CN103646202A - Fingerprint information coding encryption and application method - Google Patents

Fingerprint information coding encryption and application method Download PDF

Info

Publication number
CN103646202A
CN103646202A CN201310664447.4A CN201310664447A CN103646202A CN 103646202 A CN103646202 A CN 103646202A CN 201310664447 A CN201310664447 A CN 201310664447A CN 103646202 A CN103646202 A CN 103646202A
Authority
CN
China
Prior art keywords
authentication
password
finger
finger print
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310664447.4A
Other languages
Chinese (zh)
Inventor
张继中
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southeast University
Original Assignee
Southeast University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southeast University filed Critical Southeast University
Priority to CN201310664447.4A priority Critical patent/CN103646202A/en
Publication of CN103646202A publication Critical patent/CN103646202A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention provides a fingerprint information coding encryption and application method, and relates to an information safety system. In particular, fixed biological feature information of human fingerprints is combined with coding information constructed by coding ten fingerprints of a person in a decimal mode. Relatively high safety, reliability and convenience of human biological feature recognition can be achieved, dynamic features of codes can be achieved, and the safety problem due to the fact that the biological feature information is stolen is avoided; meanwhile, complexity of the codes can descend, the load for a verifier to memorize the codes can be relieved, improving of information safety is facilitated, and popularization and application of an authentication technique are further promoted.

