CN102640166A - Electronic security device for validation adopting biometrics information and using method thereof - Google Patents

Electronic security device for validation adopting biometrics information and using method thereof Download PDF

Info

Publication number
CN102640166A
CN102640166A CN2009801627281A CN200980162728A CN102640166A CN 102640166 A CN102640166 A CN 102640166A CN 2009801627281 A CN2009801627281 A CN 2009801627281A CN 200980162728 A CN200980162728 A CN 200980162728A CN 102640166 A CN102640166 A CN 102640166A
Authority
CN
China
Prior art keywords
safety device
electronic safety
information
module
host computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2009801627281A
Other languages
Chinese (zh)
Other versions
CN102640166B (en
Inventor
盛永祥
邢益涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN WINSING TECHNOLOGY CO LTD
Original Assignee
SHENZHEN WINSING TECHNOLOGY CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN WINSING TECHNOLOGY CO Ltd filed Critical SHENZHEN WINSING TECHNOLOGY CO Ltd
Publication of CN102640166A publication Critical patent/CN102640166A/en
Application granted granted Critical
Publication of CN102640166B publication Critical patent/CN102640166B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/94Hardware or software architectures specially adapted for image or video understanding
    • G06V10/95Hardware or software architectures specially adapted for image or video understanding structured as a network, e.g. client-server architectures

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

An electronic security device (100) for validation adopting biometrics information and using method thereof are provided. The electronic security device (100) comprises: an identification module (104) which identifies biometrics information and outputs a user number corresponding to the biometrics information; a storage module (103) which stores a lower identification code of the electronic security device and user information corresponding to the biometrics information; an authentication module (102) which encrypts the lower identification code and checking information into authentication information, wherein an upper computer (106) transmits the checking information to an interface module (105), then a control module acquires the checking information and transmits the checking information to the authentication module (102); the interface module (105) which transmits the user information or the authentication information to the upper computer (106); the control module which controls the interface module (105) to transmit the authentication information to the upper computer (106), and acquires the user number from the identification module (104), and then according to the user number, acquires the user information from the storage module (103), and controls the interface module (105) to transmit the user information to the upper computer (106). Through the above arrangements, the electronic security device (100) has the advantages of easy use and privacy security.

