期刊文献+

人脸识别智能终端的安全实现及验证 被引量:1

Security implementation and verification of face recognition intelligent terminal
原文传递
导出
摘要 通过分析人脸识别智能终端的特点和构成,将其可能面临的攻击手段按照攻击目标进行分类,分为:硬件层攻击、系统层攻击、应用层攻击和通信层攻击。针对系统层和通信层面临的安全风险提出设计方案,对设备的安全性进行了提升和加强,以确保人脸数据在采集、使用、传输等的过程中的安全性,并完成了针对性的测试,测试结果达到预期。即该安全防护方案,对于增强人脸识别终端中人脸数据的安全性是切实有效的。 The characteristics and composition of face recognition intelligent terminal is analyzed,and according to the attack target,the current attack means of this kind of terminal can be divided into:hardware layer attack,system layer attack,application layer attack and communication layer attack.In this paper,the design scheme is proposed for the security risks facing the system layer and the communication layer,and the security of the equipment is improved and strengthened,that ensure the security of face data in the process of collection,use,transmission and other processes.Also we do the targeted test,and the test results meet the expectations.The design and implementation of the security protection scheme mentioned in this paper is effective for enhancing the security of face data in face recognition terminals.
作者 唐培丽 黄贵玲 TANG Peili;HUANG Guiling(National Computer Quality Supervising&Testing Center,The 15th Research Institute of China Electronics Technology Group Corporation,Beijing 100083,China)
出处 《自动化与仪器仪表》 2023年第4期147-151,共5页 Automation & Instrumentation
关键词 人脸识别 侧信道攻击 TLS协议 密码安全 face recognition side channel attack TLS protocol Key security
  • 相关文献

参考文献11

二级参考文献57

  • 1宁玉梅,丁振国,曾平,王晨.基于双重身份认证的云计算访问控制模型[J].华中科技大学学报(自然科学版),2012,40(S1):288-292. 被引量:4
  • 2李武军,王崇骏,张炜,陈世福.人脸识别研究综述[J].模式识别与人工智能,2006,19(1):58-66. 被引量:107
  • 3Kocher P,Jaffe J,Jun B.Differential Power Analysis. Advances in Cryptology - CRYPTO ’99, 19th Annual International Cryptology Conference . 1999 被引量:2
  • 4Mangard S,Oswald E,Popp T.Power analysis attacks: Revealing the secrets of smart cards. . 2008 被引量:1
  • 5Messerges T S.Securing the AES finalists against power analysis attacks. Fast Software Encryption . 2001 被引量:1
  • 6Kai Schramm,Christof Paar.Higher Order Masking of the AES. CT-RSA 2006 . 2006 被引量:1
  • 7Oswald E,Mangard S,Herbst C,et al.Practical second-order DPA attacks for masked smart card implementations of block ciphers. Topics in Cryptology-CT-RSA 2006 . 2006 被引量:1
  • 8Benedikt Gierlichs,Lejla Batina,Bart Preneel,Ingrid Verbauwhede.Revisiting Higher-Order DPA Attacks. Topics in Cryptology-CT-RSA 2010 . 2010 被引量:1
  • 9Kocher P,Jaffe J,Jun B,et al.Introduction to differential power analysis. Journal of Cryptographic Engineering . 2011 被引量:1
  • 10WANG S T,GU D W,LIU J R,et al.A Power Analysis on SMS4 Using the Chosen Plaintext Method. 2013 9th International Conference on Computational Intelligence and Security (CIS) . 2013 被引量:1

共引文献43

同被引文献4

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部