Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Biological characteristic remote authentication method based on visual codes

A biometric, remote authentication technology, applied in the field of biometric remote authentication based on visual password, can solve the problems of no longer recovering secret biometric images, stealing and improving secret biometric images, etc., to ensure recoverability, The effect of ensuring safety and ensuring stability

Inactive Publication Date: 2012-04-11
XIDIAN UNIV
View PDF2 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] First of all, the two-to-two threshold visual cryptography method can recover the secret biometric image only when all shares are owned at the same time, so once any share stored in the server is destroyed, the secret biometric image cannot be recovered;
[0005] Secondly, since biometric matching is generally performed on the client side, the share image must be transmitted to the client. However, the two-to-two threshold visual encryption method is simple in construction and only generates two shares. During the transmission process, once the two shares are lost at the same time , the chances of stealing a secret biometric image are greatly increased

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Biological characteristic remote authentication method based on visual codes
  • Biological characteristic remote authentication method based on visual codes
  • Biological characteristic remote authentication method based on visual codes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In the specific implementation manner, with reference to the accompanying drawings, the specific flow of a complete biometric remote authentication method based on visual passwords will be described in detail.

[0030] refer to figure 1 , the biometric remote authentication method based on visual password of the present invention includes several steps of registration, encryption, decryption and authentication, wherein the registration and encryption process is as follows: figure 2 As shown, the decryption and authentication process is as follows image 3 As shown, the specific steps are as follows:

[0031] Step 1: Register the user U in the biometric remote authentication system, and acquire the registered biometric image SI of the user U through the sensor.

[0032] Step 2: Encrypt the obtained registered biometric image SI by using the visual password method on the general access structure:

[0033] 2a) Perform binarization preprocessing on the obtained register...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a biological characteristic remote authentication method based on visual codes, which is used for solving potential security hazards in data storage and transmission in the traditional biological characteristic remote authentication system. The method comprises the following steps: registering a user; storing a registered biological characteristic image into multiple shares by a visual code method on a common access structure, defining a permission set of share images, and ensuring that only share combinations in the permission set can recover the registered biological characteristic image; superposing any share combinations in the permission set, and carrying out logic or operation to decrypt the registered biological characteristic image; and finally, authenticating the access user by using the decrypted registered biological characteristic images. The invention can ensure that the secret biological characteristic image can be recovered when any share images are damaged, and ensure no leakage of secret biological characteristic image information even if part of shares are thieved, thereby enhancing the data storage and transmission security in the biological characteristic remote authentication process.

Description

technical field [0001] The invention belongs to the technical field of network security, and relates to the security technology of biological feature privacy protection in the remote authentication process, specifically a biological feature based on a visible password on a general access structure, such as fingerprints, irises, faces, etc., remotely The authentication method is used to secretly store the biometrics in the database using the visual password method on the general access structure, so as to ensure the security of the biometric data in the process of transmission and storage. Background technique [0002] In the process of biometric remote authentication, in order to ensure that biometric data are not maliciously damaged and stolen, security protection technology is needed as support. In most existing schemes, the method of organically integrating the key and the biometric template data is usually used to ensure the security of the biometric data during storage ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
Inventor 庞辽军练春锋曹凯赵恒刘而云梁继民田捷
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products