Description

Electronic security device for validation adopting biometrics information and using method thereof
The electronic safety device and its application method of a kind of use biological information checking
【Technical field】
The invention relates to a kind of electronic safety device and its application method, more specifically, the electronic safety device and its application method of a kind of use biological information checking are related to.
【Background technology】
In existing bank charge mode, user will generally be operated by bank card on the person's of refusing machine of bank, and manually enter password in operation, and during user manually enters password, password is possible to be spied on by criminal, causes safety issue.
In addition, there is also a kind of USB identification equipments for being referred to as U-shield, user need to only download a client software on the computer that can be surfed the Net, and insert the USB identification equipments, just line access can be entered to the account of oneself through network, but, although safer using this kind of U-shield technology, but user still needs to manually enter account and password, further, since each Bank Account Number needs to use a USB identification equipment, and for the user with multiple Bank Account Numbers, need to carry multiple USB Shi Do equipment, thereby result in inconvenience.
Accordingly, it is desirable to provide one kind can enter multiple accounts line access, and the equipment of password need not be manually entered to solve the above problems.
【The content of the invention】
The present invention is in order to solve the above problems there is provided a kind of electronic safety device of use living things feature recognition and its application method, wherein electronic safety device and upper mechatronics, and electronic safety device includes:Identification module, recognizes biological information, and export Customs Assigned Number corresponding with biological information;Memory module, the next identification code for the electronic safety device that is stored with and user profile corresponding with biological information;Authentication module, authentication information is encrypted as by the next identification code and check information, and wherein host computer sends check information extremely Interface module, control module obtains check information and sends check information to authentication module;Interface module, host computer is sent to by user profile or authentication information;Control module, control interface module sends authentication information to host computer, and Customs Assigned Number is obtained from identification module, obtains user profile from memory module according to Customs Assigned Number, control interface module sends user profile to host computer.
4 is blunt according to a preferred embodiment of the present invention, and user profile includes user password information.
4 is blunt according to a preferred embodiment of the present invention, and biological information includes finger print information, iris information, Zhang Pattern information, odiferous information, action message, face type information, body-shape information, voiceprint and venous information.
According to a preferred embodiment of the invention, host computer includes computer equipment or embedded device, and computer equipment or embedded device at least include a communication interface, and communication interface is electrically connected with interface module.
The present invention more provides a kind of method using the electronic safety device verified using biological information, comprises the following steps:Step one:Electronic safety device connects host computer through interface module, and electronic safety device is mutually authenticated with host computer;Step 2:If certification success, processing module, which starts identification module, asks user's input biological information, and the identification module of electronic safety device exports a Customs Assigned Number according to biological information;Processing module retrieves user profile corresponding with Customs Assigned Number according to Customs Assigned Number from memory module;Step 3:Processing module control interface module sends user profile to host computer.
According to a preferred embodiment of the invention, in the step of electronic safety device and host computer are mutually authenticated, if certification is unsuccessful, electronic safety device stops communicating with host computer.
The present invention further provides a kind of method using the electronic safety device verified using biological information, comprise the following steps:Step one:Processing module, which starts identification module, asks user's input biological information, and the identification module of electronic safety device exports a Customs Assigned Number according to biological information;Processing module retrieves user profile corresponding with Customs Assigned Number according to Customs Assigned Number from memory module;Step 2:If recognizing successfully, electronic safety device connects host computer through interface module, and electronic safety device is mutually authenticated with host computer;Step 3:If certification success, processing module control interface module sends user profile to host computer.
According to a preferred embodiment of the invention, in the step of electronic safety device and host computer are mutually authenticated, if certification is unsuccessful, electronic safety device stops communicating with host computer. The present invention further provides a kind of method using the electronic safety device verified using biological information, wherein, host computer is further connected with communication object, and this method comprises the following steps:Step one:Processing module, which starts identification module, asks user's input biological information, and the identification module of electronic safety device exports a Customs Assigned Number according to biological information;Processing module retrieves user profile corresponding with Customs Assigned Number according to Customs Assigned Number from memory module;Step 2:If recognizing successfully, electronic safety device passes through interface module connecting communication object via the forwarding of host computer, and electronic safety device is mutually authenticated with communication object;Step 3:If certification success, processing module control interface module sends user profile to communication object via the forwarding of host computer.
Just blunt according to a preferred embodiment of the present invention, in the step of electronic safety device and communication object are mutually authenticated, if certification is unsuccessful, electronic safety device stops communicating with communication object.
The electronic safety device and its application method of disclosed bio-identification have using simple, the advantage of secret and safe, so as to solve the problem of use that prior art occurs is complex, security is poor well.
【Brief description of the drawings】
Fig. 1 is the system connection block diagram of first embodiment of the invention.
Fig. 2 be the present invention use Sheng thing Te Zheng Shi Do electronic safety device in identification module 104 a preferred structure.
