Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

57results about How to "Improve authentication capabilities" patented technology

Image hiding and authentication method based on secret sharing

ActiveCN103761702AImprove securityDifferences in Statistical PropertiesImage data processing detailsPattern recognitionHash function
The invention discloses an image hiding and authentication method based on secret sharing, and belongs to the technical field of secret image sharing. The image hiding and authentication method is characterized by comprising the steps that firstly, difference Huffman encoding is conducted on a secret image, every three generated bit sequences are set to be one group to be converted into decimal numbers which are used as coefficients of a sharing polynomial in the Shamir (k, n) threshold scheme, the k and the n are positive integers, the k is smaller than or equal to the n, and n shadow images are generated; secondly, n significant carrier images are selected, the generated shadow images are embedded into the carrier images in a matrix encoding mode, authentication bits generated by the hash function are also embedded into the carrier images, and n disguise images are formed and are in the charge of n different participants respectively. The disguise images generated through the image hiding and authentication method has higher visual quality, existence of secret information cannot be perceived by attackers easily, and the safety of the secret information is ensured. Meanwhile, before the secret information is recovered, the disguise images provided by each participant need to be authenticated, only the disguise images passing through authentication can participate in recovery of the secret information, and the safety of the secret information is further strengthened.
Owner:TAIYUAN UNIVERSITY OF SCIENCE AND TECHNOLOGY

Identity authentication method based on face and authentication apparatus thereof

The invention provides an identity authentication method based on a face and an authentication apparatus thereof. The method comprises the following steps: carrying out face detection on each frame of image acquired by a camera device to obtain a face image, and tracking the face image to obtain a tracking result; carrying out an attitude analysis, wherein if a face attitude in obtained attitude information is not jumped relative to a face attitude corresponding to a prior frame of image, an attitude analysis result is not jumped; carrying out face comparison; carrying out statistics analysis on a plurality of frames of tracking results, a plurality of frames of attitude analysis results and a plurality of frames of face image authentication results, wherein if a statistics analysis result is in accordance with a preset condition, identity authentication is passed. According to the method and the apparatus thereof in the invention, a two-dimensional flat picture is utilized to distinguish a photograph from a human, in the prior art utilizing three-dimensional information and carrying out photograph identification cause that a system identification speed is substantially decreased and an application requirement can not satisfied, and the above technical problem is solved in the invention.
Owner:GUANGDONG VIMICRO

GF (27) finite field and dual authentication-based meaningful (K, N) image sharing and reconstructing method

The invention provides a GF (27) finite field and dual authentication-based meaningful (K, N) image sharing and reconstructing method. Ring the sharing period, the sub-band of a secret image LL is scrambled, and the coefficients of bits are backed up by different numbers according to the degrees of importance thereof. Finally, a backup image of the same size with the secret image is formed. After that, secret pixels, backup pixels and the corresponding dual-authentication information are shared in the form of (K, N) in the GF (27) finite field. Based on the optimized LSB method, the shared information and primary authentication bits are embedded into the lower-order bits of a bunker block to maximally ensure the visual quality of distributed bunker images. During the reconstruction process, the shared information for recovery is screened through the primary authentication step. After that, the reliability of recovered secret pixels and the reliability of recovered backup pixels are verified through the secondary authentication step, so that an authentication image, a backup image and a preliminary secret image are formed. In combination with the secret image, a recovered reference image and the authentication image, the non-pass pixels of the secret image during the authentication process are subjected to polynomial fitting repair and alternative repair, so that the repair quality after the attack is better.
Owner:SHAANXI NORMAL UNIV

Key generation, certification and data transmission method based on physiological features

