Identity fusion authentication method based on biological characteristics

A biometric and identity fusion technology, applied in the field of data communication and information security, can solve the problems of large losses, easy to be impersonated or replaced by others, etc., to achieve high security, increase security reliability, and simplify the system structure.

Active Publication Date: 2014-02-26
中电科网络安全科技股份有限公司
View PDF3 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional identification methods include identification items (such as documents, ATM cards, etc.) and identification (such as user names and passwords), but because they mainly rely on foreign objects, once stolen or forgotten, their identities are easily faked or replaced by others
According to relevant data, the loss caused by the loss of certificates or passwords is huge every year

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity fusion authentication method based on biological characteristics
  • Identity fusion authentication method based on biological characteristics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] All features disclosed in this specification, or steps in all methods or processes disclosed, may be combined in any manner, except for mutually exclusive features and / or steps.

[0030] Any feature disclosed in this specification (including any appended claims, abstract and drawings), unless expressly stated otherwise, may be replaced by alternative features which are equivalent or serve a similar purpose. That is, unless expressly stated otherwise, each feature is one example only of a series of equivalent or similar features.

[0031] The biometric feature extraction equipment here does not specifically refer to specific equipment. At present, general-purpose fingerprint recognition equipment, face recognition equipment, voice recognition equipment and iris recognition equipment can all be included in the scope.

[0032] The realization process of the present invention is as follows:

[0033] A. Biometric feature extraction: use biometric feature extraction equipmen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of data communicating and information security, and especially relates to an identity fusion authentication method based on biological characteristics, for solving the problems in the prior art. According to the invention, only a small amount of biological characteristic information needs to be reserved, a PKI system structure is simplified, a private key may not be saved, and the system safety and reliability are improved. Through a biological characteristic acquisition device, the private key of a user is calculated, a verification value is calculated, and if the verification value is consistent with a reserved verification value, the authentication succeeds. The method provided by the invention is applied to the field of information security.

Description

technical field [0001] The invention belongs to the fields of data communication and information security, and in particular relates to an identity fusion authentication method based on biometric features. Background technique [0002] In the information age, with the rapid development of network and communication technology and the continuous expansion of human physical and virtual activities, how to accurately identify users and protect information security has become a key issue that must be solved. At the same time, the information system puts forward higher requirements for the accuracy, security and practicality of user identification. Traditional identity identification methods such as passwords and key carriers can no longer meet the ease of use and security, and are easy to forge and lose. It is necessary to seek new ways of identity identification that are more secure, reliable, and easy to use. As a result, biometric technology came into being and became a new i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 张文科
Owner 中电科网络安全科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products