CN101729256A - Security certificate method based on fingerprint, cryptographic technology and fragile digital watermark - Google Patents

Security certificate method based on fingerprint, cryptographic technology and fragile digital watermark Download PDF

Info

Publication number
CN101729256A
CN101729256A CN200810216782A CN200810216782A CN101729256A CN 101729256 A CN101729256 A CN 101729256A CN 200810216782 A CN200810216782 A CN 200810216782A CN 200810216782 A CN200810216782 A CN 200810216782A CN 101729256 A CN101729256 A CN 101729256A
Authority
CN
China
Prior art keywords
fingerprint
information
watermark
digital
image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN200810216782A
Other languages
Chinese (zh)
Other versions
CN101729256B (en
Inventor
刘连生
刘海生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen POKA Electronic Equipment Co., Ltd.
Shenzhen Rongxin Software Technology Co., Ltd.
Original Assignee
SHENZHEN POKA ELECTRONIC EQUIPMENT CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN POKA ELECTRONIC EQUIPMENT CO Ltd filed Critical SHENZHEN POKA ELECTRONIC EQUIPMENT CO Ltd
Priority to CN2008102167827A priority Critical patent/CN101729256B/en
Publication of CN101729256A publication Critical patent/CN101729256A/en
Application granted granted Critical
Publication of CN101729256B publication Critical patent/CN101729256B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a security certificate method based on fingerprint, cryptographic technology and fragile digital watermark, comprising the following steps: a sender collects a fingerprint image, calculates summary information of the fingerprint image and inserts the summary information, a secret key and digital information which is digitally signed and encrypted into the fingerprint image as a watermark; the fingerprint of the sender is collected, the fingerprint image inserted with the watermark is sent to a receiver after the fingerprint of the sender is qualified; after receiving information, the receiver firstly detects and verifies whether the fingerprint image is inserted with the digital watermark and whether the digital watermark is right or not so as to indentify identity authenticity; digital watermark information is extracted from the received image; the summary information of the fingerprint image from which the watermark is extracted is calculated; and the summary information is compared with the summary information of the fingerprint image recorded in the watermark information to approve information authenticity. The invention can effectively overcome the defects that the existing digital signature security certificate can not approve the legal KEY holder and the fingerprint in the fingerprint certificate is easy to clone and embezzle.

