CN101872436A - Multi-user synchronous fingerprint authentication method - Google Patents
Multi-user synchronous fingerprint authentication method Download PDFInfo
- Publication number
- CN101872436A CN101872436A CN200910049801A CN200910049801A CN101872436A CN 101872436 A CN101872436 A CN 101872436A CN 200910049801 A CN200910049801 A CN 200910049801A CN 200910049801 A CN200910049801 A CN 200910049801A CN 101872436 A CN101872436 A CN 101872436A
- Authority
- CN
- China
- Prior art keywords
- fingerprint
- fingerprint authentication
- finger print
- print information
- system database
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
The invention relates to a multi-user synchronous fingerprint authentication method comprising the following steps of: storing the hardware identification codes of a plurality of fingerprint authenticators in a system database to determine the uniqueness of the fingerprint authenticators; storing multi-user fingerprint information in the system database for invocation; triggering a multi-user synchronous fingerprint authentication system by users; transmitting fingerprint authentication information to the terminals of the fingerprint authenticators by using the system; transmitting the fingerprint information collected by the terminals of the fingerprint authenticators to the system database and simultaneously transmitting the hardware identification codes; storing and adding timestamps after receiving the fingerprint information by using the system database; calculating by applying the traditional fingerprint identification algorithm and comparing the collected fingerprint information with the pre-stored fingerprint information to obtain a matching result and store; and acquiring the matching result of each fingerprint information collected in the system database according to the preset rules and comparing the timestamps to obtain an authentication result in the time range allowable for the rule set. Compared with the prior art, the safety level of the invention is greatly improved.
Description
Technical field
The present invention relates to computer safety field, relate in particular to the method for multi-user synchronous fingerprint authentication.
Background technology
A hundred flowers blossom lets a hundred schools contend for algorithm for recognizing fingerprint, and various algorithms all have its merits and demerits.But say for security, carry out simple condition stack and can produce the effect that increases degree of safety at once.Condition 1 satisfied getting final product, satisfying simultaneously with condition 1, condition 2 satisfied conditions simultaneously 3 satisfy, the safe difference of this dual mode is apparent, and present algorithm for recognizing fingerprint does not carry out this consideration mostly, can not satisfy required but only a few relates to the algorithm of a plurality of verification conditions.
Summary of the invention
Purpose of the present invention is exactly in order to overcome the defective that above-mentioned prior art exists, and a kind of method of multi-user synchronous fingerprint authentication of easy-to-use and renewable upgrading is provided.
Purpose of the present invention can be achieved through the following technical solutions: the method for multi-user synchronous fingerprint authentication is characterized in that this method comprises:
(1) hardware identification code with many fingerprint authentication devices deposits system database in, determines the uniqueness of fingerprint authentication device with this;
(2) deposit many people finger print information in system database, in order to calling;
(2) user triggers the multi-user synchronous fingerprint authentication system;
(3) system sends fingerprint authentication information to fingerprint authentication device terminal;
(4) fingerprint authentication device terminal is sent to system database after gathering finger print information, and sends hardware identification code when sending finger print information;
(5) after system database was received finger print information, storage and additional period were stabbed;
(6) use any existing algorithm for recognizing fingerprint and calculate, the finger print information that contrast collects and the finger print information of pre-stored obtain matching result and storage;
(7) obtain the matching result of each finger print information that collects in the system database according to default rule, and compare timestamp, in rule is provided with the time range of permission, be verified the result.
When described fingerprint authentication device does not have hardware identification code, can make its subsidiary identification code when sending finger print information by adding the EEPROM interlock circuit.
Compared with prior art, the present invention includes following advantage:
(1) can use at present algorithm for recognizing fingerprint arbitrarily, also can be at central processing system algorithm for design comparison fingerprint voluntarily;
(2) verification system separates with fingerprint machine validation process steps synchronously, can use other Authentication devices to replace fingerprint machine (iris etc.);
(3) can operate in the strange land, system calculates network delay automatically, the corresponding parameter of regulation rule;
(4) use existing fingerprint equipment, can build the electronic information verification platform rapidly;
(5) for some special occasions, such as bank, the warehouse needs many people simultaneous verification, and than simply holding the pass or radio-frequency card, level of security improves greatly.
