CN101114905A - Method checking wireless network access through fingerprint - Google Patents
Method checking wireless network access through fingerprint Download PDFInfo
- Publication number
- CN101114905A CN101114905A CNA200610036768XA CN200610036768A CN101114905A CN 101114905 A CN101114905 A CN 101114905A CN A200610036768X A CNA200610036768X A CN A200610036768XA CN 200610036768 A CN200610036768 A CN 200610036768A CN 101114905 A CN101114905 A CN 101114905A
- Authority
- CN
- China
- Prior art keywords
- wireless network
- fingerprint
- fingerprint authentication
- data
- communication transceiver
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a method of a fingerprint verification wireless network use right, which is applicable to wireless network communication transceiving equipment. The method of the fingerprint verification wireless network use right is that firstly a fingerprint data of users is conversed into a matrix data fitting with a wireless network verification bit password. Then a corresponding coincidence degree percentage is set towards the matrix data for judging if an operating equipment at users end has the verification data of the network use right. Therefore, when the operating equipment at users end transmits a network request signal, the fingerprint data of the current user in the operating equipment at users end meets with the set verification data or not, according to which whether the wireless network communication transceiving equipment is started to carry out the network request is decided. Therefore, the wireless network quality and the verification mechanism security are improved to realize capital safety management.
Description
Technical field
The present invention is relevant for a kind of rights of using verification technique, more detailed it, relevant for a kind of method of the fingerprint authentication wireless network right to use.
Background technology
Wireless network is the quantum jump on network uses in recent years, also intimation network be transformed into wireless communication from the wire rod of entity, and because most wireless network mostly is based upon the most close user's a end, therefore at the management and control operation of the rights of using of wireless network also difficulty comparatively.The management and control mode of the conventional diverse network rights of using that adopted, remove by online number of the account of input and password thereof, to be connected into outside the network by dial mode, remaining mode is not that too to bother be exactly set up to be difficult for, in addition, the management and control system technology of the network rights of using of present stage is mostly done different the variation at user's end, and for example the company clerk can use the specific pass to obtain the authority that computer is connected into wireless network; Also can in computer carry out in-cycle work (for example computer carry out the windows job platform login operation the time, login number of the account and password by the input legal users, so that computer is logined the windows job platform for carrying out outside the related application, also can provide it " network on-line " application program so that computer is connected into wireless network by this windows operating system.But, the management and control mode of this kind network rights of using is comparatively stiff, for example, if the user need not use Internet resources, and only need utilize computer to carry out simple document to handle the time, still must be built into legal users number of the account and password in advance, so that after computer logins the windows job platform smoothly, make the related application (as document handling procedures such as OFFICE) that utilizes this job platform to provide carry out document and handle operation, so design can cause the very big inconvenience of administrative staff on working, that is, administrative staff must be at the Internet resources that used, set corresponding user and login number of the account and password (being identification number of the account and the password that each user's operational computations machine is logined windows operating system) thereof, and corresponding rights of using are set, operation is comparatively complicated.
In order to improve above-mentioned problem, then there is No. 200529091, TaiWan, China patent disclosure communique described, utilize the identity identification of fingerprint input as the user, this method is built in advance and is put the URL network address or the corresponding user of application software stores up identification code and number of the account in advance, password, when the user opens URL network address or application software, when running into the webpage that needs input user account and password, can make the user import a fingerprint signal of video signal, and be converted to a fingerprint recognition sign indicating number, compare this fingerprint recognition sign indicating number again and should pre-storage identification code whether conform to, if conform to, then capture user's number of the account of correspondence, password reaches by the mode of importing fingerprint thus and inserts user's number of the account automatically to insert corresponding position automatically, the effect of password.Though this technology can be simplified the input step of user account and password thereof, but, therefore also can't effectively solve the negative effect that when user account and password are usurped by malice, is produced because this technology is still with user account and the password validation criteria as network on-line.Moreover, above-mentioned management and control mode by input user account and password is to carry out management and control at the rights of using of computer actually, and be not to control at the rights of using of Internet resources, that is, this management and control mode limits by the rights of using at computer, and then reach the purpose that Internet resources are used in indirect restriction, therefore, this management and control mode also can't effectively solve the money peace problem of Internet resources.