Description

Safety certifying method based on fingerprint, cryptographic technique, fragile digital watermark
Technical field
The present invention relates to computer technology, information security technology, Information Hiding Techniques, specifically is a kind ofly to distinguish the safety certifying method of identity and information truth and non repudiation based on what fingerprint, cryptographic technique, fragile digital watermark combined to solve network condition.
Background technology
Usually people mainly are the safety that guarantees its identity and information and communication by cryptographic technique in the mode of encryption at the computer information safe system aspects to the encryption of identity and information, but the safety in guaranteeing identity and information and transmit cybertimes, the fail safe of the technique guarantee that only accesses to your password system is normally not enough.No matter the encrypting and deciphering system that contemporary cryptology develops is symmetric-key systems (as DES), or the higher open key system (RSA) of fail safe, handle the ciphertext that is generated through cryptographic algorithm and have randomness, not readable, clearly pointed out the existence of security information on the contrary, thereby be easy to cause supervisor's attention, and carry out on this basis to the decoding of ciphertext or to sender and recipient's attack.Another the potential deficiency that adopts encryption technology is along with the developing rapidly of computer hardware, has the technology that cracks increasingly mature of computing capability, only reaches by increasing key length that to strengthen fail safe no longer be unique feasible method.The possibility that password is cracked is increasing, its content of back is just fully transparent in case enciphered data is cracked, even illicit interception person can't decode after intercepting and capturing ciphertext, but send again after it can being destroyed, make the message that receives to be translated into expressly the deficiency that this also is to use password to exist in fail safe.
2008 the 4th phases " computer and information technology " disclose one piece and have been named as the paper of " based on the eCheck means of payment security study of digital watermarking and digital signature ", author Li You.This article has been discussed the implementation procedure of existing eCheck system in detail, has analyzed the digital signature correlated process that wherein relates to, and then has pointed out: be that the payment system that ensures satisfies following requirement substantially with the digital signature: the 1. non repudiation of Fa Songing; 2. the non-repudiation of Jie Shouing; 3. receive information content integrality.But because digital signature itself need be attached to sending on the eCheck, so it has the danger of being deleted by the disabled user; Simultaneously,, then have to intercept, thereby the danger of revealing business secret is arranged by the hacker if eCheck sends with clear-text way.For the latter, general solution is to send after adopting conventional encryption technique to encrypt, but development along with computer hardware technique, the possibility that password is decrypted is increasing, even illicit interception person can't decode after intercepting and capturing ciphertext, but send again after it can being destroyed, make the message that receives to be translated into expressly.This paper proposes a kind of eCheck payment system that combines digital watermarking and digital signature at last, its cardinal principle be with by digital signature and the check information after encrypting and digital envelope together as watermark, PKI with the other side is embedded in the carrier picture with the embedding algorithm as password, transmit then, thereby realize secret, safe, invisible and full communication, at the watermark extracting end, after receiving the watermark picture, key with oneself extracts watermark by the watermark extracting algorithm, after determining the watermark integrality, extract eCheck again, handle.This system has added digital watermark on the basis of original payment system based on digital signature, the characteristic that hides Info of the integrity protection of half breakable watermark and watermark makes the payment process of eCheck have higher fail safe.But still there is certain defective in this system aspect safety certification, show: it is a kind of safety certification based on PKI (Public Key Infrastructure), CA (Certification Authority) can only confirm the legitimacy of KEY, and can't determine the legal holder of KEY.
All there are certain defective in the cryptographic technique and the fingerprint identification technology of extensive use at present aspect safety certification, as the safety certification based on PKI, CA can only confirm the legitimacy of KEY, and can't determine the legal holder of KEY; Because the physiological property of fingerprint is constant throughout one's life, can distinguish by biological characteristic and to determine its identity, but fingerprint exists simultaneously and cloned the risk of illegally usurping.
Application number is 02111629.6, denomination of invention is a kind of for the Chinese invention patent based on the lossless image digital watermark method of integer wavelet, the artificial Xuan Guorong of application discloses embeds data with computer software in digital picture, and can can't harm the processing method of recovery, it describes embed digital watermark in detail and extracts the method for digital watermarking, wherein, the method of embed digital watermark comprises: grey level histogram adjustment for the first time, small echo direct transform, data embedding, inverse wavelet transform, grey level histogram adjustment for the second time, formation adds watermark image.The method of extracting digital watermarking comprises: grey level histogram adjustment for the third time, small echo direct transform, data extract, inverse wavelet transform, the 4th grey level histogram adjustment, recover initial image.This method can make digital watermarking and all energy 100% recoveries of original picture of information such as comprising the literal relevant with image, image, voice.