The invention relates to a key generation, certification and data transmission method based on physiological features. The method comprises the following steps that a, physiological sensors which collect the physiological features synchronously are arranged on a human body, and one of the physiological sensors is set to be a coordinator; b, the physiological sensors extract the physiological features to obtain a first key; c, the coordinator extracts the physiological features to obtain a second key; d, the sensors carry out logical operation on the physiological feature data to be transmitted and personal codes to be transmitted and the first key and then carry out encoding, and encoded and enciphered data are obtained; e, the encoded and enciphered data are obtained and the first key are forwarded to the coordinator through relay nodes in a certain frequency or are directly transmitted to the coordinator; f, the coordinator obtains a third key according to the matched relation between the second key and the first key; g, the coordinator decodes the encoded and enciphered data through the third key and the personal codes, and finally physiological data collected by the physiological sensors are obtained. The method is easy and effective to implement, and can improve the safety of transmission of the human body physiological feature data.
Owner:JIANGSU R & D CENTER FOR INTERNET OF THINGS

Authentication method and device

The invention discloses an authentication method and device. The authentication method includes the steps that a first authentication device is used for maintaining an authentication capability list; if the first authentication device is a Slave authentication device, whether the number of authentication client sides which are processed by the authentication device at present reaches the processing capability of the authentication device or not is inquired from the authentication capability list when an authentication message is received; if not, the authentication message is authenticated; if yes, a first mark is added into the authentication message, and then the authentication message is sent to a Master authentication device; if the first authentication device is the Master authentication device, when the authentication message which carries the first mark is received, the authentication message is authenticated if the number of authentication client sides which are processed at present by the authentication device does not reach the processing capability of the authentication device through the inquiry from the authentication capability list. In the embodiment of the authentication method and device, the processing loads of a convergence layer device can be reduced, and the bottleneck of network authentication is avoided.
Owner:NEW H3C TECH CO LTD

A Method of Image Hiding and Authentication Based on Secret Sharing

ActiveCN103761702BImprove securityDifferences in Statistical PropertiesImage data processing detailsHash functionInformation recovery
The invention discloses an image hiding and authentication method based on secret sharing, and belongs to the technical field of secret image sharing. The image hiding and authentication method is characterized by comprising the steps that firstly, difference Huffman encoding is conducted on a secret image, every three generated bit sequences are set to be one group to be converted into decimal numbers which are used as coefficients of a sharing polynomial in the Shamir (k, n) threshold scheme, the k and the n are positive integers, the k is smaller than or equal to the n, and n shadow images are generated; secondly, n significant carrier images are selected, the generated shadow images are embedded into the carrier images in a matrix encoding mode, authentication bits generated by the hash function are also embedded into the carrier images, and n disguise images are formed and are in the charge of n different participants respectively. The disguise images generated through the image hiding and authentication method has higher visual quality, existence of secret information cannot be perceived by attackers easily, and the safety of the secret information is ensured. Meanwhile, before the secret information is recovered, the disguise images provided by each participant need to be authenticated, only the disguise images passing through authentication can participate in recovery of the secret information, and the safety of the secret information is further strengthened.
Owner:TAIYUAN UNIVERSITY OF SCIENCE AND TECHNOLOGY

Writing rhythm feature extraction and authentication method in online handwriting authentication

The invention relates to the field of information security, and discloses a writing rhythm feature extraction and authentication method in online handwriting authentication. The method comprises the following steps: writing rhythm feature pre-learning, obtaining a writing rhythm characteristic probability density function; writing rhythm feature registration, calculating the maximum value and theminimum value of the registered handwriting sample on each component of the writing rhythm characteristics, authenticating the writing rhythm characteristics, calculating the probability of observingall stable and consistent writing rhythm characteristic components of the tested handwriting sample and the registered handwriting sample, and taking the probability value as a basis for further judgment. The invention discloses a method for extracting and authenticating writing rhythm characteristics in online handwriting authentication. Writing rhythm characteristics are effectively extracted, the probability of occurrence of the stable and consistent writing rhythm characteristics in crowds is estimated, and the attack difficulty and attack cost of a facsimile are greatly increased by effectively identifying a writing mode which is not easy to perceive, so that the handwriting authentication performance is improved.
Owner:JIANGNAN UNIV

