CN101114905A - Method checking wireless network access through fingerprint - Google Patents

Method checking wireless network access through fingerprint Download PDF

Info

Publication number
CN101114905A
CN101114905A CNA200610036768XA CN200610036768A CN101114905A CN 101114905 A CN101114905 A CN 101114905A CN A200610036768X A CNA200610036768X A CN A200610036768XA CN 200610036768 A CN200610036768 A CN 200610036768A CN 101114905 A CN101114905 A CN 101114905A
Authority
CN
China
Prior art keywords
wireless network
fingerprint
fingerprint authentication
data
communication transceiver
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA200610036768XA
Other languages
Chinese (zh)
Inventor
郑逸翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Mitac Computer Shunde Ltd
Shunda Computer Factory Co Ltd
Mitac International Corp
Original Assignee
Mitac Computer Shunde Ltd
Mitac International Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mitac Computer Shunde Ltd, Mitac International Corp filed Critical Mitac Computer Shunde Ltd
Priority to CNA200610036768XA priority Critical patent/CN101114905A/en
Publication of CN101114905A publication Critical patent/CN101114905A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method of a fingerprint verification wireless network use right, which is applicable to wireless network communication transceiving equipment. The method of the fingerprint verification wireless network use right is that firstly a fingerprint data of users is conversed into a matrix data fitting with a wireless network verification bit password. Then a corresponding coincidence degree percentage is set towards the matrix data for judging if an operating equipment at users end has the verification data of the network use right. Therefore, when the operating equipment at users end transmits a network request signal, the fingerprint data of the current user in the operating equipment at users end meets with the set verification data or not, according to which whether the wireless network communication transceiving equipment is started to carry out the network request is decided. Therefore, the wireless network quality and the verification mechanism security are improved to realize capital safety management.

