CN107070864A - Safe verification method and system based on fingerprint - Google Patents

Safe verification method and system based on fingerprint Download PDF

Info

Publication number
CN107070864A
CN107070864A CN201611264817.5A CN201611264817A CN107070864A CN 107070864 A CN107070864 A CN 107070864A CN 201611264817 A CN201611264817 A CN 201611264817A CN 107070864 A CN107070864 A CN 107070864A
Authority
CN
China
Prior art keywords
fingerprint
security incident
mutual authentication
authentication
terminal device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611264817.5A
Other languages
Chinese (zh)
Inventor
张亚东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201611264817.5A priority Critical patent/CN107070864A/en
Publication of CN107070864A publication Critical patent/CN107070864A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Collating Specific Patterns (AREA)

Abstract

A kind of safe verification method and system based on fingerprint, including:When needing to perform security incident, all mutual authentication people of the fingerprint authentication solicited message to the security incident are sent;And according to the safe class set in advance of the security incident, when the fingerprint authentication success of the mutual authentication people of preset ratio at least corresponding with the safe class, perform the security incident.The present invention also provides a kind of security authentication systems based on fingerprint and terminal device.The present invention can improve the security of fingerprint authentication.

Description

Safe verification method and system based on fingerprint
Technical field
The present invention relates to safety verification technical field, verified in particular to a kind of distributed security based on fingerprint Method and system.
Background technology
Current finger print safety verification is widely used, and is used for the various safety verification demands on intelligent terminal.Work as needs When carrying out identity security checking, fingerprint module collection finger print information, then with the finger print information contrast prestored, if Match somebody with somebody, safety verification can pass through.
However, prior art is mostly to use single fingerprint matching pattern, there is risk in safety verification process.If met To external force effect, for example, when compromised, single finger print safety checking is equal to invalid checking.
The content of the invention
In view of the foregoing, it is necessary to propose a kind of safe verification method based on fingerprint, fingerprint authentication can be improved Security.
A kind of safe verification method based on fingerprint, applied in the terminal device as security incident originating end, wherein, The safe verification method based on fingerprint includes:
When needing to perform the security incident, fingerprint authentication solicited message is sent to all common of the security incident Identifier;And
According to the safe class set in advance of the security incident, when default ratio at least corresponding with the safe class During the fingerprint authentication success of the mutual authentication people of example, the security incident is performed.
In the preferred embodiment of the present invention, the preset ratio is X=n/N, and wherein N is all common of the security incident The quantity of identifier, and the n is the need for presetting while the mutual authentication people being verified.
In the preferred embodiment of the present invention, before the security incident is performed, methods described also includes:
The safe class of the security incident is set;
Select one or more mutual authentication people of the security incident;
Fingerprint typing information is sent to one or more of mutual authentication people, until receiving all mutual authentication people Fingerprint typing complete information.
In the preferred embodiment of the present invention, methods described also includes:
One or more mutual authentication people is deleted, or changes other mutual authentication people.
A kind of safe verification method based on fingerprint, applied to the terminal device as mutual authentication end, wherein, the base Include in the safe verification method of fingerprint:
When receiving the fingerprint typing information as the terminal device transmission of security incident originating end, typing user is pointed out Fingerprint, and the user fingerprints are stored in secure storage section;
Fingerprint typing completion information is sent to the terminal device as security incident originating end;
When receiving the fingerprint authentication solicited message as the terminal device transmission of security incident originating end, input is pointed out User fingerprints, and the fingerprint of input is matched with being stored in finger print information in secure storage section;And
When fingerprint matching success, to the terminal device as security incident originating end send fingerprint authentication into The information of work(.
In view of the foregoing, it there is a need to a kind of security authentication systems based on fingerprint of proposition, fingerprint authentication can be improved Security.
A kind of security authentication systems based on fingerprint, applied in the terminal device as security incident originating end, wherein, The security authentication systems based on fingerprint include:
Security incident performing module, for when needing to perform the security incident, send fingerprint authentication solicited message to All mutual authentication people of the security incident, and according to the safe class set in advance of the security incident, when at least with During the fingerprint authentication success of the mutual authentication people of the corresponding preset ratio of the safe class, the security incident is performed.