Description

A kind of coding encrypting of finger print information and application process
Technical field
The present invention relates to a kind of coding encrypting mode and application process of finger print information, particularly the fingerprints of the different fingers of 10 of people are encoded to build password with the decimal system, thereby realize the combination of the fixing biological characteristic of fingerprint and variable cipher and improve based on biometric identity identification or the security verified.
Background technology
The progress that enters 21st century science and technology makes the quick stepped into information epoch of class society, and the infotech of high speed development allows people's information interchange become convenient, quick, and work efficiency obtains huge lifting, and reinvents in all its bearings our society.Yet thing followed information security issue has been brought stern challenge as the development of stealing, falsely using or distorting also to our society of information.According to Federal Trade Commission, estimate, in recent years, the stolen or abuse of annual nearly 1,000 ten thousand American personal information, caused the loss of 5,000,000,000 dollars to consumer, and the loss of annual commercial undertaking is up to 48,000,000,000 dollars.Carrying out personal verification is the important channel ensuring information safety, and how to pick out rapidly and accurately personal identification, to guarantee information security and to safeguard civil order, has become modern society's important topic urgently to be resolved hurrily.
Traditional authentication identifying method mainly contains two kinds: the method based on knowledge and the method based on keepsake.Method based on knowledge is determined personal identification by checking " what you know ", and person to be verified uses the knowledge grasped to prove oneself identity as password, PIN (Personal Identification Number) (PIN) or password etc.Method based on keepsake is determined personal identification by checking " what you have ", and person to be verified uses held keepsake to prove oneself identity as certificate, seal or key etc.Obviously, above-mentioned two kinds of methods have obvious defect, " knowledge " exist easily forget or obscure, stolen by others or the problem such as crack, " keepsake " exists carry inconvenience, can loss or stolen, easily the problem such as be imitated.Therefore, the defect of traditional identity discrimination method makes it more and more be not suitable with scientific and technological development and social progress, and people have turned to sight the biological identification technology with not reproducible feature human body biological characteristics for this reason.So-called bio-identification, determines personal identification according to characteristics of human body." knowledge " used with conventional art is compared with " keepsake ", the characteristics of human body that biological identification technology adopts have be not afraid of forget, can not lose, be difficult to forge, irreplaceable, the outstanding advantages such as do not need additionally to carry.Therefore, bio-identification is not only safe and reliable, and easy to operate, has significant superiority.
Human body can be divided into two classes for the feature of bio-identification: physiological characteristic and behavioural characteristic.Physiological characteristic mainly contains: fingerprint, palm shape, iris, retina, people's face, facial thermal imagery etc.; Behavioural characteristic mainly contains: signature, voice, gait, keystroke etc.Research and experiment show, the above-mentioned feature of human body is all in the requirement that meets in varying degrees four fundamental propertys such as ubiquity, uniqueness, stability and collection property.Based on these features, people have been developed multiple biological identification technology, wherein apply wide or darker the having of research: fingerprint recognition, the identification of palm shape, iris recognition, retina identification, recognition of face, the identification of facial thermal imagery, sign identification, speech recognition etc.In various biological identification technologies, what fingerprint recognition and palm shape were identified is most widely used, and wherein fingerprint recognition has occupied absolute advantage especially, and the main biological recognition product on domestic and international market is substantially all based on fingerprint identification technology.
In fact fingerprint is a kind of more satisfactory biometric feature.Fingerprint is the lines image being distributed on human finger skin, multiple carinate lines, consists of.Study and show, fetus grew about seven months in parent, and its fingerprint is just completed into, and can not change all the life, unless the physical damnification that finger meets accident.Usually, biological tissue comprises that body surface observable characteristic is all by gene and the common decision of environment and impact, and fingerprint is exactly a kind of of body surface observable characteristic.For fingerprint, gene has determined its aggregated model feature, and the Skin Cell on finger tip starts differentiation phase, and the general characteristic of fingerprint starts to form gradually.In the process of Cell Differentiation, the position of fetus in uterus can constantly change, and its amnion liquid around also has different mobility status.Like this, the residing microenvironment of different finger is not identical.The fine structure of fingerprint determined by residing microenvironment, and the slight change of environment all can make the atomization of cell far from it.The mankind's gene is so to enrich, and the environment that forms fingerprint is again so to change variously, to such an extent as to is identical without any the fingerprint of two fingers.Even if there is the identical twin of same DNA (method that there is no is at present distinguished), do not have identical fingerprint yet, their fingerprint can be distinguished according to minutia completely.