Fig. 3 be the present invention use living things feature recognition electronic safety device in memory module 103 in customer data base structure chart.
Fig. 4-Fig. 6 is the application method flow chart of the electronic safety device of the use living things feature recognition of the present invention.
【Embodiment】
The embodiment of the present invention will be described in greater detail hereinbelow, with reference to the accompanying drawings.However, the present invention can be presented as different forms and be not considered limited to embodiment as described herein.And it is to provide these embodiments so that this disclosure is comprehensively and complete, and passes on the present invention's comprehensively to those skilled in the art Category.
Illustrated in fig. 1 is the system connection block diagram of first embodiment of the invention.In Fig. 1, the annexation of the system architecture of electronic safety device and its that the use biological information of the present invention demonstrate,proves entirely with host computer 106 is described in detail, the electronic safety device of use biological information checking of the invention includes:Processing module 101, authentication module 102, memory module 103, identification module 104 and interface module 105.Processing module 101 is the processor chips with calculation processing power, for controlling authentication module 102, memory module 103, identification module 104 and interface module 105.Identification module 104 can be fingerprint identification module, Hong Mo Shi Do modules, Sheng Wen Shi Do modules, Jing Mai Shi Do modules, Zhang Wen Shi Do modules, Qi Wei Shi Do modules, action recognition module, one kind in the existing identification module 104 such as face Xing Shi Do modules and build identification module, it can be gathered such as finger print information, iris information, voiceprint, venous information, Zhang Pattern information, odiferous information, action message, the biological information such as face type information and body-shape information, and Customs Assigned Number is exported after handling biological information, wherein Customs Assigned Number is corresponding with specific biological information.Memory module 103 is used for the account password information for storing identification code and user's input, and it can be existing flash memory device, data storage, solid state hard disc etc..Interface module 105 is controlled by processing module 101, is connected for the communication interface with host computer 106, interface module 105 can be embodied as:Which kind of communication protocol universal serial bus concentrator, bluetooth hub, hub etc., the selection of interface module 105 select communicated with host computer 106 depending on user.
And host computer 106 can be computer or any embedded device, host computer 106 must have the communication interface of one or more, row data communication is entered with the interface module 105 with electronic safety device, in addition, host computer 106 is that the data communication between its communication interface and interface module 105 is controlled with software or hardware mode.
Identification module 104 has numerous embodiments, and Fig. 2 depicts a preferred structure of the identification module 104 shown in Fig. 1.In fig. 2, algoritic module 202, collecting biological feature information sensor 201, condition code memory module 203 and the composition identification module 104 of condition code comparing module 204.
Collecting biological feature information sensor 201 be used for gather fingerprint, iris, vocal print, vein, palmmprint, The biological informations such as smell, action, face type and build, for example, for its biological information gathered is fingerprint, fingerprint image is obtained using the mode for shooting photo, and the fingerprint image obtained is exactly biological information.
Algoritic module 202 is used to the characteristic information obtained being converted into condition code, for example, the fingerprint image of foregoing obtained picture format can be generated as to the character string of binary format through algoritic module 202.Algorithm used in algoritic module 202 is provided by chip manufacturer, with confidentiality, is difficult to be cracked.
Condition code memory module 203 preserves the condition code generated in some sequence, and generates and its one-to-one Customs Assigned Number so that each condition code can correspond to a specific Customs Assigned Number.
In user's checking, characteristic information acquisition module gathers the biological information of user, the biological information is generated condition code by algoritic module 202, this feature code is compared condition code comparing module 204 with original condition code stored, if it was found that the condition code not being consistent, the condition code comparing module 204 of subscriber identification module 104 can send checking invalid signals to processing module 101, if it was found that there is the condition code being consistent, the condition code comparing module 204 of subscriber identification module 104 can then transmit the corresponding Customs Assigned Number of this feature code to processing module 101, customer data base of the module 101 for processing according to the Customs Assigned Number in memory module 103 is arranged on(It is discussed in detail below)Middle retrieval.
Authentication module 102 is controlled by processing module 101, for special encryption/deciphering chip, the data being stored in memory module 103 can be encrypted under the control of processing module 101, or the data deciphering that processing module 101 can be obtained from interface module 105.
The customer data base in memory module 103 is described in detail now with reference to Fig. 3.Wherein, be stored with user profile in memory module 103.As shown in Figure 3, file 302 is the user profile of user 1, wherein the user profile includes user account 1 and user cipher 1, it is worth noting that, user 1 has a user account in this document 302, therefore processing module 101 can directly find the file 302 of user 1 according to Customs Assigned Number, and call the account and encrypted message of user 1.The Customs Assigned Number that processing module 101 is obtained is 2, therefore file 303 can be found according to Customs Assigned Number 2, and find that the user profile of the user 2 includes multiple accounts, therefore the plurality of account can be sent to interface module 105 by processing module 101, so that through The information of multiple accounts is sent to host computer 106 by interface module 105, host computer 106, which may inform the user that, currently has multiple accounts, user is allowed to select, after user selects, if user have selected user account 3, then host computer 106 returns to user account 3 to interface module 105, and processing module 101 is known after user account 3, the data of user account 3 and user cipher 3 are sent into host computer 106, so as to complete the selection of many accounts.The customer data base can be realized with various conventional databases, for example, be preferably xml (the own language of the expansible mark ^ of Extensible Markup Language) database.
