Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method based on iris and private key certificate chain connection storage structure

An identity verification method and storage structure technology, applied in the field of identity verification based on iris and private key certificate chain connection storage structure

Active Publication Date: 2020-05-08
JILIN UNIV
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The main purpose of the present invention is to solve some security problems existing in the existing iris-based authentication method;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method based on iris and private key certificate chain connection storage structure
  • Identity authentication method based on iris and private key certificate chain connection storage structure
  • Identity authentication method based on iris and private key certificate chain connection storage structure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0076] Under the framework of claim 1, for 3 people (named A (gender: male), B (gender: female), C (gender: male), no complete records of A, B, and C have been made before, test iris and template The iris collector equipment of the iris remains unchanged) the whole process of operation:

[0077] 1) Randomly use a common iris collector on the market to collect 2000 template iris grayscale images of A.

[0078] 2) The computer system converts each template iris grayscale image of A into a 256×32-dimensional template iris normalized enhanced image by means of the Daugman rubber band method and the equalized histogram.

[0079] 3) The computer system extracts the template iris feature information of 2000 template iris normalized and enhanced images of A respectively.

[0080] 4) The computer system counts the template iris feature information of 2000 template iris normalized and enhanced images of A, obtains the template feature label of A composed of 15 numbers, stores the templ...

Embodiment 2

[0091] Under the framework of claim 1, for 3 people (named D (gender: female), E (gender: female), F (gender: male), no complete records of D, E, F have been made before, test iris and template The iris collector equipment of the iris remains unchanged) the whole process of operation:

[0092] 1) Randomly use a common iris collector on the market to collect 2000 template iris grayscale images of D.

[0093] 2) The computer system converts each template iris grayscale image of D into a 256×32 dimensional template iris normalized enhanced image by means of the Daugman rubber band method and the equalized histogram.

[0094] 3) The computer system extracts the template iris feature information of 2000 template iris normalized and enhanced images of D respectively.

[0095] 4) The computer system counts the template iris feature information of 2000 template iris normalized enhanced images of D, obtains the template feature label of D composed of 15 numbers, stores the template fe...

Embodiment 3

[0106] Under the framework of claim 1, the whole process of operation for 4 people (named G, Q, T, M, who have made a complete record of G, Q, T before, but have not made a complete record of M):

[0107] 1) M forges a private key certificate, and uses a computer to read the verification information in the forged private key certificate, and matches the verification information with the certificate verification information in the certificate information blocks of G, Q, and T in turn. The certificate information block is found, so the output result: 0.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity authentication method based on an iris and private key certificate chain connection storage structure. The method comprises the following steps: step 1 of collecting a gray level image; step 2 of normalizing an enhanced image; step 3 of obtaining template iris feature information; step 4 of running statistics on the template iris feature information; step 5 of manufacturing a private key certificate; step 6 of storing the information into a personal information block; step 7 of constructing a complete record; step 8 of making a complete record; step 9 of outputting a number 0 to a tester; step 10 of testing one iris grayscale image; step 11 of testing the iris normalization enhanced image; step 12 of reading a template feature label; step 13 of carryingout identity verification; the beneficial effects of the method are that even if an illegal user passes certificate verification after stealing the certificate, a correct result cannot be obtained dueto the fact that iris recognition verification cannot be passed, and therefore the risk that personal information of the user is tampered and invaded by the illegal user is prevented through the double mechanisms of the private key certificate and iris recognition.

Description

[0001] The invention relates to an identity verification method for strengthening information security storage, in particular to an identity verification method based on a storage structure connected with an iris and a private key certificate chain. Background technique [0002] At present, the current information revolution continues to unfold, and more automated and intelligent technologies are beginning to be applied in daily life. While improving the quality of human life, human identification has become an increasingly important and important Challenging work. The iris, as a human body feature that is not easy to be copied, is favored by those places with high confidentiality and high security, such as military bases and vaults. [0003] Due to the uniqueness of iris, once the iris user's characteristic data is stolen, there will be a high security risk. The current research on iris information security focuses on two aspects, one is to prevent data from being modified, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32G06K9/00G06N3/04
CPCH04L9/3231H04L9/3265G06V40/193G06N3/045
Inventor 刘帅刘元宁朱晓冬董立岩崔靖威张齐贤吴祖慷王超群李昕龙姜雪朱琳杨亚男董霖
Owner JILIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products