In the preferred embodiment of the present invention, the preset ratio is X=n/N, and wherein N is all common of the security incident The quantity of identifier, and the n is the need for presetting while the mutual authentication people being verified.
In the preferred embodiment of the present invention, the system also includes:
Security incident encrypting module, the safe class for setting the security incident selects the one of the security incident Individual or multiple mutual authentication people, and fingerprint typing information is sent to one or more of mutual authentication people, until receiving Fingerprint typing to all mutual authentication people completes information.
In the preferred embodiment of the present invention, the security incident encrypting module is additionally operable to:
One or more mutual authentication people is deleted, or changes other mutual authentication people.
A kind of security authentication systems based on fingerprint, applied to the terminal device as mutual authentication end, wherein, the base Include in the security authentication systems of fingerprint:
Fingerprint typing and authentication module, in the fingerprint for receiving the terminal device transmission as security incident originating end During typing information, typing user fingerprints are pointed out, and the user fingerprints are stored in secure storage section, fingerprint typing is complete The terminal device as security incident originating end is sent into information;Receiving the terminal as security incident originating end During the fingerprint authentication solicited message that equipment is sent, input user fingerprints are pointed out, and by the fingerprint of input and be stored in safe storage Finger print information is matched in region, and when fingerprint matching success, to the terminal as security incident originating end Equipment sends the successful information of fingerprint authentication.
Compared to prior art, safe verification method and system provided by the present invention based on fingerprint are referred to using multiple Line is verified, and fingerprint authentication is carried out in different terminals, can effectively prevent the abnormal scene being likely to occur during fingerprint authentication from causing Safety problem, be on the hazard, be spoofed or be forged to such as undesirable checking scene, so as to improve fingerprint authentication Security.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, below will be to institute in embodiment and description of the prior art The accompanying drawing needed to use is briefly described, it should be apparent that, drawings in the following description are only some implementations of the present invention Example, for those of ordinary skill in the art, on the premise of not paying creative work, can also be obtained according to these accompanying drawings Obtain other accompanying drawings.
It is the application environment schematic diagram of the safe verification method preferred embodiment of the invention based on fingerprint shown in Fig. 1.
It is the method flow diagram of safe verification method first preferred embodiment of the invention based on fingerprint shown in Fig. 2.
It is the method flow diagram of safe verification method second preferred embodiment of the invention based on fingerprint shown in Fig. 3.
It is the method flow diagram of safe verification method the 3rd preferred embodiment of the invention based on fingerprint shown in Fig. 4.
Fig. 5 is the functional block diagram of the security authentication systems preferred embodiment of the invention based on fingerprint.
Fig. 6 is the structural representation of terminal device preferred embodiment of the present invention.
Main element symbol description
Terminal device 1
Network 2
Security authentication systems 10 based on fingerprint
Security incident encrypting module 100
Fingerprint typing and authentication module 101
Security incident performing module 102
Memory 11
Processor 12
Communicator 13
Input/output unit 14
Communication bus 15
Embodiment
The embodiment of the present invention provides a kind of safe verification method based on fingerprint, to realize user without entering to terminal device The operation of row bright screen unblock, it is possible to perform the open and close operation of network, save user's trouble, improve Consumer's Experience.This hair Bright embodiment also provides the corresponding security authentication systems based on fingerprint, terminal device and computer-readable recording medium.
In order that those skilled in the art more fully understand the present invention program, below in conjunction with the embodiment of the present invention Accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described.Obviously, described embodiment is only The embodiment of a part of the invention, rather than whole embodiments.Based on the embodiment in the present invention, ordinary skill people The every other embodiment that member is obtained under the premise of creative work is not made, should all belong to the model that the present invention is protected Enclose.
Below by each specific embodiment, it is described in detail respectively.
Embodiment one,
It is the application environment schematic diagram of the safe verification method preferred embodiment of the invention based on fingerprint with reference to shown in Fig. 1.
In present pre-ferred embodiments, the safe verification method based on fingerprint is applied in multiple terminal devices 1.
Any one in the multiple terminal device 1 may be, but not limited to, for example, the computer of user, such as desk-top Machine, notebook computer, tablet personal computer etc., and smart mobile phone, intelligent wearable equipment etc..
