CN103646200A - Encoding encryption application method for human face information - Google Patents
Encoding encryption application method for human face information Download PDFInfo
- Publication number
- CN103646200A CN103646200A CN201310661690.0A CN201310661690A CN103646200A CN 103646200 A CN103646200 A CN 103646200A CN 201310661690 A CN201310661690 A CN 201310661690A CN 103646200 A CN103646200 A CN 103646200A
- Authority
- CN
- China
- Prior art keywords
- authentication
- people
- face
- password
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention provides an encryption method for human faces, and relates to an information security system. In particular, fixed biological characteristic information of the human faces is combined with password information constructed by human face rotating codes, so not only can relatively high security, reliability and conveniences of human body biological characteristic recognition be developed, but also dynamic characteristics of passwords can be exerted to eliminate the safety problem caused by the fact that the biological characteristic information is stolen, meanwhile, due to the fact that complexity of the passwords can be lowered, burdens of password memory on authenticators can be lightened, improvement of information safety is facilitated, and furthermore, popularization and application of the authentication technology are promoted.
Description
Technical field
The present invention relates to coding encrypting and the application process of people's face, thereby particularly by rotating face, builds people's face information that will there is particular organisms feature based on binary coding left or to the right and combine with the password that turns to coding to build based on people's face, therefore realize static biological characteristic and encrypt the security that improves encryption with dynamic coding password encryption combination.
Background technology
In the modern society of fixing and development of Mobile Internet technology high speed development, information security demonstrates unprecedented importance.Identification and evaluation are the important prerequisites that guarantees security of system, in applications such as national security, ecommerce, E-Payment, safety inspections, all need identification accurately and evaluation.Current, personal identification is differentiated the main means such as ID card (as smart cards such as I.D., employee's card and deposit cards) and password that rely on, yet the use of ID card exists problems such as carrying inconvenience, easily loss, damage, accessing to your password faces password and passes into silence and the problems such as crack.According to statistics, the U.S. every year in the economic loss causing due to identity swindle aspect welfare granting, credit card trade, mobile phone and ATM transaction up to multi-million dollar.Therefore, so we are badly in need of a kind of convenient, effective, safe identity recognizing technology, to adapt to the needs of modern development in science and technology and social progress.
Biometrics identification technology is with its distinctive security for this reason, and reliability and validity etc. is more and more subject to people's attention, and starts to enter the every field of our social life.U.S. government has signed continuously three national security bills after September 11 attacks, requires to adopt biological identification technology.In June, 2003, International Civil Aviation Organization of the United Nations has announced the application planning of its biotechnology, will in individual passport, add biological characteristic as fingerprint, iris, face characteristic etc., and carries out personal authentication when immigration.
At present, all automatic recognition systems based on biological characteristic have substantially identical principle of work and the course of work.First be collecting sample, these samples can be facial image, sound, fingerprint etc.; Next is to carry out feature extraction, extracts some feature of sample, with certain algorithm, for it, distributes a feature code, and this code is stored into database.Finally when needs carry out identity authentication to someone, then will deposit the feature code of database in and identified person's feature matches with certain Feature Correspondence Algorithm, thereby find out its identity.In actual life, study more deeply, application has fingerprint, people's face, iris, hand-type, retina, vocal print and signature etc. more widely.
Wherein recognition of face is one of most important function of fundamental sum of having of human visual system, is the basis that the mankind exchange.People, by this visual performance identification identity each other, understand the other side's emotion and intention.Compare with other authentication identifying methods, the features such as recognition of face has directly, close friend, convenience, are widely used in authentication, criminal's identification, the fields such as scene surveillance.