Description of drawings
Fig. 1 is the process flow diagram of the method for multi-user synchronous fingerprint authentication of the present invention;
Fig. 2 is the synoptic diagram of the method for multi-user synchronous fingerprint authentication of the present invention;
Fig. 3 is the synoptic diagram of multi-user synchronous fingerprint authentication of the present invention system.
Embodiment
The present invention will be further described below in conjunction with specific embodiment.
The present invention is with timestamp and fingerprint recognition combination, comes a plurality of fingerprints of simultaneous verification, thereby reaches the method for the checking demand of some special occasions, the present invention relates to verify the utility appliance that needs simultaneously.The steps include:
S1 deposits the hardware identification code of many fingerprint authentication devices in system database, with this uniqueness of determining hardware itself, does not have hardware identification code as validator, can add the EEPROM interlock circuit, makes its subsidiary identification code when sending finger print information;
After the s2 database receives the finger print information of hardware transmission, an additional timestamp;
S3 uses any existing algorithm for recognizing fingerprint and calculates, and draws numerical value and storage;
The s4 application program is obtained in the database result of calculation from different fingerprint machines according to the rule of program setting, and timestamp relatively, is provided with in program on the time rule of permission, is verified.
EEPROM (Electrically Erasable Programmable Read-Only Memory), EEPROM (Electrically Erasable Programmable Read Only Memo)--the storage chip that data are not lost after a kind of power down.EEPROM can on computers or wipe existing information, reprogramming on the specialized equipment.Generally be used in plug and play.
The management of electronic document and database (hereinafter to be referred as electronic information) or access process in, often need a people above ' authorizing simultaneously '.And this ' simultaneously ' needs to upgrade to ' synchronously ' in some cases.During a user capture electronic information, need obtain his higher level user or confirm more senior user the time, or the acquisition of electronic information needs 2 people or 2 people above " on the scene " simultaneously just can obtain.Certainly " on the scene " same physical space of definiteness that differs can the strange land.So the demand of checking has also occurred accordingly synchronously.
Why does checking adopt fingerprint recognition? fingerprint is the unique feature of human body, and their complexity is the sign that is enough to be provided for differentiating personal feature.The fingerprint identification technology level improves constantly in recent years, people the computer discrimination of fingerprint can have been brought up to 99.9% and also recognition speed fast.
Fingerprint machine more than two ones or two ones is linked verification system, and every fingerprint machine sends hardware identification code simultaneously when sending identifying information, avoids linking of illegal outside fingerprint equipment like this.The generation of identification code can be used to add eeprom circuit, and perhaps employing itself just has the fingerprint machine of hardware number.Purpose is in order to produce unique machine identity.
After identifying information imports central data system into, can be recorded recognition result, deposit database in, and additional timestamp.The data of many fingerprint machine acquisitions will be recorded simultaneously, and additional period is stabbed.In the process of recognition result, can use from the algorithm of wound and discern, finally reach recognition result and personnel ID mapping.
User terminal has an application system to come the interpolation of control law and the transmission mandate of electronic information.The application system authority is divided into advanced level user and domestic consumer.Advanced level user is provided with authorization rule, and a rule comprises: the fingerprint machine ID of which platform appointment, error time, the user right after the identification etc., the rights management of domestic consumer etc.Domestic consumer can be provided with self identifying information, allows systematic sampling and learning data, also can carry out rule setting to the shared electron information of self simultaneously.
User terminal has a fingerprint recognition machine simultaneously, can use wired or wireless mode to link verification system.User terminal can move, so that many people share a fingerprint machine, without one of staff.Verification system can send the information that checking is prepared in prompting, and after readiness time, the user carries out fingerprint authentication, if failure can repeat 3 times.
Electronic information is submitted proof rule to central processing system, central processing system, and whether according to the rule comparison, whether many cognitrons of rule description satisfy temporal condition, such as discerning within 10 seconds.Satisfy rule request will be allowed to, and enter next step information transmission stage.
Rule can be changed easily by advanced level user, and to adapt to different situations, synchronous demanding place can be arranged in 10 seconds, and low can be arranged in a few minutes.