In other preferred embodiments of the invention, any one in the multiple terminal device 1 can also be an insertion Formula equipment, can be embedded into existing any information household appliances and industrial control system, for example, being embedded into anti-theft door system.
Row data communication can be entered by network 2 between the multiple terminal device 1.
The network 2 can be internet or intranet etc..
In present pre-ferred embodiments, in the multiple terminal device 1, each terminal device 1 can serve as safety Event originating end, and other-end equipment 1 is then as the mutual authentication end of the security incident.
Security incident of the present invention can be that any need takes secrecy provision, for example, the safety verification based on fingerprint The event that could be performed.The security incident can include, but not limited to open classified document, opening safety case, open bank Account etc..
For example, a classified document that is stored with some terminal device 1, then the terminal device 1 can be used as safe thing Part originating end, request other-end equipment 1 is as mutual authentication end, and typing is used for the finger print information of safety verification, with to described Classified document is encrypted, and when the classified document needs to open, asks the mutual authentication end input finger print information, with Carry out safety verification.
Embodiment two,
It is the method flow diagram of safe verification method first preferred embodiment of the invention based on fingerprint with reference to shown in Fig. 2.
According to different demands, the execution sequence in flow chart shown in the figure can change, some to omit.
First preferred embodiment of the safe verification method of the present invention based on fingerprint is used to add security incident It is close, it is possible to apply in any one terminal device 1, including:
S10, the terminal device 1 sets the safe class of security incident, and select one of the security incident or Multiple mutual authentication people.
As described above, the security incident, which can be any need, takes secrecy provision, for example, the safety based on fingerprint is tested Demonstrate,prove the event that could be performed.The security incident can include, but not limited to for example, open classified document, opening safety case, Open bank account etc..
The safe class of the security incident can be that such as safe class of opening safety case is 1, opens bank account It is 0.8 etc. with opening the safe class of classified document.
In present pre-ferred embodiments, multiple ends that the terminal device 1 can be from same LAN be connected to One or more of which is selected in end equipment 1 as the mutual authentication people of the security incident.
In other preferred embodiments of the invention, selected one or more mutual authentication people and the terminal device 1 It can also be not limited in same LAN.
S11, the terminal device 1 sends fingerprint typing information to one or more of mutual authentication people, and in S12 In, judge whether that the fingerprint typing for receiving all mutual authentication people completes information.
When the fingerprint typing for receiving selected all mutual authentication people completes information, the security incident encryption is held Row is finished.
When the fingerprint for having any one mutual authentication people does not have typing completion, the terminal device 1 can continue to this Mutual authentication people sends fingerprint typing information, until the fingerprint typing of selected all mutual authentication people is completed.
In other preferred embodiments of the invention, the terminal device 1 can also delete one or more mutual authentication people, Or change other mutual authentication people.
Embodiment three,
It is the method flow diagram of safe verification method second preferred embodiment of the invention based on fingerprint with reference to shown in Fig. 3.
According to different demands, the execution sequence in flow chart shown in the figure can change, some to omit.
Second preferred embodiment of the safe verification method of the present invention based on fingerprint is used to perform the security incident, Such as opening classified document, it is possible to apply in the terminal device 1 described in above-mentioned Fig. 2, including:
S20, when needing to perform security incident, for example, opens classified document, the terminal device 1 sends fingerprint authentication please Ask all mutual authentication people of the information to the security incident.
S21, the terminal device 1 according to the safe class set in advance of the security incident, judge whether at least with The fingerprint authentication success of the mutual authentication people of the corresponding preset ratio of the safe class.
For example, the safe class of the security incident is 1, then its corresponding preset ratio is 1, that is, needs 100% to be total to With the fingerprint authentication success of identifier;When the safe class of the security incident is 0.8, then its corresponding preset ratio is 0.8, Only need to the fingerprint authentication success of 80% mutual authentication people.
For example, the preset ratio is X=n/N, wherein N is the quantity of all mutual authentication people of the security incident, And the n is the need for presetting while the mutual authentication people being verified.For example, the quantity of all mutual authentication people Quantity is 5, the mutual authentication artificial 4 being verified simultaneously the need for advance equipment, then the preset ratio X=4/5=80%.