Because above-mentioned shortcoming, then there is TaiWan, China patent disclosure communique to produce for No. 200605599, the one pre-golden key (Pre-share Key) of sharing is divided into user's title (UN) and password (PW) two parts, and derive a key SK EYID according to the definition of the Internet Key Exchange (IKE), and the key value (HMAC_I) that will be combined with user's title and password adds in the informative abstract function, sends this key value to receiving terminal (Responder) to make transmitting terminal (Initiator).Make receiving terminal calculate the key value of all users in user's database again, and return and deposit result of calculation, and when receiving terminal is received user's key value (HMAC_I) that transmitting terminal sends here, then the key value in this key value and the database is compared, and calculate corresponding key value (HMAC_R) and send transmitting terminal to according to comparison result, for transmitting terminal according to the key value that is received (HMAC_R), whether the analyses and comparison result is correct, if it is correct, it is online then to make receiving terminal and transmitting terminal carry out, otherwise end to carry out the connection line operation between transmitting terminal and the receiving terminal, so, the shortcoming of this technology is: the information that must constantly transmit mutually between transmitting terminal and the receiving terminal is to carry out the affirmation operation of network on-line, if transmitting terminal (receiving terminal) computer is invaded by Virus (as the worm-type virus program), the information that then can constantly send network on-line is to disturb receiving terminal (transmitting terminal), and if this receiving terminal (transmitting terminal) is one of wireless network broadband access base sites, then can influence other user's online speed because of a large amount of online demand polls, severe patient more can cause the paralysis of whole network system, as shown in Figure 1, if personal computer 31 ' continues the number of the account and the password of input error, the lasting poll that then will cause wireless network interchanger 5 ' also can interfere with network on-line quality and the speed that is connected to the client 32 ' of internet 7 ' via this wireless network interchanger 5 ' simultaneously.
Therefore, take off the existing problem of technology before effectively solving, and develop the mechanism of a simpler and easy Control Network access right, with convenient management and maintenance, and can avoid disturbing the service efficiency of wireless network resource because of the network legal power authentication failed, thereby increase the utilance of wireless network resource, the on line quality of lifting wireless network, also can effectively improve the fail safe of authentication mechanism and pacify the purpose of management, just the problem that operation needed to be resolved hurrily of the rights of using of wireless network checking at present to reach money.
Summary of the invention
The shortcoming of routine techniques in view of the above, the present invention's main purpose promptly is to provide a kind of method of the fingerprint authentication wireless network right to use, to promote the on line quality of wireless network.
The present invention's a time purpose is to provide a kind of method of the fingerprint authentication wireless network right to use, to improve the reliability of authentication mechanism, to reach the purpose of money case management.
The present invention's a purpose again is to provide a kind of method of the fingerprint authentication wireless network right to use, to improve the convenience of operation.
For taking off purpose and other purpose on reaching, the present invention promptly provides a kind of method of the fingerprint authentication wireless network right to use, be applied in the wireless communication transceiver, this method may further comprise the steps at least: (1) imports some fingerprint sampled datas by the biological data input module; (2) changing this fingerprint sampled data is one to meet first matrix data of wireless network checking position password; (3) store the mnemon of this first matrix data in management database (MIB); (4) setting is for the goodness of fit percentage of this first matrix data; (5) when the user imports finger print data by this biological data input module, change this user's finger print data and verify that for meeting wireless network second matrix data of position password is in wireless transmitting-receiving equipments management entity (Stationmanagement entity:SME); (6) compare the first interior matrix data of mnemon of this second matrix data and this management database, and obtain actual goodness of fit percentage; (7) judge whether this actual goodness of fit percentage permits this goodness of fit percentage of symbol, if, then start this wireless communication transceiver, if not, then do not start this wireless communication transceiver.
Wherein, this biological data input module is a fingerprint input device, and be located at this wireless communication transceiver and the user holds one of them person of operating equipment, preferably, this biological data input module is external in this wireless communication transceiver and the user holds one of them person of operating equipment, and this biological data input module is by blue bud grafting mouth, infrared ray transmitting-receiving interface, RJ-45, USB and one of them person of LPT interface is connected in this wireless communication transceiver and the user holds one of them person of operating equipment.Moreover, it is the matrix data of 40bit that this first and second matrix data is encrypted length, and this mnemon is the default golden key (dotllWEPDefaultKeys) (this is the standard term of IEEE802.11) of the equivalent right of privacy of wiring of setting in the management database (MIB), in a preferred embodiment, this management database (MIB) is for the some sample fingerprints that store some users that authorized.In addition, the startup of this wireless communication transceiver uses the radio wave switch element to be controlled.