As shown in Figure 1, the method for multi-user synchronous fingerprint authentication, this method comprises:
(1) hardware identification code with many fingerprint authentication devices deposits system database in, determines the uniqueness of fingerprint authentication device with this;
(2) deposit many people finger print information in system database, in order to calling;
(2) user triggers the multi-user synchronous fingerprint authentication system;
(3) system sends fingerprint authentication information to fingerprint authentication device terminal;
(4) fingerprint authentication device terminal is sent to system database after gathering finger print information, and sends hardware identification code when sending finger print information;
(5) after system database was received finger print information, storage and additional period were stabbed;
(6) use any existing algorithm for recognizing fingerprint and calculate, the finger print information that contrast collects and the finger print information of pre-stored obtain matching result and storage;
(7) obtain the matching result of each finger print information that collects in the system database according to default rule, and compare timestamp, in rule is provided with the time range of permission, be verified the result.
As Fig. 2, shown in Figure 3, the multi-user synchronous fingerprint authentication system comprises fingerprint authentication machine, system database, finger print information authentication module; Registed authorization user fingerprints information; To electronic information and directory application rule thereof, the end-user access electronic information earlier by the finger print information authentication module, after obtaining pointing out the information of checking, is verified finger print information according to prompting at the appointed time.Visit is authorized to, and is recorded into system database, enters next step information transmission state.
In project, have following role:
A: total/assistant manager B: departmental manager C: the group leader D of department: the employee E of department: assistant F: finance have all set finger print information in system.
Embodiment 1
B need see the contract electronic scanned document that project is original, must obtain the mandate of A, F also must be on the scene when he got simultaneously, A may go on business, the A online, when F opened electronic information, A can receive a confirmation by system, A fingerprint machine transmission fingerprint information, simultaneously F and B also use fingerprint machine transmission information, and center system obtains the information that 3 fingerprint machines transmit, and to identify be A, B, F three people, system loads is to the rule of electronic information, and rule meets above-mentioned all kinds of condition, information transmission is authorized to, and B sees contract information.
D will conduct interviews to the data of sensitivity, and this moment, ABC did not exist, and C licensed to E, so E and D use the fingerprint machine simultaneously, checking is passed through, and D can visit data.
F draws account and gives another company, and one period date is submitted in the report of remitting money to, when formally remitting money, changes, and A is absent from the scene, and F submits request to, and system GSM mode is reminded A, and A uses the fingerprint machine, and demonstration validation is remitted money, and F also verifies simultaneously.This while of remitting money, F was responsible for by A.
Claims (2)
1. the method for multi-user synchronous fingerprint authentication is characterized in that, this method comprises:
(1) hardware identification code with many fingerprint authentication devices deposits system database in, determines the uniqueness of fingerprint authentication device with this;
(2) deposit many people finger print information in system database, in order to calling;
(2) user triggers the multi-user synchronous fingerprint authentication system;
(3) system sends fingerprint authentication information to fingerprint authentication device terminal;
(4) fingerprint authentication device terminal is sent to system database after gathering finger print information, and sends hardware identification code when sending finger print information;
(5) after system database was received finger print information, storage and additional period were stabbed;
(6) use any existing algorithm for recognizing fingerprint and calculate, the finger print information that contrast collects and the finger print information of pre-stored obtain matching result and storage;
(7) obtain the matching result of each finger print information that collects in the system database according to default rule, and compare timestamp, in rule is provided with the time range of permission, be verified the result.