When at least fingerprint authentication success of the mutual authentication people of preset ratio, S22 is performed, the terminal device 1 is performed The security incident, such as opening classified document.
When being not reaching to the success of the fingerprint authentication of mutual authentication people of preset ratio, S23 is performed, the security incident is held Row failure.
Example IV,
It is the method flow diagram of safe verification method the 3rd preferred embodiment of the invention based on fingerprint with reference to shown in Fig. 4.
According to different demands, the execution sequence in flow chart shown in the figure can change, some to omit.
3rd preferred embodiment of the safe verification method of the present invention based on fingerprint performs and is being used as mutual authentication people Terminal device 1 in, including.
S30, the terminal device 1 judges whether to receive the finger of the transmission of terminal device 1 as security incident originating end Line typing information.
When receiving the fingerprint typing information, S31 is performed, typing user fingerprints are pointed out, and by the user fingerprints Be stored in secure storage section, and in S32, fingerprint typing is completed information be sent to it is described as security incident originating end Terminal device 1.
In present pre-ferred embodiments, the secure storage section can be local safe storage or peace Full remote server.
When being not received by the fingerprint typing information, S33 is performed, the terminal device 1 further determines whether to connect Receive the fingerprint authentication solicited message of the transmission of terminal device 1 as security incident originating end.
When receiving the fingerprint authentication solicited message, S34 is performed, the prompting of terminal device 1 inputs user fingerprints, And matched the fingerprint of input with being stored in finger print information in secure storage section, and in S35, the terminal device 1 is sentenced Whether the match is successful for severed finger line.
When fingerprint matching success, then S36 is performed, the terminal device 1 is to described as security incident originating end Terminal device 1 sends the successful information of fingerprint authentication.
When the fingerprint is without the match is successful, then S37 is performed, the terminal device 1 is initiated to described as security incident The terminal device 1 at end sends the information of fingerprint authentication failure.
Above-mentioned Fig. 2~4 describe the safe verification method based on fingerprint of the present invention in detail, with reference to the 5th~6 figure, Respectively to realizing that the security authentication systems 10 based on fingerprint and terminal device 1 of the above-mentioned safe verification method based on fingerprint are entered Row is introduced.
It should be appreciated that the embodiment is only purposes of discussion, do not limited in patent claim by this structure.
Embodiment five,
As shown in figure 5, being the structural representation of the security authentication systems preferred embodiment of the invention based on fingerprint.
Security authentication systems 10 of the present invention based on fingerprint can be made up of including multiple computer program code Program segment, may be mounted in the multiple terminal device 1, and as performed by the multiple terminal device 1, to realize safety The safety verification based on fingerprint of event.
As shown in fig.5, the function of the security authentication systems 10 according to performed by it based on fingerprint, can be divided For multiple functional modules.In present pre-ferred embodiments, the functional module in the security authentication systems 10 based on fingerprint is extremely It can include less:Security incident encrypting module 100, security incident performing module 101 and fingerprint typing and authentication module 102.
Wherein, the security incident encrypting module 100 and the security incident performing module 101 are run on as safety In the terminal device 1 of event originating end, and the fingerprint typing and authentication module 102 run on it is described as mutual authentication end Terminal device 1 in.
The security incident encrypting module 100 is used for the safe class for setting security incident, selects the security incident One or more mutual authentication people, and fingerprint typing information is sent to one or more of mutual authentication people, Zhi Daojie The fingerprint typing for receiving all mutual authentication people completes information.
The security incident can be that any need takes secrecy provision, for example, the safety verification based on fingerprint can just be held Capable event.The security incident can include, but not limited to for example, opening classified document, opening safety case, opening bank Account etc..
The safe class of the security incident can be that such as safe class of opening safety case is 1, opens bank account It is 0.8 etc. with opening the safe class of classified document.In present pre-ferred embodiments, the security incident encrypting module 100 One or more of which is selected to be used as the safety in multiple terminal devices 1 that can be from same LAN is connected to The mutual authentication people of event.
In other preferred embodiments of the invention, selected one or more mutual authentication people and the terminal device 1 It can also be not limited in same LAN.
In present pre-ferred embodiments, when the fingerprint for having any one mutual authentication people does not have typing completion, the peace Total event encrypting module 100 can continue to send fingerprint typing information to mutual authentication people, until selected all common The fingerprint typing of identifier is completed.