Because the method for the fingerprint authentication wireless network right to use proposed by the invention, with the checking foundation of finger print data as the rights of using of wireless network resource, with when user's desire is used wireless network resource, can verify by the input finger print data whether this user has the rights of using of wireless network, carry out connection line operation thereby judge whether to start this wireless communication transceiver.Event is by the method for the present invention's the fingerprint authentication wireless network right to use, not only can avoid the user to hold operating equipment because of constantly sending the frequency range that a large amount of network on-line demand polling messages takies wireless network, and then influence the online speed that other user holds operating equipment, with the on line quality of lifting wireless network, and the utilance of increase wireless network resource; More with the checking foundation of finger print data as the rights of using of wireless network, in order to biological data with unique feature as checking according to replace the mode that routine utilizes account number cipher to verify, to avoid influencing the legal rights of using of wireless network resource because of account number cipher is stolen, can effectively improve the reliability of authentication mechanism, thereby reach the purpose of money peace management, more can be when changing network system, need not be as must be as the conventional technology together with verification msgs such as change network on-line number of the account and passwords, with the raising operation ease.
Description of drawings
Fig. 1 is conventional Wireless Communication Equipment configuration diagram;
Fig. 2 is the sample fingerprint input schematic flow sheet of the method for the fingerprint authentication wireless network right to use of the present invention;
Fig. 3 is the network rights of using checking schematic flow sheet of the method for the fingerprint authentication wireless network right to use of the present invention; And
The hardware structure schematic diagram that Fig. 4 is used by the method for the fingerprint authentication wireless network right to use of the present invention.
Embodiment
Below by specific instantiation explanation the present invention's execution mode, appearance was understood the present invention's other advantage and effect easily within the personage who is familiar with this skill can be disclosed by this specification.
Fig. 2 is the verification msg setting process schematic diagram of the method for the fingerprint authentication wireless network right to use of the present invention, in present embodiment please in the lump with reference to figure 4, wherein, the method of this fingerprint authentication wireless network right to use is applied to be connected with wireless communication transceiver 5 and the user holds in the Radio Network System 7 of operating equipment 3, wherein, this user holds operating equipment 3 to can be personal computer (PC), notebook (NB), electronic equipment such as PDA(Personal Digital Assistant) or handheld communication devices, this wireless communication transceiver 5 then are a wireless network interchanger.
As shown in Figure 2, execution in step S201 at first, the fingerprint sampled data 11 that respectively has user's correspondence of wireless network rights of using by 1 input of biological data input module, so not as limit, also can gather the checking foundation of the vocal print sampled data 13 of user's correspondence by this biological data input module 1 as the wireless network right to use, in present embodiment, this biological data input module 1 is held the fingerprint input device of operating equipment 3 for being external in this wireless communication transceiver 5 or user, and can be by blue bud grafting mouth, infrared ray transmitting-receiving interface, RJ-45, modes such as USB and LPT interface are to hold operating equipment 3 to carry out the transmission operation of data with this wireless communication transceiver 5 and user.Moreover the fingerprint sampled data of user's correspondence that these are authorized is stored in the management database 51 of this wireless communication transceiver 5, with the sample as individual biological data, then proceeds to step S202.
In step S202, to convert one by the fingerprint sampled data 11 that this biological data input module 1 is inputed to and meet first matrix data that wireless network is verified the position password, in present embodiment, this first matrix data that meets wireless network checking position password refers to encrypt the matrix data that length is 40bit, and these first matrix datas are defined as in the mnemon of the default golden key (dotllWEPDefaultKeys) of the equivalent right of privacy of wiring with the management database 51 that is stored in this wireless communication transceiver 5, then proceed to step S203.
In step S203, set should first matrix data, that is the goodness of fit percentage of the default golden key of the equivalent right of privacy that connects up is for manipulating of checking network rights of using.