Description

The method of the fingerprint authentication wireless network right to use
Technical field
The present invention is relevant for a kind of rights of using verification technique, more detailed it, relevant for a kind of method of the fingerprint authentication wireless network right to use.
Background technology
Wireless network is the quantum jump on network uses in recent years, also intimation network be transformed into wireless communication from the wire rod of entity, and because most wireless network mostly is based upon the most close user's a end, therefore at the management and control operation of the rights of using of wireless network also difficulty comparatively.The management and control mode of the conventional diverse network rights of using that adopted, remove by online number of the account of input and password thereof, to be connected into outside the network by dial mode, remaining mode is not that too to bother be exactly set up to be difficult for, in addition, the management and control system technology of the network rights of using of present stage is mostly done different the variation at user's end, and for example the company clerk can use the specific pass to obtain the authority that computer is connected into wireless network; Also can in computer carry out in-cycle work (for example computer carry out the windows job platform login operation the time, login number of the account and password by the input legal users, so that computer is logined the windows job platform for carrying out outside the related application, also can provide it " network on-line " application program so that computer is connected into wireless network by this windows operating system.But, the management and control mode of this kind network rights of using is comparatively stiff, for example, if the user need not use Internet resources, and only need utilize computer to carry out simple document to handle the time, still must be built into legal users number of the account and password in advance, so that after computer logins the windows job platform smoothly, make the related application (as document handling procedures such as OFFICE) that utilizes this job platform to provide carry out document and handle operation, so design can cause the very big inconvenience of administrative staff on working, that is, administrative staff must be at the Internet resources that used, set corresponding user and login number of the account and password (being identification number of the account and the password that each user's operational computations machine is logined windows operating system) thereof, and corresponding rights of using are set, operation is comparatively complicated.
In order to improve above-mentioned problem, then there is No. 200529091, TaiWan, China patent disclosure communique described, utilize the identity identification of fingerprint input as the user, this method is built in advance and is put the URL network address or the corresponding user of application software stores up identification code and number of the account in advance, password, when the user opens URL network address or application software, when running into the webpage that needs input user account and password, can make the user import a fingerprint signal of video signal, and be converted to a fingerprint recognition sign indicating number, compare this fingerprint recognition sign indicating number again and should pre-storage identification code whether conform to, if conform to, then capture user's number of the account of correspondence, password reaches by the mode of importing fingerprint thus and inserts user's number of the account automatically to insert corresponding position automatically, the effect of password.Though this technology can be simplified the input step of user account and password thereof, but, therefore also can't effectively solve the negative effect that when user account and password are usurped by malice, is produced because this technology is still with user account and the password validation criteria as network on-line.Moreover, above-mentioned management and control mode by input user account and password is to carry out management and control at the rights of using of computer actually, and be not to control at the rights of using of Internet resources, that is, this management and control mode limits by the rights of using at computer, and then reach the purpose that Internet resources are used in indirect restriction, therefore, this management and control mode also can't effectively solve the money peace problem of Internet resources.
Because above-mentioned shortcoming, then there is TaiWan, China patent disclosure communique to produce for No. 200605599, the one pre-golden key (Pre-share Key) of sharing is divided into user's title (UN) and password (PW) two parts, and derive a key SK EYID according to the definition of the Internet Key Exchange (IKE), and the key value (HMAC_I) that will be combined with user's title and password adds in the informative abstract function, sends this key value to receiving terminal (Responder) to make transmitting terminal (Initiator).Make receiving terminal calculate the key value of all users in user's database again, and return and deposit result of calculation, and when receiving terminal is received user's key value (HMAC_I) that transmitting terminal sends here, then the key value in this key value and the database is compared, and calculate corresponding key value (HMAC_R) and send transmitting terminal to according to comparison result, for transmitting terminal according to the key value that is received (HMAC_R), whether the analyses and comparison result is correct, if it is correct, it is online then to make receiving terminal and transmitting terminal carry out, otherwise end to carry out the connection line operation between transmitting terminal and the receiving terminal, so, the shortcoming of this technology is: the information that must constantly transmit mutually between transmitting terminal and the receiving terminal is to carry out the affirmation operation of network on-line, if transmitting terminal (receiving terminal) computer is invaded by Virus (as the worm-type virus program), the information that then can constantly send network on-line is to disturb receiving terminal (transmitting terminal), and if this receiving terminal (transmitting terminal) is one of wireless network broadband access base sites, then can influence other user's online speed because of a large amount of online demand polls, severe patient more can cause the paralysis of whole network system, as shown in Figure 1, if personal computer 31 ' continues the number of the account and the password of input error, the lasting poll that then will cause wireless network interchanger 5 ' also can interfere with network on-line quality and the speed that is connected to the client 32 ' of internet 7 ' via this wireless network interchanger 5 ' simultaneously.