In addition, in various biological recognition systems, the combination property aspect main is the most outstanding in security, ease for use and expense cost etc. for fingerprint recognition system, so it is once occurring having obtained being widely used of criminal investigation judicial domain.Along with the progress of computer technology, the ability complete independently fingerprint recognition computing that personal computer and some other microprocessor are as enough in DSP, ARM etc. has had.Meanwhile, along with the progress of sensor technology, the volume of fingerprint collecting equipment, power consumption and price have had significantly minimizing.This makes Automated Fingerprint Identification System be able to, to civil area development, can be widely used in all kinds of occasions that need personal identification such as message reference, electronic transaction, access control, attendance management and card management of the mechanisms of department such as government, bank, medical treatment, social security, school and company.And the widespread use of Automated Fingerprint Identification System also will contribute to reduce corrupt practice, restrain crime, avoid unnecessary social economy or personal property loss, also contribute to people to complete quickly and easily authentication simultaneously, increase work efficiency.From the situation in market, the market scale of biological identification technology is all increasing every year at a terrific speed, and the shared ratio of fingerprint recognition is keeping absolute advantage always.According to international bio identification group (IBG), estimate, fingerprint recognition surpasses 40% of whole biological identification technology market the shared market share in 2006.As can be seen here, Automated Fingerprint Identification System has wide application and market outlook, and the Social benefit and economic benefit that can bring can not be ignored.
Yet the safety problem of the stolen initiation of fixed biologically feature has limited the large-scale promotion application of biometrics identification technology in actual application.For example on the one hand by trojan horse, usurp the report that other people comprise that fingerprint, people's face information are committed a crime on the internet and happen occasionally, even occurred that prison inmates is murdered the rear fingerprint with prison guard unlatching gate, prison by prison guard and the felony of sneaking away.The people that make of these problems have proposed query to the reliability and safety of biometrics identification technology.Therefore be badly in need of now development and can effectively overcome in-problem new method in biometrics identification technology, system to promote better the raising of socioeconomic development and living standards of the people.
For this reason, the application proposes the fingerprint of 10 different fingers of people to encode to build password by the decimal system in the world first, thereby realize the combination of the fixing biological characteristic of fingerprint and variable cipher and improve the security based on biometric identity identification or checking, to contributing for information security and further developing of social civilization.
Summary of the invention
Technical matters: the coding encrypting and the application process that the object of this invention is to provide a kind of finger print information, the fingerprint of 10 different fingers of people is encoded to build password by the decimal system, thereby the dynamic advantage of the combination that realizes the fixing biological characteristic of fingerprint and the variable cipher convenience in authentication, the advantage such as effective and coding encrypting with performance biological information, with guarantee the safe, convenient of authentication with reliably.
Technical scheme: the present invention encodes to build password by the fingerprint of 10 different fingers of people by the decimal system in the world first, thereby realizing the encrypted message that the fixing biological characteristic of fingerprint builds fixing fingerprint biological information and variable different finger prints coding from the combination of variable cipher is combined for authentication, thereby the advantage of the identification of performance biological information and coded message identification, to advance further developing and applying of identity validation technology.
The coding encrypting method of a kind of finger print information of the present invention, first set putting in order and encoding according to 0-9 of ten fingers of people, then stretch and refer to take obtain finger-print codes as basic password segment, repeat to stretch finger process and can build the decimal system password of being stretched the password segment structure of finger-type one-tenth by each time.
Described stretching refers to refer to and stretches out selected finger and stretched and referred to that fingerprint image is to obtain relevant finger print information, coded message and further to extract the password segment based on coded message by the collection of fingerprint collecting equipment; And repeat to stretch, refer to refer to after once stretching and having referred to, by once stretching in addition, refer to that selected finger stretches out and stretch and refer to that fingerprint image is to obtain relevant finger print information, coded message the further password segment of extraction based on coded message by the collection of fingerprint collecting equipment.
Described fingerprint image is obtained equipment at interior fingerprint and is obtained by picture pick-up device, capacitive transducer, inductance sensor, ultrasonic sensor.
Described fingerprint image obtains by feature extraction and template extraction can be for the finger print information of information comparison;
The application process of a kind of finger print information of the present invention is: described password is for authentication system, described authentication system comprises client and server, and client is except allowing authentication person also have logging in can to obtain the finger print information of authentication person based on fingerprint image and further obtain the information extracting system of finger print information by feature extraction and template extraction, server end comprises application server and database, the finger print information that has ten fingers that can carry out information comparison of authentication person in database, the sequence of ten finger prints and coded message and password, application server is born the function that connects client and database and carry out computing service, and application server and client realize by ciphertext communication that authentication person user logs in, authentication, the computing service function of application server refers to that calculation server refers to that by stretching the finger print information and the finger print information in database that obtain pass through search, information comparison is with the verifier that tentatively determines one's identity, after success, application server calls ten finger print coded messages of authentication person and once stretches the finger print information of finger and coded message and extract the authentication person that the password segment based on coded message is combined to form and input authentication password further combined with surpassing from database, subsequently application server by the authentication password of authentication person input and the authentication password in database by the search information of the carrying out verifier's identity of comparing to determine one's identity, when client can not be carried out the feature extraction of obtained fingerprint image and template extraction, the application server of server end is born feature extraction and the template extraction of obtained fingerprint image.