In other preferred embodiments of the invention, when the fingerprint for having any one mutual authentication people does not have typing completion, institute One or more mutual authentication people can also be deleted by stating security incident encrypting module 100, or change other mutual authentications People.
The security incident performing module 101 is used for when needing to perform the security incident, sends fingerprint authentication request Information gives all mutual authentication people of the security incident, according to the safe class set in advance of the security incident, when extremely During the fingerprint authentication success of the mutual authentication people of few preset ratio corresponding with the safe class, the security incident is performed.
For example, the safe class of the security incident is 1, then its corresponding preset ratio is 1, that is, needs 100% to be total to With the fingerprint authentication success of identifier;When the safe class of the security incident is 0.8, then its corresponding preset ratio is 0.8, Only need to the fingerprint authentication success of 80% mutual authentication people.
For example, the preset ratio is X=n/N, wherein N is the quantity of all mutual authentication people of the security incident, And the n is the need for presetting while the mutual authentication people being verified.For example, the quantity of all mutual authentication people Quantity is 5, the mutual authentication artificial 4 being verified simultaneously the need for advance equipment, then the preset ratio X=4/5=80%.
When being not reaching to the success of the fingerprint authentication of mutual authentication people of preset ratio, the security incident performs failure.
The fingerprint typing and authentication module 102 are used to send out receiving the terminal device 1 as security incident originating end During the fingerprint typing information sent, typing user fingerprints are pointed out, and the user fingerprints are stored in secure storage section, and will Fingerprint typing completes information and is sent to the terminal device as security incident originating end, and is receiving as safe thing During the fingerprint authentication solicited message that the terminal device of part originating end is sent, point out input user fingerprints, and by the fingerprint of input with It is stored in finger print information in secure storage section to be matched, when fingerprint matching success, security incident is used as to described The terminal device 1 of originating end sends the successful information of fingerprint authentication.
In present pre-ferred embodiments, the secure storage section can be local safe storage or peace Full remote server.
Further, when the match is successful for the fingerprint, the fingerprint typing can also be to institute with authentication module 102 State the information that fingerprint authentication failure is sent as the terminal device 1 of security incident originating end.
Embodiment six,
As shown in fig. 6, being the terminal device preferred embodiment for realizing the safe verification method of the present invention based on fingerprint Structural representation.
Any one in the multiple terminal device 1 may be, but not limited to, for example, the computer of user, such as desk-top Machine, notebook computer, tablet personal computer etc., and smart mobile phone, intelligent wearable equipment etc..
In other preferred embodiments of the invention, any one in the multiple terminal device 1 can also be an insertion Formula equipment, can be embedded into existing any information household appliances and industrial control system, for example, being embedded into anti-theft door system.
As shown in figure 5, the terminal device 1 in the embodiment of the present invention includes at least one memory 11, at least one processing Device 12, at least one communicator 13, at least one input/output unit 14 and communication bus 15.
In other of the invention preferred embodiments, according to difference the need for, the terminal device 1 can also include other portions Part, is not limited solely to the part of above-mentioned exposure.
The communication bus 15 can realize the memory 11, processor 12, communicator 13 and input and output dress Put the communication between 14.
The communicator 13 is for carrying out wired or radio communication equipment between the multiple terminal device 1.
The input/output unit 14 is the interface that user carries out data interaction with terminal device 1, can include data defeated Enter equipment, such as keyboard and mouse, camera, fingerprint logging apparatus, display screen.
The memory 11 has program stored therein code.The memory 11 can be smart media card (smart media Card), the storage facilities such as safe digital card (secure digital card), flash memory cards (flash card).
The processor 12 can perform the operating system of the terminal device 1 and the types of applications program of installation etc..Institute One or more central processing unit, microprocessor, digital processing unit etc. can be included by stating processor 12.
In present pre-ferred embodiments, the processor 12 can call the memory 11 by the communication bus 15 The program code of middle storage with perform correlation function.For example, the modules described in Fig. 5 are (for example, the security incident adds Close module 100, fingerprint typing and authentication module 101 and security incident performing module 102 etc.) it is stored in the memory 11 In program code, and as performed by the processor 12, to realize a kind of safe verification method based on fingerprint.
Specifically, the safe verification method based on fingerprint includes:
When needing to perform security incident, all mutual authentications of the fingerprint authentication solicited message to the security incident are sent People;And