Yet the thing claiming the identity of others fraudulently occurring in real life but still has generation.For example somewhere prison inmates is murdered the rear fingerprint with prison guard by prison guard and has been opened the gate in prison and sneaked away.And usurp by trojan horse the report that other people comprise that ID (identity number) card No., fingerprint, people's face information are committed a crime on the internet, happen occasionally.This wherein the defect of most critical be just for the method for authentication, only to use fixed biologically characteristic information at present, therefore after biological information is obtained by other people, a series of safety problems that its identification derived are just difficult to avoid.Although strengthen the encrypted work to identity characteristic information when people have also carried out being included in authentication accordingly, or adopt multi-modal biological characteristic recognition technology to gather the information such as people's face, fingerprint, palmmprint, iris to carry out authentication, but these methods or effect have much room for improvement or because the complexity of implementing is too high, be difficult to implementation simultaneously.For this reason, thereby the application proposes to build left or to the right based on binary coding people's face information with particular organisms feature is combined with people's face rotation information with codified biological characteristic by rotating face in the world first, therefore realize that static biological characteristic is encrypted and dynamic coding password combination and the security that improves authentication to contributing for information security and further developing of social civilization.
Summary of the invention
Technical matters: the coding encrypting and the application process that the object of this invention is to provide a kind of people's face information, it is the binary coding cryptographic methods that a kind of people's face builds by left-right rotation, thereby the dynamic advantage of the combination that realizes people's face fixed biologically feature and the variable cipher convenience in authentication, the advantage such as effective and coding encrypting with performance biological information, with guarantee the safe, convenient of authentication with reliably.
Technical scheme: the present invention encodes to build password by people's face left-right rotation by scale-of-two in the world first, thereby realize the combination of the fixing biological characteristic of people's face and variable cipher and fixing people's face biological information is combined for authentication with variable people's face left-right rotation coding password information, thereby the advantage of the identification of performance biological information and the identification of coding password information, to advance further developing and applying of identity validation technology.
The coding encrypting method of a kind of people's face information of the present invention, first set people's face left-right rotation order and be that scale-of-two is encoded according to 0-1, then to obtain people's face, rotate and to be encoded to basic password segment in no time, that repeats that process builds to synthesize the password segment being formed in no time by each time in no time is binary coded.
Describedly refer to that in no time people's face rotates face left or surpasses 30 degree to the right and gather turned facial image to obtain turned people's face information, coded message and further to extract the password segment based on coded message by man face image acquiring equipment according to setting left and right coding in no time when the man face image acquiring equipment in front; And repeat to refer in no time once complete in no time after by addition once selected people's face rotate and gather turned facial image with people's face information, the coded message obtaining related rotation and cross and further extract the password segment based on coded message by man face image acquiring equipment;
The positive man face image acquiring equipment of facing of described people's face refers to that people's face plane and the interplanar angle of man face image acquiring equipment are just being less than or negative 10 degree;
Described turned facial image is obtained by picture pick-up device;
Described facial image obtains by feature extraction and template extraction can be for people's face information of information comparison;
The coding encrypting method of people's face information of the present invention, described password is for authentication system; Described authentication system comprises client and server, and client is except allowing authentication person also have logging in can to obtain authentication person's front face information and the information extracting system based on turned human face image information and the people's face information that can carry out information comparison of further obtaining by feature extraction and template extraction; Server end comprises application server and database, the people's face information that can carry out information comparison that has authentication person in database, coded message and the password of people's face left-right rotation, application server is born the function that connects client and database and carry out computing service.Application server and client realize by ciphertext communication that authentication person user logs in, authentication.The computing service function of application server refers to that calculation server crosses search by the people's face information exchange in the people's face information and date storehouse obtaining in no time and carry out information comparison with the verifier that tentatively determines one's identity, after success application server from database, call authentication person people's face left-right rotation coded message and further combined with surpassing once people's face information in no time and coded message, extract the authentication person that the password segment based on coded message is combined to form and input authentication password, subsequently application server by the authentication password of authentication person input and the authentication password in database by the search information of the carrying out verifier's identity of comparing to determine one's identity, when client can not be carried out the feature extraction of obtained turned facial image and template extraction, the application server of server end is born feature extraction and the template extraction of obtained turned facial image,
The authentication flow process of authentication system comprises that authentication person proposes after authentication request to application server by client, authentication system starts, application server sends and obtains authorization information requirement to client identity verifier, then authentication person is extracted successively and is surpassed the turned people's face information once obtaining in no time and be passed to application server by client-side information extraction system, application server is crossed search by the people's face information exchange in turned people's face information and date storehouse and is compared the verifier's identity that tentatively determines one's identity, after success application server from database, call authentication person people's face left-right rotation coded message and further combined with surpassing once people's face information in no time and coded message, extract the authentication person that the password segment based on coded message is combined to form and input authentication password, subsequently application server by the authentication password of authentication person input and the authentication password in database by the search information of the carrying out verifier's identity of comparing to determine one's identity, when information comparison is confirmed to coincide, application server feedback client identity verifier authentication success, when information compare continuous three times when failed by application server feedback client identity verifier authentication failure.