The authentication flow process of authentication system comprises that authentication person proposes after authentication request to application server by client, authentication system starts, application server sends and obtains authorization information requirement to client identity verifier, then authentication person extracts successively to surpass once to stretch by client-side information extraction system and refers to the finger print information obtaining and be passed to application server, application server compares by search the verifier's identity that tentatively determines one's identity by the finger print information in finger print information and database, after success application server from database, call authentication person ten finger prints coded message and further combined with surpassing, once stretch the finger print information of finger and coded message and extract the authentication person that the password segment based on coded message is combined to form and input authentication password, subsequently application server by the authentication password of authentication person input and the authentication password in database by the search information of the carrying out verifier's identity of comparing to determine one's identity, when information comparison is confirmed to coincide, application server feedback client identity verifier authentication success, when information compare continuous three times when failed by application server feedback client identity verifier authentication failure.
Described password, after authentication person's authentication success, is changed from client and application server contacts; Described password can arrange a plurality of to same authentication person, comprise authentication password, alarm password, backup password; Described authentication password is for authentication; Authentication when described alarm password is subject to other people and coerces for authentication person, now application server can stop authentication by apprizing system fault and contact the police seeking to assist; Described backup password is used for preventing when authentication person from forgetting authentication password again giving or to reset authentication password for change.
The database of described authentication system server is collected the finger print information that comprises ten fingers in verifier's identity situation that determines one's identity, the password that the coded message of ten finger prints and authentication person set.
The comparison of information that described authentication system carries out refer to by the fingerprint image of collection carry out after feature extraction and template extraction with database in fingerprint information exchange cross search and carry out information verification with discriminative information comparison result, verify ten fingers that call its setting after the verifier that tentatively determines one's identity finger-print codes information and in conjunction with once stretch surpassing of authentication person the finger print information of finger and coded message extract authentication person that the password segment based on coded message is combined to form input authentication password and again with database in authentication person's authentication password by search with discriminative information comparison result.
The client of authentication system and application server are by ciphertext communication; Described ciphertext realizes by cryptographic algorithm, and cryptographic algorithm comprises symmetry algorithm and asymmetric arithmetic;
Described client and server may be incorporated in together;
Beneficial effect: the safety that the ID card of traditional identity checking and cryptographic technique and existing human body biological characteristics recognition technology require in authentication, accurately, convenient, also there are a lot of problems in the aspect such as quick and cheap, the encrypted message that the application builds the fixed biologically characteristic information of people's fingerprint with staff finger-print codes is for this reason in conjunction with the relative high security that not only can bring into play human body biological characteristics identification, reliability, convenience and can bring into play the behavioral characteristics of password and reduce and even avoid because of stolen the caused safety problem of biological information, simultaneously because thereby the burden that the complexity of password can decline so also can alleviate authentication person's cipher memory contributes to improve information security and promote the further expansion of authentication application.
Accompanying drawing explanation
Fig. 1 is staff fingerprint information coding encrypted combination authentication system structure.
Fig. 2 is staff fingerprint information coding encrypted combination authentication system authentication flow process.
Embodiment
Below in conjunction with embodiment, the present invention is further illustrated.
Embodiment mono-:
User Zhang San first bank set up account and submit the finger print information of 10 fingers to and left thumb that oneself is selected to left little finger to right little finger to the 0-9 sequence of right thumb and coded system with by 23,789, stretch the authentication password that refers to that coding forms for 09 3 times, 123,123 stretch the alarm password and 08,08 that finger-type becomes for twice, 08, the backup password that forms thrust out one's fingers for 08,08,08 6 times to include in the database of bank server.Then the client that Zhang San installs by mobile phone is done shopping on the net in the time of need to paying, to log in first by mobile phone camera, to absorb to stretch for three times after bank account and is referred to that fingerprint image the ciphertext obtaining by symmetric encipherment algorithm are sent to bank server, the fingerprint image that bank server is stretched finger for three times to it obtains the finger print information that it stretches finger for three times after by feature extraction and template extraction, bank server number is by these finger print informations and by search, compare to be tentatively defined as Zhang San according to the finger print information in storehouse, the finger print information that after success, in bank server calling data storehouse, the coded message of predefined ten finger prints of Zhang San is stretched finger for three times in conjunction with it again determines that the authentication password that Zhang San inputs is 23, 789, 09, bank server is compared the authentication password in this authentication password and database, after comparison coincide, bank server is notified Zhang San's authentication success by ciphertext, Zhang San can enter its account and realize network payment.
