Unlock instant, AI-driven research and patent intelligence for your innovation.

Two-factor authentication method based on convolutional coding

A convolutional coding and authentication method technology, applied in user identity/authority verification, equipment, fingerprint/palmprint acquisition/arranging, etc., can solve problems such as copying, being stolen, and identity is easy to be impersonated or replaced by others, and achieve authentication The effect of high precision and high safety

Active Publication Date: 2017-05-24
UNIV OF JINAN
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Traditional identification methods include identification items (such as keys, certificates, ATM cards, etc.) and identification knowledge (such as user names and passwords). , its identity is easily impersonated or replaced by others
For example, common passwords, IC cards, bar codes, magnetic cards or keys, all have many unfavorable factors such as loss, forgetting, duplication and theft.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-factor authentication method based on convolutional coding
  • Two-factor authentication method based on convolutional coding
  • Two-factor authentication method based on convolutional coding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Embodiment 1 of the present invention is described below:

[0027] Embodiments of the present invention are as figure 1 shown, including the following steps:

[0028] S1: Obtain the palmprint feature image of the original palmprint image; specifically, it is to collect the original palmprint image, convert the original palmprint image into a binary image, extract the outline of the outer edge of the palm in the binary image, and detect the index finger and middle finger The corner points formed between the ring finger and the little finger, and the original palmprint image is corrected by these two corner points to obtain the palmprint ROI area, that is, the palmprint feature image. The correction operation can use the following process: take the line connecting the two corner points as the vertical axis, draw a vertical line from the midpoint of the two corner points to the vertical axis, use the vertical line as the horizontal axis, and take the intersection of the v...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a two-factor authentication method based on convolutional coding, which comprises an encryption process and a decryption process. The encryption process comprises the following steps: carrying out scrambling processing of palm print feature images of original palm print images to obtain a first palm print feature key; randomly generating an original key, and carrying out periodic extension and convolutional coding processing to obtain an intermediate key; and carrying out exclusive-OR processing of the intermediate key and the first palm print feature key to obtain encrypted information. The decryption process comprises the following steps: carrying out exclusive-OR processing of the encrypted information and a palm print feature key obtained for a second time; and carrying out convolutional decoding and voting to recover the original key. The two-factor authentication method based on the convolutional coding provided by the invention has the advantages that two-factor authentication for palm print biological features and the random key is achieved, so that the security is high; and in the decryption process, the exclusive-OR processing of the encrypted information and scrambled palm print features is carried out, and the convolutional decoding and the voting are then carried out to fully recover the original key, so that the authentication precision is improved.

Description

technical field [0001] The invention belongs to the field of identification and authentication, and in particular relates to a two-factor authentication method based on convolution coding. Background technique [0002] With the continuous advancement of the world's informatization process, information security issues will arouse more widespread attention. The struggle between stealing secrets and anti-stealing secrets is intensifying, especially in the field of information security, the work of keeping secrets is facing more and more new problems, which are becoming more and more complicated. Identification and authentication technology has become an important basis for information security and privacy protection, so it also puts forward higher requirements for identification and authentication technology. [0003] Traditional identification methods include identification items (such as keys, certificates, ATM cards, etc.) and identification knowledge (such as user names an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32G06K9/00
CPCH04L9/3228H04L9/3231G06V40/1347G06V40/1365
Inventor 李恒建邱建董吉文冯光
Owner UNIV OF JINAN