Described password, after authentication person's authentication success, is changed from client and application server contacts; Described password can arrange a plurality of to same authentication person, comprise authentication password, alarm password, backup password; Described authentication password is for authentication; Authentication when described alarm password is subject to other people and coerces for authentication person, now application server can stop authentication by apprizing system fault and contact the police seeking to assist; Described backup password is used for preventing when authentication person from forgetting authentication password again giving or to reset authentication password for change.
The database of authentication system server is collected and is comprised people's face information in verifier's identity situation that determines one's identity, the password that the coded message of people's face left-right rotation and authentication person set;
The comparison of information that authentication system carries out refer to by the turned facial image of collecting carry out after feature extraction and template extraction with database in people's face information exchange cross search and carry out information verification with discriminative information comparison result, verify call after the verifier that tentatively determines one's identity its setting people's face left-right rotation coded message and in conjunction with authentication person surpass once people's face information in no time and coded message extract authentication person that the password segment based on coded message is combined to form input authentication password and again with database in authentication person's authentication password by search with discriminative information comparison result;
The client of authentication system and application server are by ciphertext communication; Described ciphertext realizes by cryptographic algorithm, and cryptographic algorithm comprises symmetry algorithm and asymmetric arithmetic;
Described in authentication system, client and server may be incorporated in together;
Beneficial effect:
The safety that the ID card of traditional identity checking and cryptographic technique and existing human body biological characteristics recognition technology require in authentication, accurately, convenient, also there are a lot of problems in the aspect such as quick and cheap, the encrypted message that the application builds the fixed biologically characteristic information of people's face with people's face left-right rotation coding is for this reason in conjunction with the relative high security that not only can bring into play human body biological characteristics identification, reliability, convenience and can bring into play the behavioral characteristics of password and reduce and even avoid because of stolen the caused safety problem of biological information, simultaneously because thereby the burden that the complexity of password can decline so also can alleviate authentication person's cipher memory contributes to improve information security and promote the further expansion of authentication application.
Accompanying drawing explanation
Fig. 1 is the coding encrypting combination authentication system structure of people's face information.
Fig. 2 is the coding encrypting combination authentication system authentication flow process of people's face information.
Embodiment
Below in conjunction with embodiment, the present invention is further illustrated.
Embodiment mono-:
User Zhang San first bank set up account and submit human face image information to and own selected people's face to turn left be that 1 to turn right be 0 binary coding mode and by 1,0, the authentication password that 1 three times coding forms in no time, 0, the 1 alarm password and 0,1 forming in no time for twice, 0, the backup password forming in no time for 1,0,1 six times is to include in the database of bank server.Then the client that Zhang San installs by mobile phone is done shopping on the net in the time of need to paying, to log in after bank account first and by mobile phone camera, is absorbed three times image the ciphertext that obtains by symmetric encipherment algorithm are sent to bank server in no time, bank server obtains people's face information in no time to its three images in no time its three times after by feature extraction and template extraction, bank server number is crossed to search for by these people's face information and according to the people's face information exchange in storehouse and is compared to be tentatively defined as Zhang San, then in bank server calling data storehouse, the predefined people's face rotation of Zhang San coded message determines that in conjunction with its three times people's face information in no time the authentication password that Zhang San inputs is 1 again, 0, 1, bank server is compared the authentication password in this authentication password and database, after comparison coincide, bank server is notified Zhang San's authentication success by ciphertext, Zhang San can enter its account and realize network payment.