If Zhang San feels its personal information and comprise that the encrypted message of setting goes wrong, it can be modified by successful authentication.
If the finger print information of 10 fingers of Zhang San is stolen by network wooden horse by hacker, and while attempting to log in Zhang San's bank account, because it can only provide fix information, the encrypted message that can not provide finger-print codes to build, thus its steal can not be successful.When hacker logs in unsuccessfully, system can be enrolled and be logged in people's associated picture for the use of solving a case below, and simultaneity factor can be by short message notification Zhang San to avoid risk.
If Zhang San is held as a hostage, Zhang San can stretch the alarm password that refers to the finger finger print information obtains and formation thereof for twice by it and reports to the police to the police as neighbouring by 110 by bank account authentication system, and simultaneity factor prompt system fault is to protect Zhang San.
Embodiment bis-:
Certain prison system is set up after gate control system network, first collect the finger print information of 10 fingers that every prison guard submits to and own selected left little finger to left thumb to right little finger extremely 0 to 9 of right thumb sequence and coded system, and selected 78,23,56789 authentication passwords, 5678,123 stretch finger alarm password for twice to include in the database of gate control system server.The ciphertext that the client that has fingerprint capacitor sensor that prison guard A working is at ordinary times installed by each jail door of prison utilizes the authentication password of its selected finger print information of stretching finger for three times and its formation to obtain by rivest, shamir, adelman is carried out authentication with turnover prison access control system; if prison guard is subject to offender and threatens, by stretching the finger print information of finger twice and the alarm password prompt of its formation occurs that alarm provides support to inform other prison guards, gate control system prompt system breaks down to protect prison guard.
Embodiment tri-:
Li Si is provided with the authentication system of ultrasound wave fingerprint sensor on proof box, so that only have can opening safety case after successfully carrying out authentication.Subsequently Li Si submit to the finger print information of its 10 fingers and oneself selected left thumb to left little finger to right little finger to the 0-9 sequence of right thumb and coded system with stretch that finger-type becomes for three times 23,56,79 authentication passwords, once stretch 678 alarm passwords of finger-type one-tenth and stretch 12 of finger-type one-tenth for three times, 58,89 backup passwords are to include in the database of proof box server.Now client and server combine.Can by finger print information of its selected finger and the encrypted message of formation logs in, authentication is opened while needing opening safety case after Li Si.
When Li Si forgets its authentication password, can log in and give or reset authentication password for change by the fingerprint of selected finger and the backup password of its formation.When Li Si is coerced opening safety case, can log in by the finger print information of selected finger and the alarm password of formation thereof, authentication system is by contacting and report to the police with the police at that time, and point out proof box there was a mechanical failure and protect Li Si simultaneously.
Embodiment tetra-
King five safety door for dwelling authentication system is installed and in system database, input its household's the finger print information of ten fingers and selected left thumb to left little finger to right little finger to 0-9 sequence and coded system and the selected authentication password that refers to that finger-print codes forms, the alarm password stretched of right thumb.After its one family just can pass in and out safety door by authentication system, safe and convenient.
Embodiment five
User Zhang San first bank set up account and submit the finger print information of 10 fingers to and left thumb that oneself is selected to left little finger to right little finger to 0-9 sequence and the coded system of right thumb with once stretch by 789 the authentication password that refers to that coding forms, 123,123 stretch the alarm password and 08 that finger-type becomes for twice, 08,08, the backup password that forms thrust out one's fingers for 08,08,08 6 times to include in the database of bank server.Then the client that Zhang San installs by mobile phone is done shopping on the net in the time of need to paying, to log in after bank account first by mobile phone camera and is absorbed and once stretch the image processing software that refers to fingerprint image and load by mobile phone login account and obtain the finger print information that it once stretches finger after by feature extraction and template extraction, and the ciphertext obtaining by asymmetrical encryption algorithm is sent to bank server, bank server number is by these finger print informations and by search, compare to be tentatively defined as Zhang San according to the finger print information in storehouse, the finger print information that after success, in bank server calling data storehouse, the coded message of predefined ten finger prints of Zhang San is once stretched finger in conjunction with it again determines that the authentication password that Zhang San inputs is 789, bank server is compared the authentication password in this authentication password and database, after comparison coincide, bank server is notified Zhang San's authentication success by ciphertext, Zhang San can enter its account and realize network payment.