According to the safe class set in advance of the security incident, when default ratio at least corresponding with the safe class During the fingerprint authentication success of the mutual authentication people of example, the security incident is performed.
In the preferred embodiment of the present invention, the preset ratio is X=n/N, and wherein N is all common of the security incident The quantity of identifier, and the n is the need for presetting while the mutual authentication people being verified.
In the preferred embodiment of the present invention, before the security incident is performed, the safe verification method based on fingerprint Also include:
The safe class of the security incident is set;
Select one or more mutual authentication people of the security incident;
Fingerprint typing information is sent to one or more of mutual authentication people, until receiving all mutual authentication people Fingerprint typing complete information.
In the preferred embodiment of the present invention, the safe verification method based on fingerprint also includes:
One or more mutual authentication people is deleted, or changes other mutual authentication people.
In another preferred embodiment of the present invention, the safe verification method based on fingerprint includes:
When receiving the fingerprint typing information as the terminal device transmission of security incident originating end, typing user is pointed out Fingerprint, and the user fingerprints are stored in secure storage section;
Fingerprint typing completion information is sent to the terminal device as security incident originating end;
When receiving the fingerprint authentication solicited message as the terminal device transmission of security incident originating end, input is pointed out User fingerprints, and the fingerprint of input is matched with being stored in finger print information in secure storage section;And
When fingerprint matching success, to the terminal device as security incident originating end send fingerprint authentication into The information of work(.
Embodiment six,
The embodiment of the present invention also provides a kind of computer-readable recording medium for storing one or more programs, one Or multiple programs include instruction, the instruction makes the end when the terminal device 1 for being included one or more processors is performed End equipment 1 performs the safe verification method based on fingerprint as described in embodiment of the method above.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and is not described in some embodiment Part, may refer to the associated description of other embodiments.
It should be noted that for foregoing each method embodiment, in order to be briefly described, therefore it is all expressed as a series of Combination of actions, but those skilled in the art should know, the present invention is not limited by described sequence of movement because according to According to the present invention, some steps can use other orders or carry out simultaneously.Secondly, those skilled in the art should also know, Embodiment described in this description belongs to preferred embodiment, and not necessarily the present invention must for involved action and module Must.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can To instruct the hardware of correlation to complete by program, the program can be stored in a computer-readable recording medium, storage Medium can include:ROM, RAM, disk or CD etc..
, can be by it in several embodiments provided by the present invention, it should be understood that disclosed apparatus and method Its mode is realized.For example, device embodiment described above is only schematical, for example, the division of the module, only Only a kind of division of logic function, can there is other dividing mode when actually realizing.
The module illustrated as separating component can be or may not be it is physically separate, it is aobvious as module The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of module therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
In addition, each functional module in each embodiment of the invention can be integrated in a processing unit, can also That unit is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated list Member can both be realized in the form of hardware, it would however also be possible to employ hardware adds the form of software function module to realize.
It is obvious to a person skilled in the art that the invention is not restricted to the details of above-mentioned one exemplary embodiment, Er Qie In the case of without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter From the point of view of which point, embodiment all should be regarded as exemplary, and be nonrestrictive, the scope of the present invention is by appended power Profit is required rather than described above is limited, it is intended that all in the implication and scope of the equivalency of claim by falling Change is included in the present invention.The right that any attached associated diagram mark in claim should not be considered as involved by limitation will Ask.Furthermore, it is to be understood that the word of " comprising " one is not excluded for other units or step, odd number is not excluded for plural number.Stated in device claim Multiple modules or device can also by a module or device by software or hardware come 17 realizations.The first, the second grade word Pragmatic represents that name 17 claims, and is not offered as any specific along 17 sequences.
Most it will be understood by those within the art that, technical scheme can be modified or equally replaced Change, without departing from the spirit and scope of technical solution of the present invention.