In addition, the group identification code that is also stored with memory module 103, wherein; the Group identification codes are unique, are write by manufacturer, any after write to make change to it per capita, through the identification code, host computer 106 can recognize that the legitimacy of electronic security device.
This group identification code, can be stored in single chip, can also be stored in different chips, and shielding done using pseudo- identification code Bing identification code can be by algorithm and mutually confirm other side's legitimacy in Qie Group, and can show that one or Yi Group unique identification code is used to authentication module by a special algorithm.
In embodiments of the present invention, above-mentioned identification code and check information can be encrypted as authentication information by authentication module 102 under the control of processing module 101, check information can be one or more numerical digits coding, and check information can also include the user account that is stored in memory module 103.When check information includes user account, if certification success, processing module 101 can directly find the file of user according to Customs Assigned Number corresponding with user account number, then call the encrypted message of user.When check information does not include user account or the user is many account numbers, if certification success, processing module 101 can directly find the file of user according to Customs Assigned Number corresponding with user account number, then call the user account and encrypted message of user.Various embodiments referring to the application method of the electronic safety device of Fig. 4-6 pairs of living things feature recognitions of the invention are described in detail.Before these flow charts are introduced, it is notable that have recorded the user data of registered user in the memory module 103 of electronic safety device in advance by user's requirement, the user data may be, for example, the personal data such as the account and password of user.In addition, also have recorded the biological information of registered user in the identification module 104 of electronic safety device, the biological information can produce a corresponding use in identification module 104 Number at family(It is such as foregoing).Certainly, on other occasions, user can also pass through and register the biological information of oneself in the identification module 104 of electronic safety device, and input user data in host computer 106, and host computer 106 can be by user data transmission into electronic safety device, and set up in electronic safety device the corresponding relation of biological information and user data.
Fig. 4 is the flow chart of an embodiment of the application method of the electronic safety device of the living things feature recognition of the present invention.Flow in Fig. 4 starts from step 401, in step 402, user's insertion electronic safety device.
In step 403, host computer 106 detects the insertion of electronic safety device, through its communication interface the dangerous information 1 in school is sent to electronic safety device, wherein, host computer 106 can also preserve the identification code 1 of electronic safety device, and host computer check information 1 and identification code 1 is encrypted computing for encryption information 1 after checking information is sent using special algorithm.
In step 404, electronic safety device obtains check information using interface module 105, and using authentication module 102 by identification code and check information using with using above-mentioned identical algorithm for encryption as encryption information Γ.
In step 405, electronic safety device returns to encryption information Γ to host computer 106 through interface module 105.In step 406, host computer 106 judges whether encryption information Γ is correct, that is, judges whether encryption information Γ is consistent with encryption information 1, if judged result is " no ", performs step 407, host computer 106 is blunt wrong and terminates flow.
If judged result is " being ", then perform step 408, electronic safety device sends check information 2 to host computer, wherein, electronic safety device can also preserve the Shi Do codes 2 of host computer 106, and computing is encrypted for encryption information 2 to check information and the next identification code using another algorithm after checking information is sent in electronic safety device.
In step 409, the check information 2 that host computer 106 sends over electronic installation is encrypted as encryption information 2 with the identification code 2 of itself, wherein check information 2 can be a part for the either encryption information 1 of encryption information 1.
In step 410, host computer 106 sends the encryption information 2 to electronic safety device.
In step 411, electronic safety device passes through the receiving encryption key 2 of interface module 105, and utilizes processing Module 101 judges whether encryption information 2 correct, i.e., judge encryption information 2' whether with encryption information 2-causes, if judged result is " no ", perform step 412, electronic safety device closing and the communication of host computer 106 and end.
If judged result is " being ", Bu Sudden 413 are performed, electronic safety device sets up communication channel with host computer 106, the data transfer mutually trusted.It coordinates by using balance encryption and non-equilibrium AES, the data encryption of communication is transmitted, it is ensured that being trapped halfway can not also decode.
In step 414, electronic safety device receives user's input biological information, and now user can input specific biological information on identification module 104, can for example input finger print data.
In step 415, whether the Shi Do users of identification module 104 are legal, that is, judge whether the biological information that the user is inputted is the biological information registered(Specific method is above with detailed description)If judged result is " no ", step 412 is performed, electronic safety device closes the communication and end with host computer 106.
If judged result is " being ", step 416 is performed, electronic safety device calls the user profile deposited in memory module 103 according to Customs Assigned Number corresponding with the biological information.
In step 417, the user profile is transferred to host computer 106 by electronic safety device through communication interface, in certain embodiments, and a user may have multiple account informations, in this case, the prompting of host computer 106 user makes a choice in multiple account informations.
In step 418, after user makes a choice in host computer 106, host computer 106 transmits user profile to specific device, and notifies electronic safety device.Wherein, depending on the use field of electronic safety device, specific device can be chosen for different devices, such as, if electronic safety device to be used as to the identity recognition device of banking system, then, the specific device can be the client data server in banking system.
In step 419, electronic safety device is got after announcement information through communication interface, exits working condition, and user can pull out electronic safety device from host computer 106, and flow so far terminates.
