Double-factor authentication method based on double convolutional and cycle encoding

An authentication method and convolutional coding technology, which is applied in the field of identity recognition and authentication, can solve problems such as theft, copying, and loss, and achieve the effect of high security and high authentication accuracy

Active Publication Date: 2017-05-31
UNIV OF JINAN
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Traditional identification methods include identification items (such as keys, certificates, ATM cards, etc.) and identification knowledge (such as user names and passwords). , its identity is easily impersonated or replaced by others
For example, common passwords, IC cards, bar codes, magnetic cards or keys, all have many unfavorable factors such as loss, forgetting, duplication and theft.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Double-factor authentication method based on double convolutional and cycle encoding
  • Double-factor authentication method based on double convolutional and cycle encoding
  • Double-factor authentication method based on double convolutional and cycle encoding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Embodiment 1 of the present invention is described below:

[0033] Embodiments of the present invention are as figure 1 shown, including the following steps:

[0034] S1: Obtain the palmprint feature image of the original palmprint image; specifically, it is to collect the original palmprint image, convert the original palmprint image into a binary image, extract the outline of the outer edge of the palm in the binary image, and detect the index finger and middle finger The corner points formed between the ring finger and the little finger, and the original palmprint image is corrected by these two corner points to obtain the palmprint ROI area, that is, the palmprint feature image. The correction operation can use the following process: take the line connecting the two corner points as the vertical axis, draw a vertical line from the midpoint of the two corner points to the vertical axis, use the vertical line as the horizontal axis, and take the intersection of the v...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a double-factor authentication method based on double convolutional and cycle encoding, which comprises an encrypting process and a decrypting process. The encrypting process comprises the steps of: carrying out scrambling processing on a palm print feature image of an original palm print image to obtain a first palm print feature secret key; then randomly generating an original secret key, and carrying out convolutional encoding and cycle encoding processing to obtain an intermediate secret key; and carrying out exclusive-or processing on the intermediate secret key and the first palm print feature secret key to obtain encrypted information. The decrypting process comprises the steps of: carrying out exclusive-or processing on the encrypted information and a palm print feature secret key obtained again; and then carrying out convolutional decoding and cycle decoding processing to recover the original secret key. According to the double-factor authentication method disclosed by the invention, double-factor authentication of palm print biological features and a random secret key is implemented, so that security is high; and moreover, in the decrypting process, the original secret key can be completely recovered by carrying out exclusive-or processing on the encrypted information and the scrambled palm print features and then carrying out convolutional decoding and cycle decoding, so that authentication accuracy is improved.

Description

technical field [0001] The invention belongs to the field of identification and authentication, in particular to a two-factor authentication method based on convolution and cyclic double coding. Background technique [0002] With the continuous advancement of the world's informatization process, information security issues will arouse more widespread attention. The struggle between stealing secrets and anti-stealing secrets is intensifying, especially in the field of information security, the work of keeping secrets is facing more and more new problems, which are becoming more and more complicated. Identification and authentication technology has become an important basis for information security and privacy protection, so it also puts forward higher requirements for identification and authentication technology. [0003] Traditional identification methods include identification items (such as keys, certificates, ATM cards, etc.) and identification knowledge (such as user na...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32G06K9/00
CPCH04L9/3228H04L9/3231G06V40/1347G06V40/1365
Inventor 李恒建邱建董吉文冯光
Owner UNIV OF JINAN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products