If Zhang San feels its personal information and comprise that the encrypted message of setting goes wrong, it can be modified by successful authentication.
If Zhang San's human face image information is stolen by network wooden horse by hacker, and while attempting to log in Zhang San's bank account, because it can only provide fix information, can not provide people's face to rotate the password that coding builds, thus its steal can not be successful.When hacker logs in unsuccessfully, system can be enrolled and be logged in people's associated picture for the use of solving a case below, and simultaneity factor can be by short message notification Zhang San to avoid risk.
If Zhang San is held as a hostage, people's face information that Zhang San can obtain for twice in no time by it and the alarm password of formation thereof are reported to the police to the police as neighbouring by 110 by bank account authentication system, and simultaneity factor prompt system fault is with protection Zhang San.
Embodiment bis-:
Certain prison system is set up after gate control system network, human face image information and the unified right-hand rotation of stipulating of first collecting every prison guard's submission are 1, left-hand rotation is 0 coded system in no time, and selected 1,1,1 authentication password, 0,1 twice in no time alarm password to include in the database of gate control system server.Client that has camera that prison guard A working is at ordinary times installed by each jail door of prison is utilized human face image information in no time of its selected three times and its to rotate the ciphertext that authentication password that people's face coding forms obtains by rivest, shamir, adelman to carry out authentication with turnover prison access control system; if prison guard is subject to offender and threatens, the alarm cipher prompting by twice people's face information in no time and its formation occurs that alarm provides support to inform other prison guards, and gate control system prompt system breaks down to protect prison guard.
Embodiment tri-:
Li Si is provided with the authentication system of camera on proof box, so that only have can opening safety case after successfully carrying out authentication.Subsequently Li Si submit to its human face image information and own selected people's face to turn left to be encoded to and turn right be 0 coded system and form in no time for six times 1,0,1,0,1,0 authentication password, 1 of three formation in no time, 0,0,0,0 of 1 alarm password and 5 formation in no time, 1,1 backup password is to include in the database of proof box server.Now client and server combine.The encrypted message that can form by its selected human face image information and people's face rotation coding thereof while needing opening safety case after Li Si logs in, authentication is opened.
When Li Si forgets its authentication password, the backup password that can form by selected human face image information and its people's face rotation coding logs in gives or resets authentication password for change.When Li Si is coerced opening safety case, can rotate the alarm password forming of encoding by selected human face image information and people's face thereof logs in; authentication system is by contacting and report to the police with the police at that time, and point out proof box there was a mechanical failure and protect Li Si simultaneously.
Embodiment tetra-:
User Zhang San first bank set up account and submit human face image information to and own selected people's face to turn left be that 1 to turn right be 0 binary coding mode and by 1,0, the authentication password that 1 three times coding forms in no time, 0, the 1 alarm password and 0,1 forming in no time for twice, 0, the backup password forming in no time for 1,0,1 six times is to include in the database of bank server.Then the client that Zhang San installs by mobile phone is done shopping on the net in the time of need to paying, to log in after bank account first and by mobile phone camera, is absorbed three times image the image processing software that loads by mobile phone login account obtain people's face information in no time its three times after by feature extraction and template extraction in no time, these information exchanges are crossed the ciphertext that asymmetrical encryption algorithm obtains and are sent to bank server subsequently, bank server number is crossed to search for by these people's face information and according to the people's face information exchange in storehouse and is compared to be tentatively defined as Zhang San, then in bank server calling data storehouse, the predefined people's face rotation of Zhang San coded message determines that in conjunction with its three times people's face information in no time the authentication password that Zhang San inputs is 1 again, 0, 1, bank server is compared the authentication password in this authentication password and database, after comparison coincide, bank server is notified Zhang San's authentication success by ciphertext, Zhang San can enter its account and realize network payment.