Fig. 5 is the flow chart of another embodiment of the application method of the electronic safety device of the living things feature recognition of the present invention.
Flow in Fig. 5 starts from step 501, in step 502, user's insertion electronic safety device. In step 503, electronic safety device receives user's input biological information, and now user can input specific biological information on identification module 104, can for example input finger print data.
In step 504, whether the Shi Do users of identification module 104 are legal, that is, judge whether the biological information that the user is inputted is the biological information registered(Specific method is above with detailed description)If judged result is " no ", step 505 is performed, electronic safety device closes the communication and end with host computer 106.
If judged result is " being ", Bu Sudden 506 are performed, electronic safety device calls the user profile deposited in memory module 103 according to Customs Assigned Number corresponding with the biological information.
Following step 507-515 is the process that electronic safety device is mutually authenticated with host computer 106, embodiments thereof is identical with described in Fig. 4, it is only a kind of preferred embodiment applied to the present invention, and any known techniques that can realize that electronic safety device is mutually authenticated function with host computer 616 can be applied to the present invention, the present invention does not make specific restriction to it.
In step 507, host computer 106 detects the insertion of electronic safety device, through its communication interface the dangerous information 1 in school is sent to electronic safety device, wherein, host computer 106 can also preserve the identification code 1 of electronic safety device, and host computer check information 1 and identification code 1 is encrypted computing for encryption information 1 after checking information is sent using special algorithm.
In step 508, electronic safety device obtains check information using interface module 105, and using authentication module 102 by identification code and check information using with using above-mentioned identical algorithm for encryption as encryption information Γ.
In step 509, electronic safety device returns to encryption information Γ to host computer 106 through interface module 105.In step 510, host computer 106 judges whether encryption information Γ is correct, that is, judges whether encryption information Γ is consistent with encryption information 1, if judged result is " no ", performs step 511, host computer 106 is wrong and terminates flow.
If judged result is " being ", then perform step 512, electronic safety device sends check information 2 to host computer, wherein, electronic safety device can also preserve the identification code 2 of host computer 106, and computing is encrypted for encryption information 2 to check information and the next identification code using another algorithm after checking information 2 is sent in electronic safety device. In step 513, the check information 2 that host computer 106 sends over electronic installation is encrypted as encryption information 2' with the identification code 2 of itself, and wherein check information 2 can be a part for the either encryption information 1 of encryption information 1.
In step 514, host computer 106 sends the encryption information 2 to electronic safety device.
In step 515, electronic safety device passes through the receiving encryption key 2 of interface module 105, and judge whether encryption information 2 is correct using processing module 101, judge whether encryption information 2' is consistent with encryption information 2, if judged result is " no ", step 505 is then performed, electronic safety device closes the communication and end with host computer 106.
If judged result is " being ", Bu Sudden 516 are performed, electronic safety device sets up communication channel with host computer 106, the data transfer mutually trusted.It coordinates by using balance encryption and non-equilibrium AES, the data encryption of communication is transmitted, it is ensured that being trapped halfway can not also decode.
In step 517, the user profile is transferred to host computer 106 by electronic safety device through communication interface, in certain embodiments, and a user may have multiple account informations, in this case, the prompting of host computer 106 user makes a choice in multiple account informations.
In step 518, after user makes a choice in host computer 106, host computer 106 transmits user profile to specific device, and notifies electronic safety device.Wherein, depending on the use field of electronic safety device, specific device can be chosen for different devices, such as, if electronic safety device to be used as to the identity recognition device of banking system, then, the specific device can be the client data server in banking system.
In step 519, electronic safety device is got after announcement information through communication interface, exits working condition, and user can pull out electronic safety device from host computer 106, and flow so far terminates.
Fig. 6 is the flow chart of the another embodiment of the application method of the electronic safety device of the living things feature recognition of the present invention.
Flow in Fig. 6 starts from step 601, in step 602, user's insertion electronic safety device.
In step 603, electronic safety device receives user's input biological information, and now user can input specific biological information on identification module 104, can for example input finger print data. In step 604, whether the identification user of identification module 104 is legal, that is, judges whether the biological information that the user is inputted is the biological information registered(Specific method is above with detailed description)If judged result is " no ", step 605 is performed, electronic safety device closes the communication and end with host computer 106.
If judged result is " being ", then perform Bu Sudden 606, electronic safety device interface module 105 delivers letters breath to host computer, host computer is according to the presentation of information communication object selection interface, wherein the communication object selection interface can show various chargeable services, such as Web bank is paid, social security is paid, medical insurance is paid, and host computer can be connected through internet with more than as the communication object of the payment server of various chargeable services.
In step 607, user selects communication object on host computer, if user needs to pay social security, the communication object that social security can be selected to pay, and host computer can pass through internet and the payment server of social security is connected, and then perform step 608.
Following step 608-515 is the process that electronic safety device is mutually authenticated with communication object, the authentication mode that the present invention is introduced is only a kind of preferred embodiment that can be applied to the present invention, and any known techniques that can realize that electronic safety device is mutually authenticated function with communication object can be applied to the present invention, the present invention does not make specific restriction to it.