Claims (10)

1. a kind of safe verification method based on fingerprint, applied in the terminal device as security incident originating end, its feature It is, the safe verification method based on fingerprint includes:
When needing to perform security incident, all mutual authentication people of the fingerprint authentication solicited message to the security incident are sent; And
According to the safe class set in advance of the security incident, when preset ratio at least corresponding with the safe class During the fingerprint authentication success of mutual authentication people, the security incident is performed.
2. the safe verification method as claimed in claim 1 based on fingerprint, it is characterised in that the preset ratio is X=n/ N, wherein N are the quantity of all mutual authentication people of the security incident, and the n is to be verified the need for presetting Mutual authentication people.
3. the safe verification method based on fingerprint as claimed in claim 1, it is characterised in that perform the security incident it Before, methods described also includes:
The safe class of the security incident is set;
Select one or more mutual authentication people of the security incident;
Fingerprint typing information is sent to one or more of mutual authentication people, the finger until receiving all mutual authentication people Line typing completes information.
4. the safe verification method as claimed in claim 3 based on fingerprint, it is characterised in that methods described also includes:
One or more mutual authentication people is deleted, or changes other mutual authentication people.
5. a kind of safe verification method based on fingerprint, applied to the terminal device as mutual authentication end, it is characterised in that institute Stating the safe verification method based on fingerprint includes:
When receiving the fingerprint typing information as the terminal device transmission of security incident originating end, typing user is pointed out to refer to Line, and the user fingerprints are stored in secure storage section;
Fingerprint typing completion information is sent to the terminal device as security incident originating end;
When receiving the fingerprint authentication solicited message as the terminal device transmission of security incident originating end, input user is pointed out Fingerprint, and the fingerprint of input is matched with being stored in finger print information in secure storage section;And
When fingerprint matching success, fingerprint authentication is sent to the terminal device as security incident originating end successful Information.
6. a kind of security authentication systems based on fingerprint, applied in the terminal device as security incident originating end, its feature It is, the security authentication systems based on fingerprint include:
Security incident performing module, for when needing to perform the security incident, sending fingerprint authentication solicited message to described All mutual authentication people of security incident, and according to the safe class set in advance of the security incident, when at least with it is described During the fingerprint authentication success of the mutual authentication people of the corresponding preset ratio of safe class, the security incident is performed.
7. the security authentication systems as claimed in claim 6 based on fingerprint, it is characterised in that the preset ratio is X=n/ N, wherein N are the quantity of all mutual authentication people of the security incident, and the n is checking simultaneously the need for presetting The mutual authentication people passed through.
8. the security authentication systems as claimed in claim 6 based on fingerprint, it is characterised in that the system also includes:
Security incident encrypting module, the safe class for setting the security incident, select one of the security incident or The multiple mutual authentication people of person, and fingerprint typing information is sent to one or more of mutual authentication people, until receiving The fingerprint typing for having mutual authentication people completes information.
9. the security authentication systems as claimed in claim 8 based on fingerprint, it is characterised in that the security incident encrypting module It is additionally operable to:
One or more mutual authentication people is deleted, or changes other mutual authentication people.
10. a kind of security authentication systems based on fingerprint, applied to the terminal device as mutual authentication end, it is characterised in that The security authentication systems based on fingerprint include:
Fingerprint typing and authentication module, in the fingerprint typing for receiving the terminal device transmission as security incident originating end During information, typing user fingerprints are pointed out, and the user fingerprints are stored in secure storage section, fingerprint typing is completed to believe Breath is sent to the terminal device as security incident originating end;Receiving the terminal device as security incident originating end During the fingerprint authentication solicited message of transmission, input user fingerprints are pointed out, and by the fingerprint of input and be stored in secure storage section Middle finger print information is matched, and when fingerprint matching success, to the terminal device as security incident originating end Send the successful information of fingerprint authentication.
CN201611264817.5A 2016-12-30 2016-12-30 Safe verification method and system based on fingerprint Pending CN107070864A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611264817.5A CN107070864A (en) 2016-12-30 2016-12-30 Safe verification method and system based on fingerprint