Claims (9)

1. the coding encrypting method of a finger print information, it is characterized in that first setting putting in order and encoding according to 0-9 of ten fingers of people, then stretch and refer to take obtain finger-print codes as basic password segment, repeat to stretch finger process and can build the decimal system password of being stretched the password segment structure of finger-type one-tenth by each time.
2. the coding encrypting method of a kind of finger print information according to claim 1, stretches described in it is characterized in that and refers to refer to and stretch out selected finger and stretched and referred to that fingerprint image is to obtain relevant finger print information, coded message and further to extract the password segment based on coded message by the collection of fingerprint collecting equipment; And repeat to stretch, refer to refer to after once stretching and having referred to, by once stretching in addition, refer to that selected finger stretches out and stretch and refer to that fingerprint image is to obtain relevant finger print information, coded message the further password segment of extraction based on coded message by the collection of fingerprint collecting equipment.
3. the coding encrypting method of a kind of finger print information according to claim 1, is characterized in that described fingerprint image is obtained equipment at interior fingerprint and obtained by picture pick-up device, capacitive transducer, inductance sensor, ultrasonic sensor.
4. the coding encrypting method of a kind of finger print information according to claim 1, is characterized in that described fingerprint image obtains the finger print information that can compare for information by feature extraction and template extraction.
5. an application process for a kind of finger print information as claimed in claim 1, is characterized in that described password is for authentication system, described authentication system comprises client and server, and client is except allowing authentication person also have logging in can to obtain the finger print information of authentication person based on fingerprint image and further obtain the information extracting system of finger print information by feature extraction and template extraction, server end comprises application server and database, the finger print information that has ten fingers that can carry out information comparison of authentication person in database, the sequence of ten finger prints and coded message and password, application server is born the function that connects client and database and carry out computing service, and application server and client realize by ciphertext communication that authentication person user logs in, authentication, the computing service function of application server refers to that calculation server refers to that by stretching the finger print information and the finger print information in database that obtain pass through search, information comparison is with the verifier that tentatively determines one's identity, after success, application server calls ten finger print coded messages of authentication person and once stretches the finger print information of finger and coded message and extract the authentication person that the password segment based on coded message is combined to form and input authentication password further combined with surpassing from database, subsequently application server by the authentication password of authentication person input and the authentication password in database by the search information of the carrying out verifier's identity of comparing to determine one's identity, when client can not be carried out the feature extraction of obtained fingerprint image and template extraction, the application server of server end is born feature extraction and the template extraction of obtained fingerprint image.
6. the application process of a kind of finger print information according to claim 5, the authentication flow process that it is characterized in that authentication system comprises that authentication person proposes after authentication request to application server by client, authentication system starts, application server sends and obtains authorization information requirement to client identity verifier, then authentication person extracts successively to surpass once to stretch by client-side information extraction system and refers to the finger print information obtaining and be passed to application server, application server compares by search the verifier's identity that tentatively determines one's identity by the finger print information in finger print information and database, after success application server from database, call authentication person ten finger prints coded message and further combined with surpassing, once stretch the finger print information of finger and coded message and extract the authentication person that the password segment based on coded message is combined to form and input authentication password, subsequently application server by the authentication password of authentication person input and the authentication password in database by the search information of the carrying out verifier's identity of comparing to determine one's identity, when information comparison is confirmed to coincide, application server feedback client identity verifier authentication success, when information compare continuous three times when failed by application server feedback client identity verifier authentication failure.
7. the application process of a kind of finger print information according to claim 5, is characterized in that described password, after authentication person's authentication success, changes from client and application server contacts; Described password can arrange a plurality of to same authentication person, comprise authentication password, alarm password, backup password; Described authentication password is for authentication; Authentication when described alarm password is subject to other people and coerces for authentication person, now application server can stop authentication by apprizing system fault and contact the police seeking to assist; Described backup password is used for preventing when authentication person from forgetting authentication password again giving or to reset authentication password for change.
8. the application process of a kind of finger print information according to claim 5, it is characterized in that, the database that it is characterized in that described authentication system server is collected the finger print information that comprises ten fingers in verifier's identity situation that determines one's identity, the password that the coded message of ten finger prints and authentication person set.
9. the application process of a kind of finger print information according to claim 5, it is characterized in that information comparison that described authentication system carries out refer to by the fingerprint image of collection carry out after feature extraction and template extraction with database in fingerprint information exchange cross search and carry out information verification with discriminative information comparison result, verify ten fingers that call its setting after the verifier that tentatively determines one's identity finger-print codes information and in conjunction with once stretch surpassing of authentication person the finger print information of finger and coded message extract authentication person that the password segment based on coded message is combined to form input authentication password and again with database in authentication person's authentication password by search with discriminative information comparison result.
CN201310664447.4A 2013-12-09 2013-12-09 Fingerprint information coding encryption and application method Pending CN103646202A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310664447.4A CN103646202A (en) 2013-12-09 2013-12-09 Fingerprint information coding encryption and application method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310664447.4A CN103646202A (en) 2013-12-09 2013-12-09 Fingerprint information coding encryption and application method

