Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An identity verification method based on iris and private key certificate chain connection storage structure

An identity verification method and storage structure technology, applied in the field of identity verification based on iris and private key certificate chain connection storage structure

Active Publication Date: 2020-11-24
JILIN UNIV
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The main purpose of the present invention is to solve some security problems existing in the existing iris-based authentication method;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An identity verification method based on iris and private key certificate chain connection storage structure
  • An identity verification method based on iris and private key certificate chain connection storage structure
  • An identity verification method based on iris and private key certificate chain connection storage structure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0077] Under the framework of claim 1, for 3 people (named A (gender: male), B (gender: female), C (gender: male), no complete records of A, B, and C have been made before, test iris and template The iris collector equipment of the iris remains unchanged) the whole process of operation:

[0078] 1) Randomly use a common iris collector on the market to collect 2000 template iris grayscale images of A.

[0079] 2) The computer system converts each template iris grayscale image of A into a 256×32-dimensional template iris normalized enhanced image by means of the Daugman rubber band method and the equalized histogram.

[0080] 3) The computer system extracts the template iris feature information of 2000 template iris normalized and enhanced images of A respectively.

[0081] 4) The computer system counts the template iris feature information of 2000 template iris normalized and enhanced images of A, obtains the template feature label of A composed of 15 numbers, stores the templ...

Embodiment 2

[0092] Under the framework of claim 1, for 3 people (named D (gender: female), E (gender: female), F (gender: male), no complete records of D, E, F have been made before, test iris and template The iris collector equipment of the iris remains unchanged) the whole process of operation:

[0093] 1) Randomly use a common iris collector on the market to collect 2000 template iris grayscale images of D.

[0094] 2) The computer system converts each template iris grayscale image of D into a 256×32 dimensional template iris normalized enhanced image by means of the Daugman rubber band method and the equalized histogram.

[0095] 3) The computer system extracts the template iris feature information of 2000 template iris normalized and enhanced images of D respectively.

[0096] 4) The computer system counts the template iris feature information of 2000 template iris normalized enhanced images of D, obtains the template feature label of D composed of 15 numbers, stores the template fe...

Embodiment 3

[0107] Under the framework of claim 1, the whole process of operation for 4 people (named G, Q, T, M, who have made a complete record of G, Q, T before, but have not made a complete record of M):

[0108] 1) M forges a private key certificate, and uses a computer to read the verification information in the forged private key certificate, and matches the verification information with the certificate verification information in the certificate information blocks of G, Q, and T in turn. The certificate information block is found, so the output result: 0.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity authentication method based on the iris and a private key certificate chain connection storage structure, and the method is as follows: step 1, collecting a grayscale image; step 2, normalizing and enhancing the image; step 3, template iris feature information; step 4. Statistical template iris feature information; Step 5: Create a private key certificate; Step 6: Store in the personal information block; Step 7: Build a complete record; Step 8: Make a complete record; Step 9: Output the number 0 to the tester; Step 10: Test an iris grayscale image; Step 11: Test an iris normalized enhanced image; Step 12: Read the template feature label; Step 13: Perform identity verification; Beneficial effect: even if an illegal user steals a certificate After passing the certificate verification, the correct result cannot be obtained because the iris recognition verification cannot be passed. Therefore, the dual mechanism of private key certificate and iris recognition prevents the risk of the user's personal information being tampered with and intruded by illegal users.

Description

technical field [0001] The invention relates to an identity verification method for strengthening information security storage, in particular to an identity verification method based on a storage structure connected with an iris and a private key certificate chain. Background technique [0002] At present, the current information revolution continues to unfold, and more automated and intelligent technologies are beginning to be applied in daily life. While improving the quality of human life, human identification has become an increasingly important and important Challenging work. The iris, as a human body feature that is not easy to be copied, is favored by those places with high confidentiality and high security, such as military bases and vaults. [0003] Due to the uniqueness of iris, once the iris user's characteristic data is stolen, there will be a high security risk. The current research on iris information security focuses on two aspects, one is to prevent data fr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32G06K9/00G06N3/04
CPCH04L9/3231H04L9/3265G06V40/193G06N3/045
Inventor 刘帅刘元宁朱晓冬董立岩崔靖威张齐贤吴祖慷王超群李昕龙姜雪朱琳杨亚男董霖
Owner JILIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products