Embodiment five
King five safety door for dwelling authentication system is installed and in system database, input its household's human face image information and own selected people's face to turn left be that 1 to turn right be 0 binary coding mode and the authentication password of the selected formation of coding in no time, alarm password.After its one family just can pass in and out safety door by authentication system, safe and convenient.
Claims (10)
1. the coding encrypting method of people's face information, it is characterized in that first setting people's face left-right rotation order and be that scale-of-two is encoded according to 0-1, then to obtain people's face, rotate and to be encoded to basic password segment in no time, that repeats that process builds to synthesize the password segment being formed in no time by each time in no time is binary coded.
2. the coding encrypting method of people's face information according to claim 1, refers to described in it is characterized in that when people's face is faced man face image acquiring equipment in front, left and right coding in no time rotates face left or over 30, spend and gather turned facial image to obtain turned people's face information, coded message and further to extract the password segment based on coded message by man face image acquiring equipment according to setting in no time to the right; And repeat to refer in no time once complete in no time after by addition once selected people's face rotate by man face image acquiring equipment and gather turned facial image with people's face information, the coded message obtaining related rotation and cross and further extract the password segment based on coded message.
3. the coding encrypting method of people's face information according to claim 1, is characterized in that described in claim 2 that people's face is positive refer to that people's face plane and the interplanar angle of man face image acquiring equipment are just being less than or negative 10 spend in the face of man face image acquiring equipment.
4. the coding encrypting method of people's face information according to claim 1, is characterized in that described turned facial image is obtained by picture pick-up device.
5. the coding encrypting method of a kind of people's face information according to claim 1, is characterized in that described facial image obtains the people's ear profile information that can compare for information by feature extraction and template extraction.
6. an application process for people's face information as claimed in claim 1, is characterized in that described password is for authentication system; Described authentication system comprises client and server, and client is except allowing authentication person also have logging in can to obtain authentication person's front face information and the information extracting system based on turned human face image information and the people's face information that can carry out information comparison of further obtaining by feature extraction and template extraction; Server end comprises application server and database, the people's face information that can carry out information comparison that has authentication person in database, coded message and the password of people's face left-right rotation, application server is born the function that connects client and database and carry out computing service.Application server and client realize by ciphertext communication that authentication person user logs in, authentication.The computing service function of application server refers to that calculation server crosses search by the people's face information exchange in the people's face information and date storehouse obtaining in no time and carry out information comparison with the verifier that tentatively determines one's identity, after success application server from database, call authentication person people's face left-right rotation coded message and further combined with surpassing once people's face information in no time and coded message, extract the authentication person that the password segment based on coded message is combined to form and input authentication password, subsequently application server by the authentication password of authentication person input and the authentication password in database by the search information of the carrying out verifier's identity of comparing to determine one's identity, when client can not be carried out the feature extraction of obtained turned facial image and template extraction, the application server of server end is born feature extraction and the template extraction of obtained turned facial image.
7. the application process of a kind of people's face information according to claim 6, the authentication flow process that it is characterized in that authentication system comprises that authentication person proposes after authentication request to application server by client, authentication system starts, application server sends and obtains authorization information requirement to client identity verifier, then authentication person is extracted successively and is surpassed the turned people's face information once obtaining in no time and be passed to application server by client-side information extraction system, application server is crossed search by the people's face information exchange in turned people's face information and date storehouse and is compared the verifier's identity that tentatively determines one's identity, after success application server from database, call authentication person people's face left-right rotation coded message and further combined with surpassing once people's face information in no time and coded message, extract the authentication person that the password segment based on coded message is combined to form and input authentication password, subsequently application server by the authentication password of authentication person input and the authentication password in database by the search information of the carrying out verifier's identity of comparing to determine one's identity, when information comparison is confirmed to coincide, application server feedback client identity verifier authentication success, when information compare continuous three times when failed by application server feedback client identity verifier authentication failure.