Summary of the invention
The purpose of this invention is to provide a kind of safety certifying method that combines based on fingerprint, cryptographic technique, fragile digital watermark, when realizing safety certification to solve existing employing digital watermarking and digital signature, can only confirm the legitimacy of KEY, and can't determine the legal holder of KEY, and existing computer fingerprint authentication exists fingerprint to be cloned the technical problem of illegally usurping easily, reaches the target to the true and unique non repudiation authentication of identity.
The present invention is based on integer wavelet algorithm damage-free digital watermarking, utilize fingerprint image as carrier, simultaneously also with digital identity and biological identity binding, secret information or out of Memory are embedded in the fingerprint image, by fingerprint image being embedded the extraction and the checking of secret information or out of Memory, effectively differentiate the authenticity of fingerprint, thereby reach affirmation to the identity authenticity, effectively having solved can be by clone's defective by the computer system fingerprint, effectively prevent the risk that fingerprint is stolen, thereby reach the true and unique non repudiation authentication goals of identity.
Technical scheme of the present invention is as follows: a kind of safety certifying method that combines based on fingerprint, cryptographic technique, fragile digital watermark may further comprise the steps:
Transmit leg is gathered fingerprint image, to described fingerprint image meter summary info, described summary info is embedded in the described fingerprint image as watermark with key and by the digital information after digital signature and the encryption;
By the fingerprint USBKEY of transmitting terminal, the fingerprint of gathering the sender also carries out finger print identifying, authenticates watermarked fingerprint image to be sent to the recipient after legal;
The recipient is after receiving information, at first to the authenticity verification of identity, comprise: detection validation fingerprint image embed digital watermark whether at first, if detect digital watermarking, verify again whether digital watermarking is correct, the authenticity of sender's identity is identified if digital watermarking is correct, is not identified if detect the authenticity identification of then sender's incorrect less than digital watermarking or watermark identity; Behind the authenticity verification of identity, the authenticity verification of the information of carrying out, comprise: from the image that receives, extract digital watermark information, with the algorithm identical the fingerprint image that extracts after the watermark is recomputated summary info with transmit leg, and with watermark information in the fingerprint image summary info put down in writing relatively, if identical, then qualified information is genuine and believable, otherwise its information is not genuine and believable information, is the information of distorting.
Wherein, adopt the summary info of SHA256 algorithm computation fingerprint image.But transmit leg and the identical algorithm of the essential employing of recipient, such as: the summary info that adopts SHA256 algorithm computation fingerprint image before transmit leg is watermarked, the recipient also must adopt the SHA256 algorithm during summary info of the fingerprint image after calculating recovers after extracting watermark so.
Described fingerprint USBKEY comprises safety chip, and external fingerprint sensor of safety chip and USB interface are integrated with watermark and embed program, watermark extracting program, fingerprint comparison program and basic cryptographic algorithm in the safety chip.Wherein, can adopt the lossless image digital watermark based on integer wavelet to embed or extract damage-free digital watermarking to carrier image, described damage-free digital watermarking is meant that the information of embedding is harmless when extracting, and carrier image is also harmless after information extraction.
The present invention is with digital watermark technology, digital signature and fingerprint recognition organically combine, it does carrier with fingerprint image, summary info with fingerprint image, and the digital information after encryption and digital signature embeds in the described fingerprint image together as watermark, then fingerprint image is transferred to the recipient, realized the hidden transmission of information, in message transmitting procedure, if third party's monitoring or intercepting, being seen just fingerprint picture, if this image is carried out any processing, all will cause digital watermarking to damage, and therefore increase the sensitiveness of transmission information to attacking or distorting, this is that cryptographic technique can't be accomplished.
Owing to adopted finger print identifying, information transmitter at first will have digital certificate, and by biological identification (being fingerprint recognition), just can send information.And since with the summary info of fingerprint image also as watermark, so the summary info that the recipient can be by calculate recovering the back fingerprint image and with watermark in the summary info put down in writing compare, differentiate the authenticity of fingerprint, realization authenticates the legal holder of KEY, can't the legal holder of KEY be authenticated thereby can overcome effectively in the existing digital signature safety certification, and the technological deficiency that fingerprint is easily usurped by the clone in the existing finger print identifying.
