首页 | 本学科首页   官方微博 | 高级检索  
     检索      

一种基于双光束干涉的分级身份认证方法
引用本文:何文奇,彭翔,孟祥锋,刘晓利.一种基于双光束干涉的分级身份认证方法[J].物理学报,2013,62(6):64205-064205.
作者姓名:何文奇  彭翔  孟祥锋  刘晓利
作者单位:1. 深圳大学光电工程学院, 光电子器件与系统教育部/广东省重点实验室, 深圳 518060;2. 山东大学信息科学与工程学院光学系, 山东省激光技术与应用重点实验室, 济南 250100
基金项目:国家自然科学基金(批准号: 61171073, 61275014, 61201355, 60907005)、中德科学中心中德合作研究项目(项目号: GZ760)、 山东省自然科学基金(批准号: ZR2011FQ011)、山东省科技计划项目(批准号: 2011GGH20119)、山东省优秀中青年科学家科研奖励基金项目(批准号: BS2011DX023)、深圳市科技研发资金项目(批准号: 0014632063100426032)和山东大学自主创新项目 (批准号: 2010TB019)资助的课题.
摘    要:提出一种基于双光束干涉的分级身份认证方法. 本方法通过同时验证用户的"口令"和"相位钥"以实现对用户身份的双重安全认证. 它不仅可以判断某个用户是否合法, 还能鉴别出其相应的身份级别, 从而确定并授予其相应的系统访问权限. 认证过程的核心功能组件是一个基于干涉的光学装置, 用户"口令" 控制的"相位锁" 和用户携带的"相位钥" 被分别加载至此装置中的两个空间光调制器(spatial light modulator, SLM), 两束相干光分别经过这两个SLMs的调制后, 在输出面得到一幅干涉图, 它被传送至计算机并与系统数据库中的"认证图像" 进行匹配, 以完成身份的鉴别. 系统的设计则是一个逆向的迭代求解问题, 本文根据事先给定的某个用户的身份级别(对应着某个认证图像)和随机给定的 "相位锁", 利用一种修正的相位恢复算法确定出其对应的"相位钥". 理论分析和仿真实验都证明了此方案是可行而有效的. 关键词: 干涉 傅里叶光学 相位恢复 身份认证

关 键 词:干涉  傅里叶光学  相位恢复  身份认证
收稿时间:2012-08-24

Multi-level authentication based on two-beam interference
He Wen-Qi,Peng Xiang,Meng Xiang-Feng,Liu Xiao-Li.Multi-level authentication based on two-beam interference[J].Acta Physica Sinica,2013,62(6):64205-064205.
Authors:He Wen-Qi  Peng Xiang  Meng Xiang-Feng  Liu Xiao-Li
Institution:1. College of Optoelectronics Engineering, Key Laboratory of Optoelectronic Devices and Systems of Ministry of Education and Guangdong Province, Shenzhen University, Shenzhen 518060, China;2. Department of Optics, School of Information Science and Engineering and Shandong Provincial Key Laboratory of Laser Technology and Application, Shandong University, Jinan 250100, China
Abstract:A method of multi-level authentication based on two-beam interference is proposed. By verifying the "password" and "phase key" of one user simultaneously, the system can thus achieve the two-factor authentication on the user's identity. This scheme can not only check the legality of one user, but also verify his identity level as an authorized user and then grant the user the corresponding permissions to access the system resources. While operating the authentication process, which largely depends on an optical setup based on interference, a "phase key" and a password-controlled "phase lock" are firstly loaded on two spatial light modulators (SLMs), separately. Then two coherent beams are respectively, modulated by the two SLMs and then interfere with each other, leading to an interference pattern in the output plane. It is recorded and transmitted to the computer to finish the last step of the authentication process: comparing the interference pattern with the standard verification images in the database of the system to verify whether it is an authorized user. When it turns to the system designing process for a user, which involves an iterative algorithm to acquire an estimated solution of an inverse problem, we need to determine the "phase key" according to a modified phase retrieval iterative algorithm under the condition of an arbitrarily given "phase lock" and a previously determined identity level (corresponding to a certain standard verification image). The theoretical analysis and simulation experiments both validate the feasibility and effectiveness of the proposed scheme.
Keywords:interference  fourier optics  phase retrieval  authentication
点击此处可从《物理学报》浏览原始摘要信息
点击此处可从《物理学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号