Credibility detection method based on password hash and biometric feature recognition

A technology of biometric identification and biometric information, which is applied in the field of computer security, can solve problems such as the inability to identify the user's physical identity, and the computer information detection code is easily reversed, so as to avoid the hidden danger of change and replacement and protect privacy.

Active Publication Date: 2015-07-01
西安电子科技大学工程技术研究院有限公司
View PDF9 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to propose a credibility detection method based on password hash and biometric identification to solve the problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credibility detection method based on password hash and biometric feature recognition
  • Credibility detection method based on password hash and biometric feature recognition
  • Credibility detection method based on password hash and biometric feature recognition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] refer to figure 1 , the implementation steps of the present invention are as follows:

[0026] Step 1, obtain the software and hardware information of the computer.

[0027] Call the system function to obtain computer hardware information, such as CPU, hard disk, memory, network card, graphics card, recorded as ID i , i=1,2,3...n, wherein n is the number of hardware to be counted in the computer;

[0028] Call the system function to obtain computer software information, such as operating system, office software, chat tool, denoted as SW j , j=1,2,3...m, where m is the number of software in the computer that needs to be counted.

[0029] Step 2, select the cryptographic hash function, and select the fuzzy safe algorithm.

[0030] 2a) Choose a cryptographic hash function as the encryption function

[0031] Compared with similar encryption methods, the cryptographic hash function has the characteristics of being easy to calculate, difficult to deduce information in re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a credibility detection method based on password hash and biometric feature recognition. The method mainly solves the problems that existing computer information detection codes are likely to be reversely calculated and computers cannot recognize physical identities of users. According to the technical scheme, the method includes the steps that 1, software and hardware information of a computer is obtained, and biological feature information of a user is collected; 2, a device code is generated according to the software and hardware information, a fuzzy vault is generated through the biological feature information, and a user code is generated through the device code and the fuzzy vault; 3, the fuzzy vault and the user code serve as computer integrity check codes to be stored; 4, software and hardware information of the computer is obtained again, biological feature information of the user is recollected, and a new user code is generated; 5, the new user code is compared with the stored user code, if the new user code is identical with the stored user code, credibility verification passes, and otherwise, verification fails. The integrity check codes can be prevented from being changed and replaced, the physical identity of the user can be recognized, and the method can be used for protecting computer security.

Description

technical field [0001] The invention belongs to the technical field of computer security, in particular to a method for detecting the reliability of equipment software and hardware and a method for identifying physical identity of a user, which can be used to protect the security of a computer and identify the identity of a user. Background technique [0002] In recent years, computer technology has developed rapidly, and personal computers have become an indispensable part in people's daily work and life. The software and hardware information in a computer device is extremely important to users, therefore, the security of software and hardware has become a problem that users pay more and more attention to. When a computer breaks down, many users will go to the repair shop for repairs, and there are great potential safety hazards: in terms of hardware security, users must worry about unscrupulous repairers secretly replacing computer hardware; in terms of software security, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/32
Inventor 庞辽军李岩蔡莹曹潮
Owner 西安电子科技大学工程技术研究院有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products