Description of drawings
Fig. 1 is the theory diagram of fingerprint USBKEY among the present invention;
Fig. 2 is a basic application architecture of the present invention;
Fig. 3 is a security model block diagram of the present invention;
Fig. 4 is message transmitting procedure schematic diagram among the present invention.
Embodiment
The present invention is based on integer wavelet algorithm damage-free digital watermarking, utilize fingerprint image as carrier, simultaneously also with digital identity and biological identity binding, secret information or out of Memory are embedded in the fingerprint image, by fingerprint image being embedded the extraction and the checking of secret information or out of Memory, effectively differentiate the authenticity of fingerprint, thereby reach affirmation to the identity authenticity, effectively having solved can be by clone's defective by the computer system fingerprint, effectively prevent the risk that fingerprint is stolen, thereby reach the true and unique non repudiation authentication goals of identity.
With reference to Fig. 1, fingerprint USBKEY among the present invention adopts homemade encryption chip, watermark embedding, watermark extracting, fingerprint comparison, basic cryptographic algorithm etc. are integrated in the same chip, the outside connects fingerprint sensor, be used to gather fingerprint image, all calculating process is all finished in chip, has high fail safe.The method that the present invention proposes can make up all kinds of application systems that need safety certification, the basic structure of using as shown in Figure 2, security model of the present invention as shown in Figure 3, message transmitting procedure is as shown in Figure 4.Below explanation respectively.
Authentication method of the present invention is based on the basic cryptographic service of PKI system, with biological identity and digital identity binding, realizes the authenticity verification of networking by digital watermark technology.
Information transmitter at first will have the legal identity (digital certificate) in the system, and by biological identity (fingerprint) identification, just can send information.This process realizes in fingerprint USBKEY.After the information that the sender will need to send is handled (as encryption, signature etc.), these information are embedded in the fingerprint image, then fingerprint image are sent to the other side by network by digital watermark technology.
In message transmitting procedure, if third party's monitoring or intercepting, being seen just fingerprint picture, if this image is carried out any processing, all will cause digital watermarking to damage, and therefore increase the sensitiveness of transmission information to attacking or distorting, this is that cryptographic technique can't be accomplished.
The information receiver at first detects the integrality of watermark after receiving information, if the watermark destroyed maybe can't be discerned, illustrate that then this information is insincere, is attacked or distorts.If watermark detection is legal, then extract the information in the image, handle (as deciphering, test label) accordingly.
Application flow of the present invention:
One, identity authenticity verification flow process
The collection image (256 grades of gray scales) that takes the fingerprint, image is counted summary info with SHA256, with related abstract information, key, signature digital information are embedded in the fingerprint image of being gathered, and then fingerprint authenticated, have only legal identity just the unique non repudiation fingerprint image of embedding information can be sent to the recipient by authentication.
The recipient is after receiving information, at first to the authenticity verification of identity, the flow process of authentication is: detection validation fingerprint image embed digital watermark whether at first, if detect digital watermarking, verify again whether digital watermarking is correct, only under the two simultaneously correct situation, just confirm true unique non repudiation of its authentication people identity, otherwise the authenticity identification of its identity just can not get confirming.
Two, the authenticity verification flow process of information
The recipient is after receiving information, whether embed digital watermark related abstract information, key, signature digital information are at first arranged in the detected image information, if have digital watermark information then it is extracted, the fingerprint image after recovering (is just extracted the image after the watermark with SHA256.Owing to adopted based on integer wavelet algorithm damage-free digital watermarking technology, so all energy 100% recoveries of digital watermarking and original fingerprint image) recomputate summary info, and with image in the value (being the value of the summary info of the original fingerprint image that extracts of transmit leg) of the SHA256 that extracts compare authentication, if it is identical, then qualified information is genuine and believable, otherwise its information is not genuine and believable information, be the information of distorting, thereby reach judgement and identification true unique non repudiation of information.
Among the present invention, the safety certification of the authenticity of identity and information can realize remote authentication by network, also can local authentication, comprise the authentication of biological identity, the authentication of digital identity and the unique corresponding relation of the two.