In step 608, communication object inquires electronic safety device, check information 1 is sent to electronic safety device, wherein, communication object can also preserve the identification code 1 of electronic safety device, and communication object check information 1 and identification code 1 is encrypted computing for encryption information 1 after checking information is sent using special algorithm.
In step 609, electronic safety device obtains check information using interface module 105, and using authentication module 102 by identification code and check information using with using above-mentioned identical algorithm for encryption as encryption information Γ.
In step 610, electronic safety device returns to encryption information 1 through interface module 105, and to host computer 106, encryption information Γ is forwarded to communication object by host computer.
In step 611, communication object judges encryption information 1, it is whether correct, judge whether encryption information Γ is consistent with encryption information 1, if judged result is " no ", step 612 is then performed, communication object sends authentication failure message to host computer 106 so that host computer 106 reports an error and terminates flow.
If judged result is " being ", step 613 is performed, electronic safety device turns through host computer 106 Hair sends check information 2 to communication object, wherein, electronic safety device can also preserve the identification code 2 of host computer 106, and computing is encrypted for encryption information 2 to check information and the next identification code using another algorithm after checking information 2 is sent in electronic safety device.
In step 614, the check information 2 that communication object sends over electronic installation is encrypted as encryption information 2' with itself Shi Do code 2, and wherein check information 2 can be a part for the either encryption information 1 of encryption information 1.
In step 615, communication object sends the encryption information 2 to electronic safety device through the forwarding of host computer 106.
In step 616, electronic safety device passes through the receiving encryption key 2 of interface module 105, and judge whether encryption information 2 is correct using processing module 101, judge encryption information 2, whether with encryption information 2-cause, if judged result is " no ", step 605 is performed, electronic safety device closes the communication and end with host computer 106.
If judged result is " being ", step 617 is performed, communication object sets up communication channel with host computer 106, the data transfer mutually trusted.It coordinates by using balance encryption and non-equilibrium AES, the data encryption of communication is transmitted, it is ensured that being trapped halfway can not also decode.
In step 618, electronic safety device calls the user profile deposited in memory module 103 according to Customs Assigned Number corresponding with the biological information.
In step 619, forwarding of the electronic safety device through communication interface by the user profile through host computer 106 is transferred to communication object, in certain embodiments, one user may have multiple account informations, in this case, the prompting of host computer 106 user makes a choice in multiple account informations.
In step 620, after user makes a choice in host computer 106, host computer 106 transmits user profile to communication object, and notifies electronic safety device.
In step 621, electronic safety device is got after announcement information through communication interface, exits working condition, and user can pull out electronic safety device from host computer 106, and flow so far terminates.
It is the general use flow chart of the electronic safety device of the living things feature recognition of the present invention, the electronics above Safety device can realize the function that safe identification is carried out using biological information in different industry fields.For example, the electronic safety device of the living things feature recognition of the present invention can be used in the access identification of the user account of bank, it is generally identical with the flow described in Fig. 2 in the flow of the user account access identification of bank, and it is worth noting that, in the application of banking, in user to when opening a bank account, it can pass through and input the biological information of oneself to be registered, and the electronic safety device of the living things feature recognition of the present invention of this user one is given by bank, user can hold the electronic safety device of the living things feature recognition, and PC or ATM (Automated Teller Machine) ATM can be as host computers 106, electronic safety device can be inserted on the USB interface of PC or ATM(Can also be other interfaces, depending on the type of interface module used in electronic safety device 105), mutual Shi Do are completed in electronic safety device and PC or ATM(Step 203-211) after, user inputs biological information to electronic safety device, and after recognizing successfully, electronic safety device can transmit the user profile of this user to PC or ATM, now, user can pull out electronic safety device, and the user profile can be passed through forwarded into bank server by PC or ATM again, the access right to the user account of oneself in bank server can be obtained through this of user profile user, the step of so as to eliminate manually input password, and avoid manually entering the possibility for being peeped steal information.
In addition, similarly, the electronic safety device of the living things feature recognition be also used in Web TV charge, medical insurance deduct fees, the field such as shopping at network.
The electronic safety device of the living things feature recognition of the present invention is passed through and user identity is identified using the biological information of user, and unique authentication code is set in electronic safety device, electronic safety device is identified using the authentication code, it is achieved thereby that the certification between equipment and host computer or communication object, and the certification between equipment and user, through above double authentication, ensure that safe authorization, in addition, user need to only input biological information to electronic safety device and achieve that safe mandate, so as to eliminate the trouble for manually entering password, therefore, the electronic safety device of the bio-identification of the present invention has using simple, the advantage of secret and safe.
Above-mentioned embodiment is only used for enumerating embodiments of the present invention, and explaination technology spy of the invention Levy, not for limiting scope of the invention.Any skilled person unlabored can change or the arrangement of isotropism belongs to the scope that the present invention is advocated, the scope that interest field of the invention should be limited by the application claims be defined.