2. the method for multi-user synchronous fingerprint authentication according to claim 1 is characterized in that, when described fingerprint authentication device does not have hardware identification code, can make its subsidiary identification code when sending finger print information by adding the EEPROM interlock circuit.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910049801A CN101872436A (en) | 2009-04-22 | 2009-04-22 | Multi-user synchronous fingerprint authentication method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910049801A CN101872436A (en) | 2009-04-22 | 2009-04-22 | Multi-user synchronous fingerprint authentication method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101872436A true CN101872436A (en) | 2010-10-27 |
Family
ID=42997289
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200910049801A Pending CN101872436A (en) | 2009-04-22 | 2009-04-22 | Multi-user synchronous fingerprint authentication method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101872436A (en) |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104318147A (en) * | 2014-10-27 | 2015-01-28 | 联想(北京)有限公司 | Information processing method and electronic device |
CN104580062A (en) * | 2013-10-09 | 2015-04-29 | 中兴通讯股份有限公司 | Safe shared document viewing method and device |
CN105321072A (en) * | 2014-06-27 | 2016-02-10 | 中国银联股份有限公司 | Authentication payment method and payment authentication system based on wearable device |
WO2017028131A1 (en) * | 2015-08-16 | 2017-02-23 | 赵政荣 | Method of remotely verifying gesture inputs upon withdrawal and automatic teller machine |
WO2017028124A1 (en) * | 2015-08-16 | 2017-02-23 | 赵政荣 | Method of indicating information upon remote verification of user features and automatic teller machine |
WO2017028130A1 (en) * | 2015-08-16 | 2017-02-23 | 赵政荣 | Method of indicating information upon remote verification for withdrawal and automatic teller machine |
WO2017028125A1 (en) * | 2015-08-16 | 2017-02-23 | 赵政荣 | Method of remotely verifying different user features and automatic teller machine |
WO2017028128A1 (en) * | 2015-08-16 | 2017-02-23 | 赵政荣 | Method of indicating information upon remote verification of numeric passwords and automatic teller machine |
WO2017028129A1 (en) * | 2015-08-16 | 2017-02-23 | 赵政荣 | Method of remotely verifying different numeric passwords and automatic teller machine |
CN107341662A (en) * | 2017-06-12 | 2017-11-10 | 广东欧珀移动通信有限公司 | Verification method, electronic installation and computer-readable recording medium |
CN107590487A (en) * | 2017-10-20 | 2018-01-16 | 西南财经大学 | A kind of fingerprint identification method and system based on cloud computing |
CN107979473A (en) * | 2017-12-04 | 2018-05-01 | 山东渔翁信息技术股份有限公司 | Identity authentication method, device, cipher card and medium based on USB Key |
CN108009415A (en) * | 2017-12-04 | 2018-05-08 | 山东渔翁信息技术股份有限公司 | A kind of identity authentication method based on IC card, device and cipher card |
CN108108626A (en) * | 2016-11-25 | 2018-06-01 | 深圳指芯智能科技有限公司 | A kind of data information hierarchical processing method and device |
CN109543385A (en) * | 2018-11-23 | 2019-03-29 | Oppo广东移动通信有限公司 | Event-handling method and relevant device |
CN110896352A (en) * | 2018-09-12 | 2020-03-20 | 阿里巴巴集团控股有限公司 | Identity recognition method, device and system |
CN111475787A (en) * | 2020-04-13 | 2020-07-31 | 恒安嘉新(北京)科技股份公司 | State switching method, device, storage medium and system |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101150407A (en) * | 2007-10-25 | 2008-03-26 | 王松 | Network identity validation method based on fingerprint |
CN101316169A (en) * | 2008-07-18 | 2008-12-03 | 张曌 | Network identity verification method based on internet third party biological characteristic validation |
-
2009
- 2009-04-22 CN CN200910049801A patent/CN101872436A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101150407A (en) * | 2007-10-25 | 2008-03-26 | 王松 | Network identity validation method based on fingerprint |
CN101316169A (en) * | 2008-07-18 | 2008-12-03 | 张曌 | Network identity verification method based on internet third party biological characteristic validation |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104580062A (en) * | 2013-10-09 | 2015-04-29 | 中兴通讯股份有限公司 | Safe shared document viewing method and device |
CN105321072A (en) * | 2014-06-27 | 2016-02-10 | 中国银联股份有限公司 | Authentication payment method and payment authentication system based on wearable device |
CN105321072B (en) * | 2014-06-27 | 2019-08-13 | 中国银联股份有限公司 | Certification method of payment and payment authentication system based on wearable device |
