Identity authentication method based on secret graphic code sharing mechanism

A technology of secret sharing and identity authentication, applied in the field of identity authentication based on the secret sharing mechanism of graphic codes, it can solve the problems of rampant identity tampering and forgery and illegal use of other people's identity documents, technological lag, and large loopholes, and achieves convenient implementation and prevention of being attacked. Tampering, low-cost effects

Active Publication Date: 2016-02-10
CAS OF CHENGDU INFORMATION TECH CO LTD
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] To sum up, compared with the ever-changing progress of information technology and the Internet, the existing identity real-name authentication technology is obviously lagging behind and has larg...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method based on secret graphic code sharing mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The embodiments of the present invention will be described in detail below with reference to the accompanying drawings, but the present invention can be implemented in many different ways defined and covered by the claims.

[0027] The uniqueness and security of biometric features are the basis of identity authentication. Aiming at technical problems such as collection, storage, conversion and protection of biometric feature information, the present invention proposes an identity real-name authentication method based on a graphic code secret sharing mechanism. Biometric information can be safely and effectively protected, making it unique and secure.

[0028] Please refer to figure 1 , the present invention provides an identity authentication method based on a graphic code secret sharing mechanism, comprising:

[0029] Step 1, extracting the first biometric information of the first verified person;

[0030] Step 2, converting the first biometric information into a fir...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an identity authentication method based on a secret graphic code sharing mechanism. The identity authentication method comprises the following steps: extracting first biological characteristic information of a first authenticated person; converting the first biological characteristic information into a first graphic code having a symbol logic form; mapping the first graphic code into n shadow secrets, and respectively storing the shadow secrets in different places; extracting second biological characteristic information of a second authenticated person; converting the second biological characteristic information into a second graphic code having a symbol logic form; selecting t shadow secrets from the n shadow secrets so as to reconstruct a graphic code; judging whether the second graphic code accords with the reconstructed graphic code or not; if so, determining that the first authenticated person and the second authenticated person are the same person; or else, determining that the first authenticated person and the second authenticated person are two different persons. According to the invention, the problem that real-name identity information is tampered, forged and stolen can be effectively prevented.

Description

technical field [0001] The invention relates to the field of identity authentication, in particular to an identity authentication method based on a graphic code secret sharing mechanism. Background technique [0002] Identity real-name authentication is the process of judging the identity of individuals who want to visit by using a proprietary authentication system with registered user information. Real-name authentication provides authentication of the real identity of system visitors, and is mainly used to prevent unauthorized users from accessing system resources. Generally, electronic technology, biotechnology, or a combination of electronic technology and biotechnology is used to authenticate the authenticity of the identity of the authorized user. Divided from the relationship between the credentials used for authentication and the user, identity authentication can be divided into three categories: user-known authentication, user-held token authentication, and user bi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
Inventor 袁德砦张景中蔡红亮袁琦钊滕鹏国陈亮王子伟钟勇王晓京
Owner CAS OF CHENGDU INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products