物理学报
物理學報
물이학보
2013年
6期
192-200
,共9页
何文奇?%彭翔?%孟祥锋%刘晓利
何文奇?%彭翔?%孟祥鋒%劉曉利
하문기?%팽상?%맹상봉%류효리
干涉%傅里叶光学%相位恢复%身份认证
榦涉%傅裏葉光學%相位恢複%身份認證
간섭%부리협광학%상위회복%신빈인증
interference%fourier optics%phase retrieval%authentication
提出一种基于双光束干涉的分级身份认证方法.本方法通过同时验证用户的“口令”和“相位钥”以实现对用户身份的双重安全认证.它不仅可以判断某个用户是否合法,还能鉴别出其相应的身份级别,从而确定并授予其相应的系统访问权限.认证过程的核心功能组件是一个基于干涉的光学装置,用户“口令”控制的“相位锁”和用户携带的“相位钥”被分别加载至此装置中的两个空间光调制器(spatial light modulator, SLM),两束相干光分别经过这两个SLMs的调制后,在输出面得到一幅干涉图,它被传送至计算机并与系统数据库中的“认证图像”进行匹配,以完成身份的鉴别.系统的设计则是一个逆向的迭代求解问题,本文根据事先给定的某个用户的身份级别(对应着某个认证图像)和随机给定的“相位锁”,利用一种修正的相位恢复算法确定出其对应的“相位钥”.理论分析和仿真实验都证明了此方案是可行而有效的.
提齣一種基于雙光束榦涉的分級身份認證方法.本方法通過同時驗證用戶的“口令”和“相位鑰”以實現對用戶身份的雙重安全認證.它不僅可以判斷某箇用戶是否閤法,還能鑒彆齣其相應的身份級彆,從而確定併授予其相應的繫統訪問權限.認證過程的覈心功能組件是一箇基于榦涉的光學裝置,用戶“口令”控製的“相位鎖”和用戶攜帶的“相位鑰”被分彆加載至此裝置中的兩箇空間光調製器(spatial light modulator, SLM),兩束相榦光分彆經過這兩箇SLMs的調製後,在輸齣麵得到一幅榦涉圖,它被傳送至計算機併與繫統數據庫中的“認證圖像”進行匹配,以完成身份的鑒彆.繫統的設計則是一箇逆嚮的迭代求解問題,本文根據事先給定的某箇用戶的身份級彆(對應著某箇認證圖像)和隨機給定的“相位鎖”,利用一種脩正的相位恢複算法確定齣其對應的“相位鑰”.理論分析和倣真實驗都證明瞭此方案是可行而有效的.
제출일충기우쌍광속간섭적분급신빈인증방법.본방법통과동시험증용호적“구령”화“상위약”이실현대용호신빈적쌍중안전인증.타불부가이판단모개용호시부합법,환능감별출기상응적신빈급별,종이학정병수여기상응적계통방문권한.인증과정적핵심공능조건시일개기우간섭적광학장치,용호“구령”공제적“상위쇄”화용호휴대적“상위약”피분별가재지차장치중적량개공간광조제기(spatial light modulator, SLM),량속상간광분별경과저량개SLMs적조제후,재수출면득도일폭간섭도,타피전송지계산궤병여계통수거고중적“인증도상”진행필배,이완성신빈적감별.계통적설계칙시일개역향적질대구해문제,본문근거사선급정적모개용호적신빈급별(대응착모개인증도상)화수궤급정적“상위쇄”,이용일충수정적상위회복산법학정출기대응적“상위약”.이론분석화방진실험도증명료차방안시가행이유효적.
@@@@A method of multi-level authentication based on two-beam interference is proposed. By verifying the“password”and“phase key”of one user simultaneously, the system can thus achieve the two-factor authentication on the user’s identity. This scheme can not only check the legality of one user, but also verify his identity level as an authorized user and then grant the user the corresponding permissions to access the system resources. While operating the authentication process, which largely depends on an optical setup based on interference, a“phase key”and a password-controlled“phase lock”are firstly loaded on two spatial light modulators (SLMs), separately. Then two coherent beams are respectively, modulated by the two SLMs and then interfere with each other, leading to an interference pattern in the output plane. It is recorded and transmitted to the computer to finish the last step of the authentication process:comparing the interference pattern with the standard verification images in the database of the system to verify whether it is an authorized user. When it turns to the system designing process for a user, which involves an iterative algorithm to acquire an estimated solution of an inverse problem, we need to determine the “phase key” according to a modified phase retrieval iterative algorithm under the condition of an arbitrarily given“phase lock”and a previously determined identity level (corresponding to a certain standard verification image). The theoretical analysis and simulation experiments both validate the feasibility and effectiveness of the proposed scheme.