Therefore, take off the existing problem of technology before effectively solving, and develop the mechanism of a simpler and easy Control Network access right, with convenient management and maintenance, and can avoid disturbing the service efficiency of wireless network resource because of the network legal power authentication failed, thereby increase the utilance of wireless network resource, the on line quality of lifting wireless network, also can effectively improve the fail safe of authentication mechanism and pacify the purpose of management, just the problem that operation needed to be resolved hurrily of the rights of using of wireless network checking at present to reach money.
Summary of the invention
The shortcoming of routine techniques in view of the above, the present invention's main purpose promptly is to provide a kind of method of the fingerprint authentication wireless network right to use, to promote the on line quality of wireless network.
The present invention's a time purpose is to provide a kind of method of the fingerprint authentication wireless network right to use, to improve the reliability of authentication mechanism, to reach the purpose of money case management.
The present invention's a purpose again is to provide a kind of method of the fingerprint authentication wireless network right to use, to improve the convenience of operation.
For taking off purpose and other purpose on reaching, the present invention promptly provides a kind of method of the fingerprint authentication wireless network right to use, be applied in the wireless communication transceiver, this method may further comprise the steps at least: (1) imports some fingerprint sampled datas by the biological data input module; (2) changing this fingerprint sampled data is one to meet first matrix data of wireless network checking position password; (3) store the mnemon of this first matrix data in management database (MIB); (4) setting is for the goodness of fit percentage of this first matrix data; (5) when the user imports finger print data by this biological data input module, change this user's finger print data and verify that for meeting wireless network second matrix data of position password is in wireless transmitting-receiving equipments management entity (Stationmanagement entity:SME); (6) compare the first interior matrix data of mnemon of this second matrix data and this management database, and obtain actual goodness of fit percentage; (7) judge whether this actual goodness of fit percentage permits this goodness of fit percentage of symbol, if, then start this wireless communication transceiver, if not, then do not start this wireless communication transceiver.
Wherein, this biological data input module is a fingerprint input device, and be located at this wireless communication transceiver and the user holds one of them person of operating equipment, preferably, this biological data input module is external in this wireless communication transceiver and the user holds one of them person of operating equipment, and this biological data input module is by blue bud grafting mouth, infrared ray transmitting-receiving interface, RJ-45, USB and one of them person of LPT interface is connected in this wireless communication transceiver and the user holds one of them person of operating equipment.Moreover, it is the matrix data of 40bit that this first and second matrix data is encrypted length, and this mnemon is the default golden key (dotllWEPDefaultKeys) (this is the standard term of IEEE802.11) of the equivalent right of privacy of wiring of setting in the management database (MIB), in a preferred embodiment, this management database (MIB) is for the some sample fingerprints that store some users that authorized.In addition, the startup of this wireless communication transceiver uses the radio wave switch element to be controlled.
Because the method for the fingerprint authentication wireless network right to use proposed by the invention, with the checking foundation of finger print data as the rights of using of wireless network resource, with when user's desire is used wireless network resource, can verify by the input finger print data whether this user has the rights of using of wireless network, carry out connection line operation thereby judge whether to start this wireless communication transceiver.Event is by the method for the present invention's the fingerprint authentication wireless network right to use, not only can avoid the user to hold operating equipment because of constantly sending the frequency range that a large amount of network on-line demand polling messages takies wireless network, and then influence the online speed that other user holds operating equipment, with the on line quality of lifting wireless network, and the utilance of increase wireless network resource; More with the checking foundation of finger print data as the rights of using of wireless network, in order to biological data with unique feature as checking according to replace the mode that routine utilizes account number cipher to verify, to avoid influencing the legal rights of using of wireless network resource because of account number cipher is stolen, can effectively improve the reliability of authentication mechanism, thereby reach the purpose of money peace management, more can be when changing network system, need not be as must be as the conventional technology together with verification msgs such as change network on-line number of the account and passwords, with the raising operation ease.
Description of drawings
Fig. 1 is conventional Wireless Communication Equipment configuration diagram;
Fig. 2 is the sample fingerprint input schematic flow sheet of the method for the fingerprint authentication wireless network right to use of the present invention;
Fig. 3 is the network rights of using checking schematic flow sheet of the method for the fingerprint authentication wireless network right to use of the present invention; And
The hardware structure schematic diagram that Fig. 4 is used by the method for the fingerprint authentication wireless network right to use of the present invention.
Embodiment
Below by specific instantiation explanation the present invention's execution mode, appearance was understood the present invention's other advantage and effect easily within the personage who is familiar with this skill can be disclosed by this specification.
Fig. 2 is the verification msg setting process schematic diagram of the method for the fingerprint authentication wireless network right to use of the present invention, in present embodiment please in the lump with reference to figure 4, wherein, the method of this fingerprint authentication wireless network right to use is applied to be connected with wireless communication transceiver 5 and the user holds in the Radio Network System 7 of operating equipment 3, wherein, this user holds operating equipment 3 to can be personal computer (PC), notebook (NB), electronic equipment such as PDA(Personal Digital Assistant) or handheld communication devices, this wireless communication transceiver 5 then are a wireless network interchanger.