CN104318147A (en) * | 2014-10-27 | 2015-01-28 | 联想(北京)有限公司 | Information processing method and electronic device |
WO2017028129A1 (en) * | 2015-08-16 | 2017-02-23 | 赵政荣 | Method of remotely verifying different numeric passwords and automatic teller machine |
WO2017028125A1 (en) * | 2015-08-16 | 2017-02-23 | 赵政荣 | Method of remotely verifying different user features and automatic teller machine |
WO2017028128A1 (en) * | 2015-08-16 | 2017-02-23 | 赵政荣 | Method of indicating information upon remote verification of numeric passwords and automatic teller machine |
WO2017028124A1 (en) * | 2015-08-16 | 2017-02-23 | 赵政荣 | Method of indicating information upon remote verification of user features and automatic teller machine |
WO2017028130A1 (en) * | 2015-08-16 | 2017-02-23 | 赵政荣 | Method of indicating information upon remote verification for withdrawal and automatic teller machine |
WO2017028131A1 (en) * | 2015-08-16 | 2017-02-23 | 赵政荣 | Method of remotely verifying gesture inputs upon withdrawal and automatic teller machine |
CN108108626A (en) * | 2016-11-25 | 2018-06-01 | 深圳指芯智能科技有限公司 | A kind of data information hierarchical processing method and device |
CN107341662A (en) * | 2017-06-12 | 2017-11-10 | 广东欧珀移动通信有限公司 | Verification method, electronic installation and computer-readable recording medium |
CN107590487A (en) * | 2017-10-20 | 2018-01-16 | 西南财经大学 | A kind of fingerprint identification method and system based on cloud computing |
CN107979473A (en) * | 2017-12-04 | 2018-05-01 | 山东渔翁信息技术股份有限公司 | Identity authentication method, device, cipher card and medium based on USB Key |
CN108009415A (en) * | 2017-12-04 | 2018-05-08 | 山东渔翁信息技术股份有限公司 | A kind of identity authentication method based on IC card, device and cipher card |
CN110896352A (en) * | 2018-09-12 | 2020-03-20 | 阿里巴巴集团控股有限公司 | Identity recognition method, device and system |
CN110896352B (en) * | 2018-09-12 | 2022-07-08 | 阿里巴巴集团控股有限公司 | Identity recognition method, device and system |
CN109543385A (en) * | 2018-11-23 | 2019-03-29 | Oppo广东移动通信有限公司 | Event-handling method and relevant device |
CN111475787A (en) * | 2020-04-13 | 2020-07-31 | 恒安嘉新(北京)科技股份公司 | State switching method, device, storage medium and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101872436A (en) | Multi-user synchronous fingerprint authentication method | |
US10715520B2 (en) | Systems and methods for decentralized biometric enrollment | |
US11811941B2 (en) | Systems and methods of authenticating items | |
US10171444B1 (en) | Securitization of temporal digital communications via authentication and validation for wireless user and access devices | |
CN107730254B (en) | Currency safe transaction system and currency safe transaction method | |
CN106096539B (en) | A kind of method and terminal for carrying out bio-identification | |
CN102087686A (en) | System and method of biometric authentication using multiple kinds of templates | |
CN103699995A (en) | Payment authentication method based on fingerprints and finger veins | |
CN106710032B (en) | Entrance guard opening method and device | |
CN101201887A (en) | Application method of id card in personal identification system | |
CN107038509A (en) | Self-service registration-management system | |
CN203276380U (en) | Distributed door access authentication system based on palm veins | |
CN109767155A (en) | A kind of delivering method and device based on self-carry cabinet | |
US20200098208A1 (en) | Security control device, security control method, security system and storage medium | |
CN109117668A (en) | A kind of identification authorization safety access method based on block chain building | |
JP2012511202A (en) | Identification or authorization methods and related systems and safety modules | |
CN104704521B (en) | Multifactor profile and security fingerprint analysis | |
CN201465114U (en) | Multi-person synchronous fingerprint verification system | |
US9773150B1 (en) | Method and system for evaluating fingerprint templates | |
CN105095714A (en) | User system recognition system and method based on fingerprint recognition | |
CN106710033B (en) | Entrance guard opening method and device | |
CN100583765C (en) | Biological safety level model and its setting method and device | |
CN111553704A (en) | Block chain method and system with access level limitation | |
CN111739228A (en) | Face recognition security system based on Internet of things and operation method | |
KR20170083778A (en) | Fingerprint recognition security system for visitors access management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20101027 |