Claims (4)

1. safety certifying method that combines based on fingerprint, cryptographic technique, fragile digital watermark is characterized in that may further comprise the steps:
Transmit leg is gathered fingerprint image, to described fingerprint image meter summary info, described summary info is embedded in the described fingerprint image as watermark with key and by the digital information after digital signature and the encryption;
By the fingerprint USBKEY of transmitting terminal, the fingerprint of gathering the sender also carries out finger print identifying, authenticates watermarked fingerprint image to be sent to the recipient after legal;
The recipient is after receiving information, at first to the authenticity verification of identity, comprise: detection validation fingerprint image embed digital watermark whether at first, if detect digital watermarking, verify again whether digital watermarking is correct, the authenticity of sender's identity is identified if digital watermarking is correct, is not identified if detect the authenticity identification of then sender's incorrect less than digital watermarking or watermark identity; Behind the authenticity verification of identity, the authenticity verification of the information of carrying out, comprise: from the image that receives, extract digital watermark information, with the algorithm identical the fingerprint image that extracts after the watermark is recomputated summary info with transmit leg, and with watermark information in the fingerprint image summary info put down in writing relatively, if identical, then qualified information is genuine and believable, otherwise its information is not genuine and believable information, is the information of distorting.
2. safety certifying method according to claim 1 is characterized in that: the summary info that adopts SHA256 algorithm computation fingerprint image.
3. safety certifying method according to claim 1, it is characterized in that: described fingerprint USBKEY comprises safety chip, external fingerprint sensor of safety chip and USB interface are integrated with watermark and embed program, watermark extracting program, fingerprint comparison program and basic cryptographic algorithm in the safety chip.
4. safety certifying method according to claim 3, it is characterized in that: adopt lossless image digital watermark to embed or extract damage-free digital watermarking to carrier image based on integer wavelet, described damage-free digital watermarking is meant that the information of embedding is harmless when extracting, and carrier image is also harmless after information extraction.
CN2008102167827A 2008-10-24 2008-10-24 Security certificate method based on fingerprint, cryptographic technology and fragile digital watermark Active CN101729256B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008102167827A CN101729256B (en) 2008-10-24 2008-10-24 Security certificate method based on fingerprint, cryptographic technology and fragile digital watermark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008102167827A CN101729256B (en) 2008-10-24 2008-10-24 Security certificate method based on fingerprint, cryptographic technology and fragile digital watermark

Publications (2)

Publication Number Publication Date
CN101729256A true CN101729256A (en) 2010-06-09
CN101729256B CN101729256B (en) 2012-08-08

Family

ID=42449536

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008102167827A Active CN101729256B (en) 2008-10-24 2008-10-24 Security certificate method based on fingerprint, cryptographic technology and fragile digital watermark

Country Status (1)

Country Link
CN (1) CN101729256B (en)

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102970307A (en) * 2012-12-21 2013-03-13 网秦无限(北京)科技有限公司 Password safety system and password safety method
CN103198558A (en) * 2013-02-06 2013-07-10 深圳宝嘉电子设备有限公司 Bank counter intelligent processing terminal
CN103634328A (en) * 2013-12-19 2014-03-12 青岛海尔软件有限公司 Authentication method, device and system for network platform authentication server
CN103677631A (en) * 2013-11-15 2014-03-26 北京智谷睿拓技术服务有限公司 Information interaction method and information interaction device
CN103984935A (en) * 2014-05-28 2014-08-13 深圳市中兴移动通信有限公司 Mobile terminal and fingerprint usage method and device thereof
CN104112201A (en) * 2013-04-22 2014-10-22 中国银联股份有限公司 Electronic bill data transmitting and receiving methods and apparatuses
CN104393998A (en) * 2014-12-10 2015-03-04 郑鹏 Intelligent encryption method for computer information transmission
CN104935783A (en) * 2015-06-15 2015-09-23 北京邮电大学 Safe and active image tampering detection method and device
CN104980278A (en) * 2014-04-14 2015-10-14 阿里巴巴集团控股有限公司 Method and device for verifying usability of biological characteristic image
CN106096335A (en) * 2016-06-08 2016-11-09 北京小米移动软件有限公司 Copyright information detection method, copyright information detection device and electronic equipment
CN107395361A (en) * 2017-07-25 2017-11-24 成都国科微电子有限公司 The conversion of information source data and authentication method and system
CN107818264A (en) * 2017-10-16 2018-03-20 深圳市英尔科技有限公司 Environmental protecting commonweal activity monitoring method, equipment and computer-readable recording medium
CN108564367A (en) * 2018-04-11 2018-09-21 郑鸿 A kind of encrypted algorithm of payment
CN108615216A (en) * 2018-03-22 2018-10-02 北京印刷学院 A kind of holographic watermark authentication method of notarial
CN108900298A (en) * 2018-07-11 2018-11-27 长春大学 Privately owned block chain honesty entity authentication cut-in method based on quantum cryptography watermark
WO2018214669A1 (en) * 2017-05-22 2018-11-29 京东方科技集团股份有限公司 Data processing method, data processing device and computer readable storage medium
CN109145563A (en) * 2018-08-13 2019-01-04 阿里巴巴集团控股有限公司 A kind of auth method and device
CN109274644A (en) * 2018-08-21 2019-01-25 华为技术有限公司 A kind of data processing method, terminal and watermark server
CN109587518A (en) * 2017-09-28 2019-04-05 三星电子株式会社 Image transmission, the method and system on chip for operating image transmission
CN110036391A (en) * 2016-11-10 2019-07-19 迈克菲公司 Bulk of optical feedback for visual identity certification
CN110535649A (en) * 2019-04-15 2019-12-03 清华大学 Data circulation method, system and service platform, first terminal equipment
CN111970114A (en) * 2020-08-31 2020-11-20 中移(杭州)信息技术有限公司 File encryption method, system, server and storage medium
CN113032756A (en) * 2021-03-19 2021-06-25 厦门熵基科技有限公司 Data access authorization authentication system and method
CN113286055A (en) * 2021-05-25 2021-08-20 郑州信大捷安信息技术股份有限公司 Safe vehicle driving method and system based on safe traffic signs
CN113701832A (en) * 2021-08-28 2021-11-26 上海光华仪表有限公司 Control method and system of high-voltage union electromagnetic flowmeter
WO2024027783A1 (en) * 2022-08-05 2024-02-08 华为技术有限公司 Method and system for processing digital content, method and system for confirming copyrights of digital content, and method and system for tracing digital content