As shown in Figure 2, execution in step S201 at first, the fingerprint sampled data 11 that respectively has user's correspondence of wireless network rights of using by 1 input of biological data input module, so not as limit, also can gather the checking foundation of the vocal print sampled data 13 of user's correspondence by this biological data input module 1 as the wireless network right to use, in present embodiment, this biological data input module 1 is held the fingerprint input device of operating equipment 3 for being external in this wireless communication transceiver 5 or user, and can be by blue bud grafting mouth, infrared ray transmitting-receiving interface, RJ-45, modes such as USB and LPT interface are to hold operating equipment 3 to carry out the transmission operation of data with this wireless communication transceiver 5 and user.Moreover the fingerprint sampled data of user's correspondence that these are authorized is stored in the management database 51 of this wireless communication transceiver 5, with the sample as individual biological data, then proceeds to step S202.
In step S202, to convert one by the fingerprint sampled data 11 that this biological data input module 1 is inputed to and meet first matrix data that wireless network is verified the position password, in present embodiment, this first matrix data that meets wireless network checking position password refers to encrypt the matrix data that length is 40bit, and these first matrix datas are defined as in the mnemon of the default golden key (dotllWEPDefaultKeys) of the equivalent right of privacy of wiring with the management database 51 that is stored in this wireless communication transceiver 5, then proceed to step S203.
In step S203, set should first matrix data, that is the goodness of fit percentage of the default golden key of the equivalent right of privacy that connects up is for manipulating of checking network rights of using.
Fig. 3 is the network rights of using checking schematic flow sheet of the method for the fingerprint authentication wireless network right to use of the present invention, please arrange in pairs or groups and consult Fig. 4, as shown in the figure, execution in step S301 at first, when the user holds operating equipment 3 to send the request signal of network on-line, by the finger print data of this biological data input module 1 input user correspondence, and change this finger print data and verify that for meeting wireless network second matrix data (promptly encrypting the matrix data that length is 40bit) of position password is in wireless transmitting-receiving equipments management entity (Station managemententity; SME) in, in present embodiment, this wireless transmitting-receiving equipments management entity refers to radio base station 71 management entities that are connected with each access point (AP) in this Radio Network System 7 then proceed to step S302.
In step S302, the image file of first matrix data in this second matrix data and the management database 51 that is stored in wireless communication transceiver 5 is compared, and calculate corresponding actual goodness of fit percentage according to comparison result, then proceed to step S303.
In step S303, whether fair judging this actual goodness of fit percentage symbol, this is stored in the interior goodness of fit percentage of management database 51 of wireless communication transceiver 5, in present embodiment, if this actual goodness of fit percentage is lower than the goodness of fit percentages of original setting, the use authority of promptly representing Internet resources does not pass through, then carry out step S304, otherwise carry out step S305.
In step S304, refusal is accepted the request signal that this user holds operating equipment 3 network on-line that sends, that is, do not start this wireless communication transceiver 5.
In step S305, authorize this user to hold operating equipment 3 to carry out the online request of wireless network, that is, open these wireless communication transceivers 5 by radio wave switch element 53, with the poll of waiting for radio base station 71 and deal with data transmission requirement so that this user holds operating equipment 3 to insert these Radio Network Systems 7.
Compared to routine techniques, method checking wireless network access through fingerprint proposed by the invention, by User's finger print data is as the checking foundation of wireless network rights of using, to hold operating equipment in the user When wanting to be connected into wireless network, can verify by the input finger print data whether this user has the use wireless network The rights of using of network, wherein, this verification msg with the sample fingerprint data transaction of institute's collection become one meet wireless Network verification position password, and be available for users to select the matrix data of verifying length, arrange simultaneously and carry out future The goodness of fit percentage that should reach during comparison, with when carrying out the checking operation of rights of using, by with adopt The finger print data of collection converts the matrix data identical with the selected checking length of sample to, to carry out authentication Comparison if actual comparison result is permitted when according with the goodness of fit percentage that sets, is then passed through radio wave switch unit Part to be starting this radio communication transceiver, processes this user when making the wireless network base stations poll to hold behaviour The binding request that the equipment of doing transmits.
So via the authentication mechanism of method checking wireless network access through fingerprint of the present invention, can avoid computer Take the wireless network broadband because constantly sending a large amount of network on-line demand poll information, thereby affect it The online speed that its user holds operating equipment is to promote the on line quality of wireless network; And with the user it Finger print data is as the foundation of identification checking, in order to the biological data of the unique feature that has as checking According to replacing the mode that routine utilizes account number cipher to verify, not only can avoid because of account number cipher by malice Usurp and affect the legal rights of using of wireless network resource, with the reliability of Effective Raise authentication mechanism, from And reach the purpose of money peace management, and and when the replacing network system, need not be as must be together with change as the conventional technology The verification msgs such as network on-line number of the account and password, thus reach the purpose that improves operation ease.