Fig. 3 is the network rights of using checking schematic flow sheet of the method for the fingerprint authentication wireless network right to use of the present invention, please arrange in pairs or groups and consult Fig. 4, as shown in the figure, execution in step S301 at first, when the user holds operating equipment 3 to send the request signal of network on-line, by the finger print data of this biological data input module 1 input user correspondence, and change this finger print data and verify that for meeting wireless network second matrix data (promptly encrypting the matrix data that length is 40bit) of position password is in wireless transmitting-receiving equipments management entity (Station managemententity; SME) in, in present embodiment, this wireless transmitting-receiving equipments management entity refers to radio base station 71 management entities that are connected with each access point (AP) in this Radio Network System 7 then proceed to step S302.
In step S302, the image file of first matrix data in this second matrix data and the management database 51 that is stored in wireless communication transceiver 5 is compared, and calculate corresponding actual goodness of fit percentage according to comparison result, then proceed to step S303.
In step S303, whether fair judging this actual goodness of fit percentage symbol, this is stored in the interior goodness of fit percentage of management database 51 of wireless communication transceiver 5, in present embodiment, if this actual goodness of fit percentage is lower than the goodness of fit percentages of original setting, the use authority of promptly representing Internet resources does not pass through, then carry out step S304, otherwise carry out step S305.
In step S304, refusal is accepted the request signal that this user holds operating equipment 3 network on-line that sends, that is, do not start this wireless communication transceiver 5.
In step S305, authorize this user to hold operating equipment 3 to carry out the online request of wireless network, that is, open these wireless communication transceivers 5 by radio wave switch element 53, with the poll of waiting for radio base station 71 and deal with data transmission requirement so that this user holds operating equipment 3 to insert these Radio Network Systems 7.
Compared to routine techniques, method checking wireless network access through fingerprint proposed by the invention, by User's finger print data is as the checking foundation of wireless network rights of using, to hold operating equipment in the user When wanting to be connected into wireless network, can verify by the input finger print data whether this user has the use wireless network The rights of using of network, wherein, this verification msg with the sample fingerprint data transaction of institute's collection become one meet wireless Network verification position password, and be available for users to select the matrix data of verifying length, arrange simultaneously and carry out future The goodness of fit percentage that should reach during comparison, with when carrying out the checking operation of rights of using, by with adopt The finger print data of collection converts the matrix data identical with the selected checking length of sample to, to carry out authentication Comparison if actual comparison result is permitted when according with the goodness of fit percentage that sets, is then passed through radio wave switch unit Part to be starting this radio communication transceiver, processes this user when making the wireless network base stations poll to hold behaviour The binding request that the equipment of doing transmits.
So via the authentication mechanism of method checking wireless network access through fingerprint of the present invention, can avoid computer Take the wireless network broadband because constantly sending a large amount of network on-line demand poll information, thereby affect it The online speed that its user holds operating equipment is to promote the on line quality of wireless network; And with the user it Finger print data is as the foundation of identification checking, in order to the biological data of the unique feature that has as checking According to replacing the mode that routine utilizes account number cipher to verify, not only can avoid because of account number cipher by malice Usurp and affect the legal rights of using of wireless network resource, with the reliability of Effective Raise authentication mechanism, from And reach the purpose of money peace management, and and when the replacing network system, need not be as must be together with change as the conventional technology The verification msgs such as network on-line number of the account and password, thus reach the purpose that improves operation ease.
Claims (10)
1. the method for a fingerprint authentication wireless network right to use is applied in the wireless communication transceiver, and the method for this fingerprint authentication wireless network right to use comprises at least:
Import some fingerprint sampled datas by the biological data input module;
Change this fingerprint sampled data and be first matrix data that meets wireless network checking position password; Store the mnemon of this first matrix data in management database;
Setting is to goodness of fit percentage that should first matrix data;
When the user imports finger print data by this biological data input module, change this user's finger print data and verify that for meeting wireless network second matrix data of position password is in the wireless transmitting-receiving equipments management entity;
Compare the first interior matrix data of mnemon of this second matrix data and this management database, and obtain actual goodness of fit percentage; And
Judge whether this actual goodness of fit percentage permits this goodness of fit percentage of symbol, if, then start this wireless communication transceiver, if not, then do not start this wireless communication transceiver.
2. the method for the fingerprint authentication wireless network right to use as claimed in claim 1 is characterized in that, this biological data input module is a fingerprint input device.
3. the method for the fingerprint authentication wireless network right to use as claimed in claim 1 is characterized in that, this biological data input module is located at this wireless communication transceiver and the user holds one of them person of operating equipment.