8. the application process of a kind of people's face information according to claim 6, is characterized in that described password, after authentication person's authentication success, changes from client and application server contacts; Described password can arrange a plurality of to same authentication person, comprise authentication password, alarm password, backup password; Described authentication password is for authentication; Authentication when described alarm password is subject to other people and coerces for authentication person, now application server can stop authentication by apprizing system fault and contact the police seeking to assist; Described backup password is used for preventing when authentication person from forgetting authentication password again giving or to reset authentication password for change.
9. the application process of a kind of people's face information according to claim 6, the database that it is characterized in that authentication system server is collected and is comprised people's face information in verifier's identity situation that determines one's identity, the password that the coded message of people's face left-right rotation and authentication person set.
10. the application process of a kind of people's face information according to claim 6, it is characterized in that information comparison that authentication system carries out refer to by the turned facial image of collecting carry out after feature extraction and template extraction with database in people's face information exchange cross search and carry out information verification with discriminative information comparison result, verify call after the verifier that tentatively determines one's identity its setting people's face left-right rotation coded message and in conjunction with authentication person surpass once people's face information in no time and coded message extract authentication person that the password segment based on coded message is combined to form input authentication password and again with database in authentication person's authentication password by search with discriminative information comparison result.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310661690.0A CN103646200B (en) | 2013-12-09 | 2013-12-09 | The coding encrypting of a kind of face information and application process |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310661690.0A CN103646200B (en) | 2013-12-09 | 2013-12-09 | The coding encrypting of a kind of face information and application process |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103646200A true CN103646200A (en) | 2014-03-19 |
CN103646200B CN103646200B (en) | 2016-11-23 |
Family
ID=50251413
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310661690.0A Expired - Fee Related CN103646200B (en) | 2013-12-09 | 2013-12-09 | The coding encrypting of a kind of face information and application process |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103646200B (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104123639A (en) * | 2014-07-22 | 2014-10-29 | 王彬 | Online payment method and system through emotion icons |
CN104980425A (en) * | 2015-03-18 | 2015-10-14 | 腾讯科技(深圳)有限公司 | Account system unifying method, client, server and system |
CN105931327A (en) * | 2016-04-15 | 2016-09-07 | 广东京奥信息科技有限公司 | Access control monitoring method and system |
CN106650657A (en) * | 2016-12-16 | 2017-05-10 | 广东工业大学 | Authentication method and device based on full face binary matching |
CN107680218A (en) * | 2017-09-26 | 2018-02-09 | 成都优易数据有限公司 | Safety inspection method and system based on multi-biometric feature recognition Yu instantaneous license technology |
CN113378136A (en) * | 2021-06-08 | 2021-09-10 | 罗克佳华(重庆)科技有限公司 | Fingerprint identification method and device, password key and storage medium |
CN114785597A (en) * | 2022-04-22 | 2022-07-22 | 贵州爱信诺航天信息有限公司 | Domestic password-based personal authentication method, system and storage medium |
CN118277983A (en) * | 2024-05-30 | 2024-07-02 | 西安智慧时代信息科技有限公司 | Invigilation management system and method based on information security |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101256700A (en) * | 2008-03-31 | 2008-09-03 | 浙江大学城市学院 | ATM of mixed type user identification authentication |
CN102110320A (en) * | 2010-12-23 | 2011-06-29 | 汉王科技股份有限公司 | Coerce alarm method and entrance guard control equipment in entrance guard system |
CN102915594A (en) * | 2011-08-04 | 2013-02-06 | 深圳市凯智汇科技有限公司 | Bank card security system based on human body biological information code and operation method thereof |