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4164494B2 (en) * 2002-07-26 2008-10-15 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ Digital data sequence identification
CN1991901A (en) * 2005-12-31 2007-07-04 北京华旗数码影像技术研究院有限责任公司 Method and device for embedding finger water-print information
CN101059863A (en) * 2006-04-20 2007-10-24 刘瑞祯 Embed and detection method for identifying water mark, its system and uses

Cited By (46)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102970307A (en) * 2012-12-21 2013-03-13 网秦无限(北京)科技有限公司 Password safety system and password safety method
WO2014094389A1 (en) * 2012-12-21 2014-06-26 北京网秦天下科技有限公司 Password security system and password security method
CN102970307B (en) * 2012-12-21 2016-01-13 网秦无限(北京)科技有限公司 Cipher safety system and password safety method
CN103198558B (en) * 2013-02-06 2014-12-10 深圳宝嘉电子设备有限公司 Bank counter intelligent processing terminal
CN103198558A (en) * 2013-02-06 2013-07-10 深圳宝嘉电子设备有限公司 Bank counter intelligent processing terminal
CN104112201B (en) * 2013-04-22 2018-05-18 中国银联股份有限公司 The method of sending and receiving and equipment of electronic bill data
CN104112201A (en) * 2013-04-22 2014-10-22 中国银联股份有限公司 Electronic bill data transmitting and receiving methods and apparatuses
CN103677631A (en) * 2013-11-15 2014-03-26 北京智谷睿拓技术服务有限公司 Information interaction method and information interaction device
CN103634328A (en) * 2013-12-19 2014-03-12 青岛海尔软件有限公司 Authentication method, device and system for network platform authentication server
TWI701934B (en) * 2014-04-14 2020-08-11 香港商阿里巴巴集團服務有限公司 Method and device for verifying availability of biometric image
US10360463B2 (en) 2014-04-14 2019-07-23 Alibaba Group Holding Limited Method and apparatus of verifying usability of biological characteristic image
CN104980278A (en) * 2014-04-14 2015-10-14 阿里巴巴集团控股有限公司 Method and device for verifying usability of biological characteristic image
CN104980278B (en) * 2014-04-14 2018-11-16 阿里巴巴集团控股有限公司 The method and apparatus for verifying the availability of biometric image
CN103984935A (en) * 2014-05-28 2014-08-13 深圳市中兴移动通信有限公司 Mobile terminal and fingerprint usage method and device thereof
CN104393998A (en) * 2014-12-10 2015-03-04 郑鹏 Intelligent encryption method for computer information transmission
CN104935783B (en) * 2015-06-15 2017-10-03 北京邮电大学 A kind of safe active distorted image detection method and device
CN104935783A (en) * 2015-06-15 2015-09-23 北京邮电大学 Safe and active image tampering detection method and device
CN106096335A (en) * 2016-06-08 2016-11-09 北京小米移动软件有限公司 Copyright information detection method, copyright information detection device and electronic equipment
US11836827B2 (en) 2016-11-10 2023-12-05 Mcafee, Llc Optical feedback for visual recognition authentication
CN110036391B (en) * 2016-11-10 2023-05-02 迈克菲有限责任公司 Optical feedback for visual identification authentication
CN110036391A (en) * 2016-11-10 2019-07-19 迈克菲公司 Bulk of optical feedback for visual identity certification
WO2018214669A1 (en) * 2017-05-22 2018-11-29 京东方科技集团股份有限公司 Data processing method, data processing device and computer readable storage medium