Authentication method and device

The invention provides an authentication method and device. The method comprises the following steps: a first line card receives an authentication message for a user terminal sent by a forwarding kernel, wherein the authentication message comprises a first line card address corresponding to the user terminal, and the first line card is determined by the forwarding kernel according to the first line card address; the first line card sends the authentication message to a first business card, wherein the first business card is used for determining a redirection link according to the authentication message and sending the redirection link to the user terminal through the forwarding kernel, and the redirection link points to an authentication server; and the first line card receives an authentication attribute message through the forwarding kernel and sends the authentication attribute message to the authentication server, and the authentication server authenticates the user terminal according to the authentication attribute message, wherein the authentication attribute message is determined by the user terminal according to the redirection link. The authentication method and device provided by the invention has the advantages that the authentication capacity and the authentication performance of an authentication system are improved, and the equipment maintenance cost and the laborcost are reduced.
Owner:RUIJIE NETWORKS CO LTD

A face-based identity authentication method and authentication device

The invention provides an identity authentication method based on a face and an authentication apparatus thereof. The method comprises the following steps: carrying out face detection on each frame of image acquired by a camera device to obtain a face image, and tracking the face image to obtain a tracking result; carrying out an attitude analysis, wherein if a face attitude in obtained attitude information is not jumped relative to a face attitude corresponding to a prior frame of image, an attitude analysis result is not jumped; carrying out face comparison; carrying out statistics analysis on a plurality of frames of tracking results, a plurality of frames of attitude analysis results and a plurality of frames of face image authentication results, wherein if a statistics analysis result is in accordance with a preset condition, identity authentication is passed. According to the method and the apparatus thereof in the invention, a two-dimensional flat picture is utilized to distinguish a photograph from a human, in the prior art utilizing three-dimensional information and carrying out photograph identification cause that a system identification speed is substantially decreased and an application requirement can not satisfied, and the above technical problem is solved in the invention.
Owner:GUANGDONG VIMICRO

End-to-end verification method and system for telecommunication service unauthorized access prevention

The invention discloses an end-to-end verification method and system for telecommunication service unauthorized access prevention, and relates to the field of telecommunication services. The method comprises the steps: when a salesman opens a preset module, triggering a public authentication verification interface; calling a corresponding verification service from multiple types of verification services contained in the public authentication verification interface for verification; generating a token of the user through the unified authentication service according to a preset authentication rule; and verifying the validity of the token of the user after submitting a telecommunication service handling order. According to the invention, the end-to-end security of sensitive information access, sensitive service scenes and complex service handling of users in the telecommunication industry can be improved, and user information acquisition and illegal service handling caused by unauthorizedaccess of the users are avoided; through an end-to-end token authentication mechanism, the problem of business personnel and user-level authentication capability is solved, and the user experience, security control and operation analysis control level are improved on the premise of not sacrificing the basic business capability.
Owner:北京思特奇信息技术股份有限公司

Method for extracting and authenticating stroke extraction and connection characteristics in online handwriting authentication

The invention relates to the field of information security, and discloses a method for extracting and authenticating stroke extraction and connection characteristics in online handwriting authentication. The method comprises the following steps: carrying out stroke extraction and pen feature pre-learning; obtaining the probability of occurrence of the false extraction and continuous extraction features in the crowd; registering stroke extraction and connection stroke characteristics, counting the occurrence frequency of stroke virtual extraction and connection stroke characteristics of a registered user, finding out stable virtual extraction and connection stroke according to the occurrence frequency, authenticating the stroke extraction and connection stroke characteristics, calculating the occurrence probability of stable and consistent combination of the virtual extraction stroke and the connection stroke in the crowd, and taking the probability as a basis for further judgment. Theinvention discloses a method for extracting and authenticating stroke extraction and connection characteristics in online handwriting authentication. According to the method, the characteristics of the virtual extraction pen or the continuous extraction pen in the local strokes can be effectively extracted, the occurrence probability of the stable and consistent combination of the virtual extraction pen and the continuous extraction pen in the crowd is estimated, a writing mode which violates writing standards and is stable can be recognized, and the handwriting authentication performance is improved.
Owner:HUBEI UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products