4. the method for the fingerprint authentication wireless network right to use as claimed in claim 3 is characterized in that, this biological data input module is external in this wireless communication transceiver and the user holds one of them person of operating equipment.
5. the method for the fingerprint authentication wireless network right to use as claimed in claim 4, it is characterized in that this biological data input module is by blue bud grafting mouth, infrared ray transmitting-receiving interface, RJ-45, USB and one of them person of LPT interface is connected in this wireless communication transceiver and the user holds one of them person of operating equipment.
6. the method for the fingerprint authentication wireless network right to use as claimed in claim 3 is characterized in that, this user holds operating equipment to be selected from one of them person of personal computer, notebook, personal digital assistant and handheld communication devices.
7. the method for the fingerprint authentication wireless network right to use as claimed in claim 1 is characterized in that, it is the matrix data of 40bit that this first and second matrix data is encrypted length.
8. the method for the fingerprint authentication wireless network right to use as claimed in claim 1 is characterized in that, this mnemon is the default golden key of the equivalent right of privacy of wiring of setting in the management database.
9. the method for the fingerprint authentication wireless network right to use as claimed in claim 8 is characterized in that, this management database is for the some sample fingerprints that store some users that authorized.
10. the method for the fingerprint authentication wireless network right to use as claimed in claim 1 is characterized in that, the startup of this wireless communication transceiver uses the radio wave switch element to be controlled.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA200610036768XA CN101114905A (en) | 2006-07-28 | 2006-07-28 | Method checking wireless network access through fingerprint |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA200610036768XA CN101114905A (en) | 2006-07-28 | 2006-07-28 | Method checking wireless network access through fingerprint |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101114905A true CN101114905A (en) | 2008-01-30 |
Family
ID=39023046
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA200610036768XA Pending CN101114905A (en) | 2006-07-28 | 2006-07-28 | Method checking wireless network access through fingerprint |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101114905A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113746861A (en) * | 2021-09-13 | 2021-12-03 | 南京首传信安科技有限公司 | Data transmission encryption and decryption method and encryption and decryption system based on state encryption technology |
-
2006
- 2006-07-28 CN CNA200610036768XA patent/CN101114905A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113746861A (en) * | 2021-09-13 | 2021-12-03 | 南京首传信安科技有限公司 | Data transmission encryption and decryption method and encryption and decryption system based on state encryption technology |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7818791B2 (en) | Fingerprint authentication method for accessing wireless network systems | |
EP1288765B1 (en) | Universal authentication mechanism | |
US20170366556A1 (en) | Multichannel device utilizing a centralized out-of-band authentication system (cobas) | |
EP2479957B1 (en) | System and method for authenticating remote server access | |
US20120066749A1 (en) | Method and computer program for generation and verification of otp between server and mobile device using multiple channels | |
CN101300808B (en) | Method and arrangement for secure autentication | |
KR101383761B1 (en) | User authentication system and method thereof | |
US20140329497A1 (en) | Smartdevices Enabled Secure Access to Multiple Entities (SESAME) | |
WO2011161461A1 (en) | Identity verification | |
US20070288998A1 (en) | System and method for biometric authentication | |
CN102377769A (en) | Communication system providing wireless authentication for private data access and related methods | |
CN1756155A (en) | Mobile authentication for network access | |
EP2743857A1 (en) | Methof for allowing establishment of a secure session between a device and a server | |
CN107395634B (en) | Password-free identity authentication method of wearable equipment | |
CN101765998B (en) | Using authentication ticket to initialize computer | |
WO2013013263A1 (en) | Call authentication methods and systems | |
CN104303481A (en) | Method and apparatus for remote portable wireless device authentication | |
CN105325021B (en) | Method and apparatus for remote portable wireless device authentication | |
GB2408129A (en) | User authentication via short range communication from a portable device (eg a mobile phone) | |
CN109327429A (en) | Verification System, apparatus management system and its method | |
US20100257366A1 (en) | Method of authenticating a user | |
US10735409B2 (en) | Authenication stick | |
CN1771753B (en) | Method and apparatus for user authentication using infrared communication of a mobile terminal | |
KR100858146B1 (en) | Method for personal authentication using mobile and subscriber identify module and device thereof | |
CN105072136B (en) | A kind of equipment room safety certifying method and system based on virtual drive |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Open date: 20080130 |