Publications (1)

Publication Number Publication Date
CN103646202A true CN103646202A (en) 2014-03-19

Family

ID=50251415

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310664447.4A Pending CN103646202A (en) 2013-12-09 2013-12-09 Fingerprint information coding encryption and application method

Country Status (1)

Country Link
CN (1) CN103646202A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104318147A (en) * 2014-10-27 2015-01-28 联想(北京)有限公司 Information processing method and electronic device
CN104615927A (en) * 2014-12-31 2015-05-13 宇龙计算机通信科技(深圳)有限公司 Multisystem safe verification method, multisystem safe verification device and terminal
CN105162601A (en) * 2015-08-27 2015-12-16 谭荣兵 Finger vein identification sequence combined password verification system
CN105279400A (en) * 2014-12-22 2016-01-27 东莞市步步高通信软件有限公司 Mobile terminal security management method and mobile terminal
CN105635052A (en) * 2014-10-31 2016-06-01 江苏威盾网络科技有限公司 Network identity dynamic fingerprint authentication method
CN105956856A (en) * 2016-04-18 2016-09-21 宇龙计算机通信科技(深圳)有限公司 Account controlling method and account controlling system
CN106156572A (en) * 2015-02-24 2016-11-23 映智科技股份有限公司 Fingerprint coding method and fingerprint authentication method and system
WO2017063546A1 (en) * 2015-10-14 2017-04-20 中国银联股份有限公司 Fingerprint information-based user identity identification method and device
CN103955881B (en) * 2014-04-18 2017-06-16 中国科学院信息工程研究所 A kind of guard method of image biological feature and device and information recovering method
CN107005577A (en) * 2017-01-25 2017-08-01 深圳市汇顶科技股份有限公司 The processing method and processing unit of finger print data
WO2018148900A1 (en) * 2017-02-16 2018-08-23 深圳市汇顶科技股份有限公司 Fingerprint identification-based authentication method and device, and transaction system
CN109074478A (en) * 2016-03-21 2018-12-21 塞巴斯蒂安·杜邦 The self-reacting device of non-public bio-identification is carried out by distributed computer Web vector graphic ultrasonic wave, infrared ray and contrast visible light photography
TWI696141B (en) * 2019-04-17 2020-06-11 彰化商業銀行股份有限公司 Feature coding system and method and online banking service system and method thereof using the same
CN112417409A (en) * 2020-11-06 2021-02-26 淮阴工学院 Fingerprint encoding method, fingerprint authentication method and fingerprint encoding system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1674499A (en) * 2005-03-23 2005-09-28 西安青松科技股份有限公司 Network identification system based on fingerprint and realizing method thereof
EP1600847A1 (en) * 2004-05-17 2005-11-30 Ahmed Merrouk Universal device for secure input of confidential data
CN101232380A (en) * 2008-02-28 2008-07-30 北京飞天诚信科技有限公司 Method of intelligent cryptographic key equipment safety use and intelligent cryptographic key equipment
CN102110320A (en) * 2010-12-23 2011-06-29 汉王科技股份有限公司 Coerce alarm method and entrance guard control equipment in entrance guard system
CN103400436A (en) * 2013-08-17 2013-11-20 慈溪市科创电子科技有限公司 Access control system and control method thereof

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1600847A1 (en) * 2004-05-17 2005-11-30 Ahmed Merrouk Universal device for secure input of confidential data
CN1674499A (en) * 2005-03-23 2005-09-28 西安青松科技股份有限公司 Network identification system based on fingerprint and realizing method thereof
CN101232380A (en) * 2008-02-28 2008-07-30 北京飞天诚信科技有限公司 Method of intelligent cryptographic key equipment safety use and intelligent cryptographic key equipment
CN102110320A (en) * 2010-12-23 2011-06-29 汉王科技股份有限公司 Coerce alarm method and entrance guard control equipment in entrance guard system
CN103400436A (en) * 2013-08-17 2013-11-20 慈溪市科创电子科技有限公司 Access control system and control method thereof