Claims (1)

  1. Claim
    1. a kind of electronic safety device of use biological information checking, the electronic safety device and upper mechatronics, it is characterised in that the electronic safety device includes:
    Shi Do modules, recognize biological information, and export Customs Assigned Number corresponding with the biological information;
    Memory module, the next identification code for the electronic safety device that is stored with and user profile corresponding with the biological information;
    Authentication module, the next identification code and check information are encrypted as authentication information, wherein described host computer sends the check information to the interface module, and the control module obtains the check information and sends the check information to the authentication module;
    Interface module, the host computer is sent to by the user profile or authentication information;
    Control module, the interface module is controlled to send the authentication information to the host computer, the Customs Assigned Number is obtained from the identification module, user profile is obtained from the memory module according to the Customs Assigned Number, controls the interface module to send the user profile to the host computer.
    2. the electronic safety device of use biological information checking according to claim 1, it is characterised in that the user profile includes user password information.
    3. the electronic safety device of use biological information checking according to claim 1, characterized in that, the biological information includes finger print information, iris information, palmprint information, odiferous information, action message, face type information, body-shape information, voiceprint and venous information.
    4. the electronic safety device of use biological information checking according to claim 1, it is characterized in that, the host computer includes computer equipment or embedded device, the computer equipment or embedded device at least include a communication interface, and the communication interface is electrically connected with the interface module.
    5. the application method of the electronic safety device of a kind of use biological information checking according to claim 1, it is characterised in that the described method comprises the following steps:
    Step one:The electronic safety device connects the host computer, the electronics through the interface module Safety device is mutually authenticated with the host computer;
    Step 2:If certification success, the processing module, which starts the identification module, asks user's input biological information, and the identification module of the electronic safety device exports a Customs Assigned Number according to the biological information;The processing module retrieves user profile corresponding with the Customs Assigned Number according to the Customs Assigned Number from the memory module;
    Step 3:The processing module controls the interface module to send the user profile to the host computer.
    6. the application method of the electronic safety device of the use biological information checking as described in claim 5, it is characterized in that, in the step of electronic safety device and the host computer are mutually authenticated, if the certification is unsuccessful, the electronic safety device stops communicating with the host computer.
    7. the application method of the electronic safety device of a kind of use biological information checking according to claim 1, it is characterised in that the described method comprises the following steps:
    Step one:The processing module, which starts the identification module, asks user's input biological information, and the Shi Do modules of the electronic safety device export a Customs Assigned Number according to the biological information;The processing module retrieves user profile corresponding with the Customs Assigned Number according to the Customs Assigned Number from the memory module;
    Step 2:If recognizing successfully, the electronic safety device connects the host computer through the interface module, and the electronic safety device is mutually authenticated with the host computer;
    Bu Sudden tri-:If certification success, the processing module controls the interface module to send the user profile to the host computer.
    8. the application method of the electronic safety device of use biological information checking as claimed in claim, it is characterized in that, in the step of electronic safety device and the host computer are mutually authenticated, if the certification is unsuccessful, the electronic safety device stops communicating with the host computer.
    9. the application method of the electronic safety device of a kind of use biological information checking according to claim 1, it is characterised in that the host computer is further connected with communication object, the described method comprises the following steps: Step one:The processing module, which starts the identification module, asks user's input biological information, and the identification module of the electronic safety device exports a Customs Assigned Number according to the biological information;The processing module retrieves user profile corresponding with the Customs Assigned Number according to the Customs Assigned Number from the memory module;
    Step 2:If recognizing successfully, the electronic safety device connects the communication object via the forwarding of the host computer through the interface module, and the electronic safety device is mutually authenticated with the communication object;Step 3:If certification success, the processing module controls the interface module to send the user profile to the communication object via the forwarding of the host computer.
    10. the application method for the electronic safety device verified as claimed in claim 9 using biological information, it is characterized in that, in the step of electronic safety device and the communication object are mutually authenticated, if the certification is unsuccessful, the electronic safety device stops communicating with the communication object.
CN200980162728.1A 2009-12-04 2009-12-04 Electronic security device for validation adopting biometrics information and using method thereof Active CN102640166B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2009/075330 WO2011066690A1 (en) 2009-12-04 2009-12-04 Electronic security device for validation adopting biometrics information and using method thereof