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611264817.5A CN107070864A (en) 2016-12-30 2016-12-30 Safe verification method and system based on fingerprint

Publications (1)

Publication Number Publication Date
CN107070864A true CN107070864A (en) 2017-08-18

Family

ID=59624383

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611264817.5A Pending CN107070864A (en) 2016-12-30 2016-12-30 Safe verification method and system based on fingerprint

Country Status (1)

Country Link
CN (1) CN107070864A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107733868A (en) * 2017-09-13 2018-02-23 深圳市三阶微控实业有限公司 Mobile terminal and fingerprint simultaneously close checking implementation method and storage medium
CN110516427A (en) * 2019-08-29 2019-11-29 深圳市沃特沃德股份有限公司 Auth method, device, storage medium and the computer equipment of terminal user
CN111986405A (en) * 2020-09-01 2020-11-24 中国银行股份有限公司 Method and device for verifying withdrawal of common property based on ATM

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101364984A (en) * 2008-08-13 2009-02-11 西安鼎蓝通信技术有限公司 Method for guarantee safety of electronic file
CN101464945A (en) * 2008-11-14 2009-06-24 清华大学深圳研究生院 Identification characteristic identification method based on finger back arthrosis veins
CN201465114U (en) * 2009-04-22 2010-05-12 上海幻维数码创意科技有限公司 Multi-person synchronous fingerprint verification system
CN103873446A (en) * 2012-12-17 2014-06-18 中航物联技术(北京)有限公司 Method for logging in system
CN104036176A (en) * 2014-07-03 2014-09-10 南昌欧菲生物识别技术有限公司 Fingerprint feature point registration method based on security levels, authentication method based on security levels and terminal equipment
CN105260643A (en) * 2015-10-30 2016-01-20 南昌欧菲生物识别技术有限公司 Multi-fingerprint cross-unlocking method and system
CN105279413A (en) * 2015-09-30 2016-01-27 宇龙计算机通信科技(深圳)有限公司 System switching method, system switching device and electronic equipment
CN105389502A (en) * 2015-10-23 2016-03-09 京东方科技集团股份有限公司 Permission control system and method, mouse, and computer system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101364984A (en) * 2008-08-13 2009-02-11 西安鼎蓝通信技术有限公司 Method for guarantee safety of electronic file
CN101464945A (en) * 2008-11-14 2009-06-24 清华大学深圳研究生院 Identification characteristic identification method based on finger back arthrosis veins
CN201465114U (en) * 2009-04-22 2010-05-12 上海幻维数码创意科技有限公司 Multi-person synchronous fingerprint verification system
CN103873446A (en) * 2012-12-17 2014-06-18 中航物联技术(北京)有限公司 Method for logging in system
CN104036176A (en) * 2014-07-03 2014-09-10 南昌欧菲生物识别技术有限公司 Fingerprint feature point registration method based on security levels, authentication method based on security levels and terminal equipment
CN105279413A (en) * 2015-09-30 2016-01-27 宇龙计算机通信科技(深圳)有限公司 System switching method, system switching device and electronic equipment
CN105389502A (en) * 2015-10-23 2016-03-09 京东方科技集团股份有限公司 Permission control system and method, mouse, and computer system
CN105260643A (en) * 2015-10-30 2016-01-20 南昌欧菲生物识别技术有限公司 Multi-fingerprint cross-unlocking method and system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107733868A (en) * 2017-09-13 2018-02-23 深圳市三阶微控实业有限公司 Mobile terminal and fingerprint simultaneously close checking implementation method and storage medium
CN110516427A (en) * 2019-08-29 2019-11-29 深圳市沃特沃德股份有限公司 Auth method, device, storage medium and the computer equipment of terminal user
CN110516427B (en) * 2019-08-29 2022-03-11 深圳市沃特沃德软件技术有限公司 Terminal user identity authentication method and device, storage medium and computer equipment
CN111986405A (en) * 2020-09-01 2020-11-24 中国银行股份有限公司 Method and device for verifying withdrawal of common property based on ATM

Similar Documents

Publication Publication Date Title
CN103793636B (en) A kind of method of equipment and protection equipment privacy
CN105117663B (en) The encrypted object display methods and device of a kind of application
CN101252439B (en) System and method for increasing information safety equipment security
CN103336924B (en) Startup for application program for mobile terminal is locked
CN103380592B (en) Method, server and system for personal authentication
CN104751038A (en) Identity authentication method, device and system
CN107070864A (en) Safe verification method and system based on fingerprint
CN104346550A (en) Information processing method and electronic equipment
CN106446667B (en) Password data processing method, device and equipment
CN107895105A (en) A kind of cipher processing method, terminal device and computer-readable recording medium
CN108173648A (en) Security processing method, equipment and storage medium based on private key escrow
CN107967422A (en) One kind verification implementation method and electric terminal
CN107770155A (en) A kind of short-message verification method and mobile terminal
CN104468486A (en) Information processing method and system and electronic device
CN113660268A (en) Login authorization management method, system, device and medium
CN114244568A (en) Security access control method, device and equipment based on terminal access behavior
CN108540591A (en) Book management method, address book management device and electronic equipment
CN112636914B (en) Identity verification method, identity verification device and smart card
CN105760733B (en) Data ciphering method and module, data access method and module
CN106569918A (en) Data backup method and mobile terminal
CN106161481A (en) A kind of mobile terminal physical button isolation safe module takes precautions against the device of security risk
CN106375304A (en) One-time authentication method realized by utilization of intelligent hardware
CN109324843A (en) A kind of finger prints processing system, method and fingerprint equipment
CN108234491A (en) Agreement correlating validation method, apparatus and electronic equipment
CN114255042A (en) Secret payment-free signing method and device, computer equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170818