CN103400436A (en) * | 2013-08-17 | 2013-11-20 | 慈溪市科创电子科技有限公司 | Access control system and control method thereof |
-
2013
- 2013-12-09 CN CN201310661690.0A patent/CN103646200B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101256700A (en) * | 2008-03-31 | 2008-09-03 | 浙江大学城市学院 | ATM of mixed type user identification authentication |
CN102110320A (en) * | 2010-12-23 | 2011-06-29 | 汉王科技股份有限公司 | Coerce alarm method and entrance guard control equipment in entrance guard system |
CN102915594A (en) * | 2011-08-04 | 2013-02-06 | 深圳市凯智汇科技有限公司 | Bank card security system based on human body biological information code and operation method thereof |
CN103400436A (en) * | 2013-08-17 | 2013-11-20 | 慈溪市科创电子科技有限公司 | Access control system and control method thereof |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104123639A (en) * | 2014-07-22 | 2014-10-29 | 王彬 | Online payment method and system through emotion icons |
CN104980425A (en) * | 2015-03-18 | 2015-10-14 | 腾讯科技(深圳)有限公司 | Account system unifying method, client, server and system |
CN104980425B (en) * | 2015-03-18 | 2018-12-11 | 腾讯科技(深圳)有限公司 | A kind of method that system of account is unified, client, server and system |
CN105931327A (en) * | 2016-04-15 | 2016-09-07 | 广东京奥信息科技有限公司 | Access control monitoring method and system |
CN106650657A (en) * | 2016-12-16 | 2017-05-10 | 广东工业大学 | Authentication method and device based on full face binary matching |
CN107680218A (en) * | 2017-09-26 | 2018-02-09 | 成都优易数据有限公司 | Safety inspection method and system based on multi-biometric feature recognition Yu instantaneous license technology |
CN113378136A (en) * | 2021-06-08 | 2021-09-10 | 罗克佳华(重庆)科技有限公司 | Fingerprint identification method and device, password key and storage medium |
CN114785597A (en) * | 2022-04-22 | 2022-07-22 | 贵州爱信诺航天信息有限公司 | Domestic password-based personal authentication method, system and storage medium |
CN118277983A (en) * | 2024-05-30 | 2024-07-02 | 西安智慧时代信息科技有限公司 | Invigilation management system and method based on information security |
Also Published As
Publication number | Publication date |
---|---|
CN103646200B (en) | 2016-11-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11108546B2 (en) | Biometric verification of a blockchain database transaction contributor | |
CN103646200A (en) | Encoding encryption application method for human face information | |
EP3005202B1 (en) | System and method for biometric authentication with device attestation | |
CN103646201A (en) | Verification method achieved by combining human faces with identities | |
US20210089635A1 (en) | Biometric identity verification and protection software solution | |
Jain et al. | Attacks on biometric systems: an overview | |
CN103699995A (en) | Payment authentication method based on fingerprints and finger veins | |
US11503021B2 (en) | Mobile enrollment using a known biometric | |
CN103646202A (en) | Fingerprint information coding encryption and application method | |
US10990776B2 (en) | Methods and devices for biometric verification | |
JP2009181561A (en) | Security management system using biometric authentication | |
Shafique et al. | Modern authentication techniques in smart phones: Security and usability perspective | |
CN106446667B (en) | Password data processing method, device and equipment | |
CN103646236B (en) | The coding encrypting and application process of a kind of palmprint information | |
Cavoukian et al. | Keynote paper: Biometric encryption: Technology for strong authentication, security and privacy | |
Albahbooh et al. | A mobile phone device as a biometrics authentication method for an ATM terminal | |
CN106710033B (en) | Entrance guard opening method and device | |
Fernandes | Biometric ATM | |
CN103647769A (en) | Human ear information coding encryption and application method | |
Arunadevi et al. | ONLINE BANKING SECURITY WITH REAL TIME FACE RECOGNITION APPROACH | |
Fowora et al. | Towards the Integration of Iris Biometrics in Automated Teller Machines (ATM) | |
Mankodiya et al. | Deep Learning-Based Robust Morphed Face Authentication Framework for Online Systems | |
Singh et al. | Security in e-Governance using Biometric | |
Wu | Biometrics authentication system on open network and security analysis | |
Abeng et al. | Application of hybrid hash message authentication code approach in biometrics information system design |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20161123 Termination date: 20201209 |