Claims (10)

1. the method for a fingerprint authentication wireless network right to use is applied in the wireless communication transceiver, and the method for this fingerprint authentication wireless network right to use comprises at least:
Import some fingerprint sampled datas by the biological data input module;
Change this fingerprint sampled data and be first matrix data that meets wireless network checking position password; Store the mnemon of this first matrix data in management database;
Setting is to goodness of fit percentage that should first matrix data;
When the user imports finger print data by this biological data input module, change this user's finger print data and verify that for meeting wireless network second matrix data of position password is in the wireless transmitting-receiving equipments management entity;
Compare the first interior matrix data of mnemon of this second matrix data and this management database, and obtain actual goodness of fit percentage; And
Judge whether this actual goodness of fit percentage permits this goodness of fit percentage of symbol, if, then start this wireless communication transceiver, if not, then do not start this wireless communication transceiver.
2. the method for the fingerprint authentication wireless network right to use as claimed in claim 1 is characterized in that, this biological data input module is a fingerprint input device.
3. the method for the fingerprint authentication wireless network right to use as claimed in claim 1 is characterized in that, this biological data input module is located at this wireless communication transceiver and the user holds one of them person of operating equipment.
4. the method for the fingerprint authentication wireless network right to use as claimed in claim 3 is characterized in that, this biological data input module is external in this wireless communication transceiver and the user holds one of them person of operating equipment.
5. the method for the fingerprint authentication wireless network right to use as claimed in claim 4, it is characterized in that this biological data input module is by blue bud grafting mouth, infrared ray transmitting-receiving interface, RJ-45, USB and one of them person of LPT interface is connected in this wireless communication transceiver and the user holds one of them person of operating equipment.
6. the method for the fingerprint authentication wireless network right to use as claimed in claim 3 is characterized in that, this user holds operating equipment to be selected from one of them person of personal computer, notebook, personal digital assistant and handheld communication devices.
7. the method for the fingerprint authentication wireless network right to use as claimed in claim 1 is characterized in that, it is the matrix data of 40bit that this first and second matrix data is encrypted length.
8. the method for the fingerprint authentication wireless network right to use as claimed in claim 1 is characterized in that, this mnemon is the default golden key of the equivalent right of privacy of wiring of setting in the management database.
9. the method for the fingerprint authentication wireless network right to use as claimed in claim 8 is characterized in that, this management database is for the some sample fingerprints that store some users that authorized.
10. the method for the fingerprint authentication wireless network right to use as claimed in claim 1 is characterized in that, the startup of this wireless communication transceiver uses the radio wave switch element to be controlled.
CNA200610036768XA 2006-07-28 2006-07-28 Method checking wireless network access through fingerprint Pending CN101114905A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA200610036768XA CN101114905A (en) 2006-07-28 2006-07-28 Method checking wireless network access through fingerprint

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA200610036768XA CN101114905A (en) 2006-07-28 2006-07-28 Method checking wireless network access through fingerprint

Publications (1)

Publication Number Publication Date
CN101114905A true CN101114905A (en) 2008-01-30

Family

ID=39023046

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA200610036768XA Pending CN101114905A (en) 2006-07-28 2006-07-28 Method checking wireless network access through fingerprint

Country Status (1)

Country Link
CN (1) CN101114905A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113746861A (en) * 2021-09-13 2021-12-03 南京首传信安科技有限公司 Data transmission encryption and decryption method and encryption and decryption system based on state encryption technology

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113746861A (en) * 2021-09-13 2021-12-03 南京首传信安科技有限公司 Data transmission encryption and decryption method and encryption and decryption system based on state encryption technology

Similar Documents

Publication Publication Date Title
US7818791B2 (en) Fingerprint authentication method for accessing wireless network systems
EP1288765B1 (en) Universal authentication mechanism
US20170366556A1 (en) Multichannel device utilizing a centralized out-of-band authentication system (cobas)
EP2479957B1 (en) System and method for authenticating remote server access
US20120066749A1 (en) Method and computer program for generation and verification of otp between server and mobile device using multiple channels
CN101300808B (en) Method and arrangement for secure autentication
KR101383761B1 (en) User authentication system and method thereof
US20140329497A1 (en) Smartdevices Enabled Secure Access to Multiple Entities (SESAME)
WO2011161461A1 (en) Identity verification
US20070288998A1 (en) System and method for biometric authentication
CN102377769A (en) Communication system providing wireless authentication for private data access and related methods
CN1756155A (en) Mobile authentication for network access
EP2743857A1 (en) Methof for allowing establishment of a secure session between a device and a server
CN107395634B (en) Password-free identity authentication method of wearable equipment
CN101765998B (en) Using authentication ticket to initialize computer
WO2013013263A1 (en) Call authentication methods and systems
CN104303481A (en) Method and apparatus for remote portable wireless device authentication
CN105325021B (en) Method and apparatus for remote portable wireless device authentication
GB2408129A (en) User authentication via short range communication from a portable device (eg a mobile phone)
CN109327429A (en) Verification System, apparatus management system and its method
US20100257366A1 (en) Method of authenticating a user
US10735409B2 (en) Authenication stick
CN1771753B (en) Method and apparatus for user authentication using infrared communication of a mobile terminal
KR100858146B1 (en) Method for personal authentication using mobile and subscriber identify module and device thereof
CN105072136B (en) A kind of equipment room safety certifying method and system based on virtual drive

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20080130