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103955881B (en) * 2014-04-18 2017-06-16 中国科学院信息工程研究所 A kind of guard method of image biological feature and device and information recovering method
CN104318147A (en) * 2014-10-27 2015-01-28 联想(北京)有限公司 Information processing method and electronic device
CN105635052A (en) * 2014-10-31 2016-06-01 江苏威盾网络科技有限公司 Network identity dynamic fingerprint authentication method
CN105279400A (en) * 2014-12-22 2016-01-27 东莞市步步高通信软件有限公司 Mobile terminal security management method and mobile terminal
CN104615927A (en) * 2014-12-31 2015-05-13 宇龙计算机通信科技(深圳)有限公司 Multisystem safe verification method, multisystem safe verification device and terminal
WO2016106989A1 (en) * 2014-12-31 2016-07-07 宇龙计算机通信科技(深圳)有限公司 Multi-system security authentication method, multi-system security authentication apparatus and terminal
CN104615927B (en) * 2014-12-31 2018-02-13 宇龙计算机通信科技(深圳)有限公司 Multisystem safe verification method, multisystem safety verification device and terminal
CN106156572A (en) * 2015-02-24 2016-11-23 映智科技股份有限公司 Fingerprint coding method and fingerprint authentication method and system
CN105162601A (en) * 2015-08-27 2015-12-16 谭荣兵 Finger vein identification sequence combined password verification system
WO2017063546A1 (en) * 2015-10-14 2017-04-20 中国银联股份有限公司 Fingerprint information-based user identity identification method and device
CN109074478A (en) * 2016-03-21 2018-12-21 塞巴斯蒂安·杜邦 The self-reacting device of non-public bio-identification is carried out by distributed computer Web vector graphic ultrasonic wave, infrared ray and contrast visible light photography
CN105956856A (en) * 2016-04-18 2016-09-21 宇龙计算机通信科技(深圳)有限公司 Account controlling method and account controlling system
CN107005577A (en) * 2017-01-25 2017-08-01 深圳市汇顶科技股份有限公司 The processing method and processing unit of finger print data
CN107005577B (en) * 2017-01-25 2021-06-25 深圳市汇顶科技股份有限公司 Fingerprint data processing method and processing device
US11075759B2 (en) 2017-01-25 2021-07-27 Shenzhen GOODIX Technology Co., Ltd. Fingerprint data processing method and processing apparatus
WO2018148900A1 (en) * 2017-02-16 2018-08-23 深圳市汇顶科技股份有限公司 Fingerprint identification-based authentication method and device, and transaction system
TWI696141B (en) * 2019-04-17 2020-06-11 彰化商業銀行股份有限公司 Feature coding system and method and online banking service system and method thereof using the same
CN112417409A (en) * 2020-11-06 2021-02-26 淮阴工学院 Fingerprint encoding method, fingerprint authentication method and fingerprint encoding system

Similar Documents

Publication Publication Date Title
CN103646202A (en) Fingerprint information coding encryption and application method
CN103646201A (en) Verification method achieved by combining human faces with identities
CN107124283A (en) A kind of physical characteristics collecting system and physical characteristics collecting method
CN103646236B (en) The coding encrypting and application process of a kind of palmprint information
US11657131B2 (en) Biometric unique combination identification system
CN103646200B (en) The coding encrypting of a kind of face information and application process
Verma et al. A Hybrid Privacy Preserving Scheme Using Finger Print Detection in Cloud Environment.
Chikkerur Online fingerprint verification system
Pahuja et al. Biometric authentication & identification through behavioral biometrics: A survey
Garg et al. Fingerprint recognition using gabor filter
Jhaveri et al. Biometric security system and its applications in healthcare
CN105678150A (en) User authority managing method
CN105184571A (en) Payment authentication system based on combination of hand veins and multiple fingerprints
Sharma et al. Encryption of text using fingerprints as input to various algorithms
CN103888258A (en) Biological feature template anti-theft discriminating method
US9900311B2 (en) Method and device for protecting access to a message
US20190007400A1 (en) Method for authentication via a combination of biometric parameters
CN101021924A (en) Intelligent social identity recognition and payment system
CN103647769B (en) A kind of coding encrypting and application process of human ear information
Ameh et al. Securing cardless automated teller machine transactions using bimodal authentication system
Segun et al. Healthcare data breaches: Biometric technology to the rescue
Sahana et al. Multi Biometric Recognition System
Vinothkanna et al. A multimodal biometric approach for the recognition of finger print, palm print and hand vein using fuzzy vault
CN105701411A (en) Information secure transmission method
Ali Analyzing mobile banking security using biometric authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20140319

WD01 Invention patent application deemed withdrawn after publication