US11586742B2 (en) 2017-05-22 2023-02-21 Boe Technology Group Co., Ltd. Data processing method, data processing device, and computer readable storage medium
CN107395361A (en) * 2017-07-25 2017-11-24 成都国科微电子有限公司 The conversion of information source data and authentication method and system
CN109587518B (en) * 2017-09-28 2022-06-07 三星电子株式会社 Image transmission apparatus, method of operating the same, and system on chip
US11228438B2 (en) 2017-09-28 2022-01-18 Samsung Electronics Co., Ltd. Security device for providing security function for image, camera device including the same, and system on chip for controlling the camera device
CN109587518A (en) * 2017-09-28 2019-04-05 三星电子株式会社 Image transmission, the method and system on chip for operating image transmission
CN107818264B (en) * 2017-10-16 2020-04-14 深圳市英尔科技有限公司 Environment-friendly public welfare activity monitoring method and device and computer readable storage medium
CN107818264A (en) * 2017-10-16 2018-03-20 深圳市英尔科技有限公司 Environmental protecting commonweal activity monitoring method, equipment and computer-readable recording medium
CN108615216A (en) * 2018-03-22 2018-10-02 北京印刷学院 A kind of holographic watermark authentication method of notarial
CN108564367A (en) * 2018-04-11 2018-09-21 郑鸿 A kind of encrypted algorithm of payment
CN108900298B (en) * 2018-07-11 2020-09-18 长春大学 Quantum cipher watermark-based private block chain honest node authentication access method
CN108900298A (en) * 2018-07-11 2018-11-27 长春大学 Privately owned block chain honesty entity authentication cut-in method based on quantum cryptography watermark
CN109145563A (en) * 2018-08-13 2019-01-04 阿里巴巴集团控股有限公司 A kind of auth method and device
CN109145563B (en) * 2018-08-13 2022-04-22 创新先进技术有限公司 Identity verification method and device
CN109274644B (en) * 2018-08-21 2020-12-25 华为技术有限公司 Data processing method, terminal and watermark server
CN109274644A (en) * 2018-08-21 2019-01-25 华为技术有限公司 A kind of data processing method, terminal and watermark server
CN110535649B (en) * 2019-04-15 2020-11-03 清华大学 Data circulation method and system, service platform and first terminal device
CN110535649A (en) * 2019-04-15 2019-12-03 清华大学 Data circulation method, system and service platform, first terminal equipment
CN111970114A (en) * 2020-08-31 2020-11-20 中移(杭州)信息技术有限公司 File encryption method, system, server and storage medium
CN111970114B (en) * 2020-08-31 2023-08-18 中移(杭州)信息技术有限公司 File encryption method, system, server and storage medium
CN113032756A (en) * 2021-03-19 2021-06-25 厦门熵基科技有限公司 Data access authorization authentication system and method
CN113286055A (en) * 2021-05-25 2021-08-20 郑州信大捷安信息技术股份有限公司 Safe vehicle driving method and system based on safe traffic signs
CN113286055B (en) * 2021-05-25 2022-03-15 郑州信大捷安信息技术股份有限公司 Safe vehicle driving method and system based on safe traffic signs
CN113701832A (en) * 2021-08-28 2021-11-26 上海光华仪表有限公司 Control method and system of high-voltage union electromagnetic flowmeter
WO2024027783A1 (en) * 2022-08-05 2024-02-08 华为技术有限公司 Method and system for processing digital content, method and system for confirming copyrights of digital content, and method and system for tracing digital content

