Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security certificate method based on fingerprint, cryptographic technology and fragile digital watermark

A technology of digital watermarking and security authentication, applied in the field of security authentication, can solve the problems of illegal embezzlement of fingerprint cloning and the inability to determine the legal holder of KEY, and achieve the effect of increasing sensitivity and preventing the risk of embezzlement

Active Publication Date: 2010-06-09
SHENZHEN POKA ELECTRONICS EQUIP +1
View PDF1 Cites 45 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to provide a security authentication method based on the combination of fingerprint, cryptography, and fragile digital watermark, so as to solve the problem that only the legality of KEY can be confirmed when digital watermark and digital signature are used to realize security authentication. However, it is impossible to determine the legal holder of the KEY, and the existing computer fingerprint authentication has the technical problem that fingerprints are easily cloned and illegally embezzled, so as to achieve the goal of authenticity and unique non-repudiation authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security certificate method based on fingerprint, cryptographic technology and fragile digital watermark
  • Security certificate method based on fingerprint, cryptographic technology and fragile digital watermark
  • Security certificate method based on fingerprint, cryptographic technology and fragile digital watermark

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention is based on the integer wavelet algorithm lossless digital watermark, uses the fingerprint image as the carrier, and at the same time binds the digital identity and the biological identity, embeds secret information or other information into the fingerprint image, and embeds the secret information or other information into the fingerprint image. Extraction and verification, effectively identify the authenticity of fingerprints, so as to confirm the authenticity of identity, effectively solve the defect that fingerprints can be cloned through computer systems, and effectively prevent the risk of fingerprints being stolen, so as to achieve true and unique identity Non-repudiation authentication goal.

[0021] refer to figure 1 , the fingerprint USBKEY in the present invention adopts a domestic encryption chip, integrates watermark embedding, watermark extraction, fingerprint comparison, and basic cryptographic algorithms into the same chip, and is ex...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security certificate method based on fingerprint, cryptographic technology and fragile digital watermark, comprising the following steps: a sender collects a fingerprint image, calculates summary information of the fingerprint image and inserts the summary information, a secret key and digital information which is digitally signed and encrypted into the fingerprint image as a watermark; the fingerprint of the sender is collected, the fingerprint image inserted with the watermark is sent to a receiver after the fingerprint of the sender is qualified; after receiving information, the receiver firstly detects and verifies whether the fingerprint image is inserted with the digital watermark and whether the digital watermark is right or not so as to indentify identity authenticity; digital watermark information is extracted from the received image; the summary information of the fingerprint image from which the watermark is extracted is calculated; and the summary information is compared with the summary information of the fingerprint image recorded in the watermark information to approve information authenticity. The invention can effectively overcome the defects that the existing digital signature security certificate can not approve the legal KEY holder and the fingerprint in the fingerprint certificate is easy to clone and embezzle.

Description

technical field [0001] The present invention relates to computer technology, information security technology and information hiding technology, specifically a security authentication method based on the combination of fingerprint, cipher technology and fragile digital watermark to solve network conditions to distinguish identity and information authenticity and non-repudiation. Background technique [0002] Usually, people encrypt their identities and information in computer information security systems mainly through cryptographic technology to ensure the security of their identities, information and communications, but in the Internet age to ensure the security of identities, information and transmission, only password It is often not enough for technology to ensure the security of a system. Whether the encryption and decryption system developed by modern cryptography is a symmetric key system (such as DES) or a more secure public key system (RSA), the ciphertext generated...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06T1/00
Inventor 刘连生刘海生
Owner SHENZHEN POKA ELECTRONICS EQUIP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products