudo random number
Raw device, generates corresponding encryption key;
The authentication module is also used to using the biological identification of user to be verified as the seed of pseudorandom number generator, using puppet with
Machine number generator generates the corresponding encryption key of user to be verified.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201810360737.2A CN110391908A (en) | 2018-04-20 | 2018-04-20 | A kind of identity identifying method and system based on biological identification |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201810360737.2A CN110391908A (en) | 2018-04-20 | 2018-04-20 | A kind of identity identifying method and system based on biological identification |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN110391908A true CN110391908A (en) | 2019-10-29 |
Family
ID=68283346
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201810360737.2A Pending CN110391908A (en) | 2018-04-20 | 2018-04-20 | A kind of identity identifying method and system based on biological identification |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN110391908A (en) |
Cited By (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114743218A (en) * | 2022-04-08 | 2022-07-12 | 中国银行股份有限公司 | An identity verification method and system |
| CN115766022A (en) * | 2022-10-31 | 2023-03-07 | 中国农业银行股份有限公司 | User identity authentication method and device |
| CN115766115A (en) * | 2022-10-28 | 2023-03-07 | 支付宝(杭州)信息技术有限公司 | Identity authentication method and device, storage medium and electronic equipment |
| CN116015716A (en) * | 2022-11-30 | 2023-04-25 | 徐州徐工挖掘机械有限公司 | A method and system for identifying spare parts based on a verification mechanism |
| CN119671570A (en) * | 2024-12-17 | 2025-03-21 | 北京百度网讯科技有限公司 | Authentication method, device, electronic device, storage medium and program product |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN106059764A (en) * | 2016-08-02 | 2016-10-26 | 西安电子科技大学 | Password and fingerprint third-party authentication method based on halting key derivation function |
| US20170012970A1 (en) * | 2014-05-25 | 2017-01-12 | Fujitsu Limited | Relational encryption |
| CN107124283A (en) * | 2017-05-24 | 2017-09-01 | 舒翔 | A kind of physical characteristics collecting system and physical characteristics collecting method |
| CN107292152A (en) * | 2017-05-24 | 2017-10-24 | 舒翔 | A kind of biological characteristic authentication system and biometric authentication method |
| CN107332659A (en) * | 2017-05-24 | 2017-11-07 | 舒翔 | A kind of identity identifying method based on biological characteristic, storage medium and system |
-
2018
- 2018-04-20 CN CN201810360737.2A patent/CN110391908A/en active Pending
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20170012970A1 (en) * | 2014-05-25 | 2017-01-12 | Fujitsu Limited | Relational encryption |
| CN106059764A (en) * | 2016-08-02 | 2016-10-26 | 西安电子科技大学 | Password and fingerprint third-party authentication method based on halting key derivation function |
| CN107124283A (en) * | 2017-05-24 | 2017-09-01 | 舒翔 | A kind of physical characteristics collecting system and physical characteristics collecting method |
| CN107292152A (en) * | 2017-05-24 | 2017-10-24 | 舒翔 | A kind of biological characteristic authentication system and biometric authentication method |
| CN107332659A (en) * | 2017-05-24 | 2017-11-07 | 舒翔 | A kind of identity identifying method based on biological characteristic, storage medium and system |
Cited By (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114743218A (en) * | 2022-04-08 | 2022-07-12 | 中国银行股份有限公司 | An identity verification method and system |
| CN115766115A (en) * | 2022-10-28 | 2023-03-07 | 支付宝(杭州)信息技术有限公司 | Identity authentication method and device, storage medium and electronic equipment |
| CN115766022A (en) * | 2022-10-31 | 2023-03-07 | 中国农业银行股份有限公司 | User identity authentication method and device |
| CN116015716A (en) * | 2022-11-30 | 2023-04-25 | 徐州徐工挖掘机械有限公司 | A method and system for identifying spare parts based on a verification mechanism |
| CN119671570A (en) * | 2024-12-17 | 2025-03-21 | 北京百度网讯科技有限公司 | Authentication method, device, electronic device, storage medium and program product |
| CN119671570B (en) * | 2024-12-17 | 2025-10-03 | 北京百度网讯科技有限公司 | Authentication method, authentication device, electronic device, storage medium, and program product |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN110392029A (en) | Identity identifying method and system based on biological identification | |
| CN107332659B (en) | Identity authentication method, storage medium and system based on biological characteristics | |
| CN110391908A (en) | A kind of identity identifying method and system based on biological identification | |
| CN103679436B (en) | A kind of electronic contract security system and method based on biological information identification | |
| CN102722696B (en) | Identity authentication method of identity card and holder based on multi-biological characteristics | |
| EP1489551B1 (en) | Biometric authentication system employing various types of biometric data | |
| JPWO2003069489A1 (en) | Identification method | |
| CN105429761B (en) | A kind of key generation method and device | |
| CN104579649B (en) | Personal identification method and system | |
| CN105069442B (en) | A kind of finger print safety cell S E mould group and payment verification method | |
| CN108521418A (en) | An identity authentication method and system integrating blockchain and biometric identification | |
| CN107786547A (en) | A kind of auth method based on block chain, device and computer-readable recording medium | |
| CN110290134B (en) | Identity authentication method, identity authentication device, storage medium and processor | |
| CN101420301A (en) | Human face recognizing identity authentication system | |
| CN112329519B (en) | Safe online fingerprint matching method | |
| CN109493058A (en) | A kind of personal identification method and relevant device based on block chain | |
| CN113114700A (en) | Identity recognition, business processing and biological characteristic information processing method and equipment | |
| CN108540470A (en) | Verification System and method based on digital certificate label | |
| CN106921489B (en) | A data encryption method and device | |
| CN106936775A (en) | A kind of authentication method and system based on fingerprint recognition | |
| CN107517217A (en) | A Multi-factor Wireless Key Filling System Based on Fingerprint Identification | |
| Radha et al. | An evaluation of fingerprint security using noninvertible biohash | |
| CN104639528A (en) | DBA (database administrator) mobile client counterattack method and DBA mobile client counterattack device | |
| CN105118117B (en) | Entrance guard recognition device and recognition methods | |
| CN110189457A (en) | Intelligent door lock control method and system based on biological feature recognition |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191029 |