Also Published As

Publication number Publication date
CN101729256B (en) 2012-08-08

Similar Documents

Publication Publication Date Title
CN101729256B (en) Security certificate method based on fingerprint, cryptographic technology and fragile digital watermark
JP5619911B2 (en) Authenticated data transmission
KR101853610B1 (en) Digital signature authentication system based on biometric information and digital signature authentication method thereof
CN103440444B (en) The signing method of electronic contract
EP1175749B1 (en) High security biometric authentication using a public key/private key encryption pairs
CN101107805B (en) Method and system of managing and filtering electronic messages using cryptographic techniques
WO2014154109A1 (en) Generating method, verifying method for electronic bill with anti-fake two dimension (2d) code and system for same
CN101334884B (en) Improve the method and system of account transfer safety
CN104052606B (en) Digital signature, signature authentication device and digital signature method
CN103985036A (en) Two-dimension code payment method with biological characteristics
CN101542971B (en) Fuzzy biometrics based signatures
Hämmerle-Uhl et al. Watermarking as a means to enhance biometric systems: A critical survey
JP2016520276A (en) System and method for biometric authentication with device certification
WO2006072047A2 (en) Electronic signature security system
JP5676592B2 (en) Robust biometric feature extraction with and without reference points
CN105631248A (en) Signing method, forging judgment method and tampering judgment method of electronic contract
CN101789067A (en) Electronic document signature protecting method and system
TW201539233A (en) Method and apparatus of verifying usability of biological characteristic image
Zhang et al. The Improvement of digital signature algorithm based on elliptic curve cryptography
US11888832B2 (en) System and method to improve user authentication for enhanced security of cryptographically protected communication sessions
CN104009842A (en) Communication data encryption and decryption method based on DES encryption algorithm, RSA encryption algorithm and fragile digital watermarking
CN108401494B (en) Method and system for transmitting data
Bogari et al. An investigative analysis of the security weaknesses in the evolution of RFID enabled passport
Ding et al. Protecting hidden transmission of biometrics using authentication watermarking
CN110990814A (en) Trusted digital identity authentication method, system, equipment and medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: SHENZHEN BAOJIA SOFTWARE TECHNOLOGY CO., LTD.

Effective date: 20120418

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 518057 SHENZHEN, GUANGDONG PROVINCE TO: 518053 SHENZHEN, GUANGDONG PROVINCE

TA01 Transfer of patent application right

Effective date of registration: 20120418

Address after: 518053 Guangdong city of Shenzhen province Nanshan District Qiaoxiang road Xiangnian North Plaza C block 804

Applicant after: Shenzhen POKA Electronic Equipment Co., Ltd.

Co-applicant after: Shenzhen POKA Software Technology Co., Ltd.

Address before: The South high tech Zone of Shenzhen City, Guangdong province 518057 a SKYWORTH building A805

Applicant before: Shenzhen POKA Electronic Equipment Co., Ltd.

C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee
CP01 Change in the name or title of a patent holder

Address after: 518053 Guangdong city of Shenzhen province Nanshan District Qiaoxiang road Xiangnian North Plaza C block 804

Patentee after: Shenzhen POKA Electronic Equipment Co., Ltd.

Patentee after: Shenzhen Rongxin Software Technology Co., Ltd.

Address before: 518053 Guangdong city of Shenzhen province Nanshan District Qiaoxiang road Xiangnian North Plaza C block 804

Patentee before: Shenzhen POKA Electronic Equipment Co., Ltd.

Patentee before: Shenzhen POKA Software Technology Co., Ltd.