Publications (2)

Publication Number Publication Date
CN102640166A true CN102640166A (en) 2012-08-15
CN102640166B CN102640166B (en) 2014-06-11

Family

ID=44114604

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200980162728.1A Active CN102640166B (en) 2009-12-04 2009-12-04 Electronic security device for validation adopting biometrics information and using method thereof

Country Status (2)

Country Link
CN (1) CN102640166B (en)
WO (1) WO2011066690A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109784141A (en) * 2018-11-27 2019-05-21 中国船舶重工集团公司第七一八研究所 A kind of finger vena identification encryption system based on arm processor

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105450419B (en) * 2015-05-05 2018-07-27 北京天诚盛业科技有限公司 Improve the methods, devices and systems of biometric identification security
CN111444051B (en) * 2020-03-26 2023-10-20 杭州涂鸦信息技术有限公司 Whole machine yield testing method and system for product
CN113297557A (en) * 2021-07-27 2021-08-24 深兰盛视科技(苏州)有限公司 Account data authorization method, device, equipment and computer readable storage medium

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1403941A (en) * 2001-09-03 2003-03-19 王柏东 Safety confirming method combining cipher and biological recognition technology
JP4657668B2 (en) * 2004-10-08 2011-03-23 富士通株式会社 Biometric authentication method and biometric authentication device
JP2008276345A (en) * 2007-04-26 2008-11-13 Kyocera Corp Electronic device, authentication method, and program
CN101561873B (en) * 2009-05-25 2011-06-01 北京森博克智能科技有限公司 Multimode authentication equipment with functions of iris recognition and USB Key

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109784141A (en) * 2018-11-27 2019-05-21 中国船舶重工集团公司第七一八研究所 A kind of finger vena identification encryption system based on arm processor

Also Published As

Publication number Publication date
CN102640166B (en) 2014-06-11
WO2011066690A1 (en) 2011-06-09

Similar Documents

Publication Publication Date Title
US9741033B2 (en) System and method for point of sale payment data credentials management using out-of-band authentication
EP3257194B1 (en) Systems and methods for securely managing biometric data
US7295832B2 (en) Authorization means security module terminal system
US10205711B2 (en) Multi-user strong authentication token
KR101111381B1 (en) User identification system, apparatus, smart card and method for ubiquitous identity management
US8713655B2 (en) Method and system for using personal devices for authentication and service access at service outlets
US7188360B2 (en) Universal authentication mechanism
CN102542449B (en) A kind of radio communication device and payment authentication method
CN102638447A (en) Method and device for system login based on autonomously generated password of user
US20150213452A1 (en) Electronic payment system and method
CN102640166A (en) Electronic security device for validation adopting biometrics information and using method thereof
CN103297237A (en) Identity registration method, identity authentication method, identity registration system, identity authentication system, personal authentication equipment and authentication server
US20190019189A1 (en) Payment authentication
CN101933315B (en) The keyboard for encrypting and authenticating against trojan horse with one time key
US20160021102A1 (en) Method and device for authenticating persons
CN102474498B (en) Authentication method for user identification equipment
CN101470804B (en) Biometrics authentication apparatus
CN203243360U (en) Identity registration system
KR102165105B1 (en) Method for Providing Appointed Service by using Biometric Information
KR101212237B1 (en) System and Method for Paying Input by VoIP Terminal, VoIP Terminal and Recording Medium
CN101316119A (en) Personal identification system, personal identification device and personal identification method
KR101693271B1 (en) Method for Providing Appointed Service by using Biometric Information
KR101041120B1 (en) System and Method for Paying Inquiry by VoIP Terminal, VoIP Terminal and Recording Medium
CN117280344A (en) Method for controlling a smart card
CN103297238A (en) Identity authentication system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant