Palm print information coding, encryption and application method

An encryption method and application method technology, which is applied in the direction of instruments, character and pattern recognition, computer components, etc., can solve security problems and limit the large-scale promotion and application of biometric identification technology, and achieve high security effects

Active Publication Date: 2014-03-19
SOUTHEAST UNIV
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, in the actual application process, the security problems caused by the theft of fixed biometrics limit the large-scale promotion and application of biometric technology.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Palm print information coding, encryption and application method
  • Palm print information coding, encryption and application method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] The user Zhang San first sets up an account in the bank and submits the palmprint information of the two hands and the 0-1 sorting and coding method of the left and right hands selected by him, and is formed by six palm extension codes of 1, 1, 0, 0, 1, 0 The identity verification password, the alarm password formed by stretching the palm three times 1, 1, 0 and the backup password formed by stretching the palm five times 1, 0, 1, 0, 1 are included in the database of the bank server. Then Zhang San needs to pay for online shopping through the client installed on the mobile phone. After logging into the bank account, he first captures the image of palm stretching six times through the camera of the mobile phone, and sends the ciphertext obtained through the symmetric encryption algorithm to the bank server, and the bank server stretches it six times. After feature extraction and template extraction of the palm image, the palmprint information of the six stretched palms wa...

Embodiment 2

[0030] After the access control system network is set up in a certain prison system, first collect the palmprint information of the two hands submitted by the prison guards, the sorting and encoding method of 0 to 1 of the left and right palms, and the identity verification of the selected 1, 1, 1 Password, 1, 0, 1 three-time stretch alarm password to be included in the database of the access control system server. Prison guard A usually goes to work by using the client terminal with capacitive palmprint sensors installed at each prison door to use the palmprint information selected by him for three times and the identity verification password formed by it through the ciphertext obtained by the asymmetric encryption algorithm. Verify to enter and exit the prison access control system. If the prison guard is threatened by criminals, an alarm will appear through the palm print information formed three times and the password formed to inform other prison guards to provide support,...

Embodiment 3

[0032] Li Si installed an ultrasonic palmprint sensor authentication system on the safe, so that the safe can only be opened after successful identity verification. Then Li Si submitted the palmprint information of his two hands and the 0-1 sorting method he selected from right to left and the 0, 0, 1 identity verification password formed by stretching his palms three times, and the 1, 1 password formed by stretching his palms twice. The alarm password and the 1, 0, 1, 0, 1 backup password formed by stretching the palm five times are recorded in the database of the safe server. At this point the client and server are merged together. When Li Si later needs to open the safe, he can log in and verify his identity through the palm print information of his selected hand and the password information formed.

[0033] When Li Si forgot his identity verification password, he could log in through the palm print information of the selected hand and the backup password formed by it and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A palm print information coding, encryption and application method relates to an information safety system. Fixed biology characteristic information of a people palm print is combined with password information constructed by hand palm print coding so that relatively high security, reliability and convenience of human body biology characteristic identification can be achieved, a dynamic characteristic of the password can be performed and a safety problem generated because the biology characteristic information is stolen can be avoided. Simultaneously, because a complexity of the password can be reduced, a password memory burden of an authenticator can be mitigated, which is conductive to increasing information safety and promoting a further popularization application of an identity verification technology.

Description

technical field [0001] The invention relates to an encoding and encryption method of palmprint information and an application method thereof, in particular, the palmprints of the left and right hands of a person are coded in a binary manner to construct a password, so as to realize the combination of the fixed biological characteristics of the palmprint and the variable password to improve Security based on biometric identification or verification. Background technique [0002] Entering the 21st century, the progress of science and technology has made the society quickly enter the information age. The rapid development of information technology has made people's information exchange more convenient and faster, and the work efficiency has been greatly improved, reshaping our society from all aspects. . However, the ensuing information security issues such as information theft, fraudulent use or tampering have also brought severe challenges to the development of our society. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00
Inventor 张继中
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products