CN104683115A - Identity authentication method based on fingerprint information - Google Patents

Identity authentication method based on fingerprint information Download PDF

Info

Publication number
CN104683115A
CN104683115A CN201510137692.9A CN201510137692A CN104683115A CN 104683115 A CN104683115 A CN 104683115A CN 201510137692 A CN201510137692 A CN 201510137692A CN 104683115 A CN104683115 A CN 104683115A
Authority
CN
China
Prior art keywords
user
fingerprint
authentication
dynamic password
window
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510137692.9A
Other languages
Chinese (zh)
Other versions
CN104683115B (en
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Fangzhan Fire Technology Co ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201510137692.9A priority Critical patent/CN104683115B/en
Publication of CN104683115A publication Critical patent/CN104683115A/en
Application granted granted Critical
Publication of CN104683115B publication Critical patent/CN104683115B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention relates to an identity authentication method based on fingerprint information. The identity authentication method comprises the following steps: reading a fingerprint image of a user through a fingerprint reading device, performing fingerprint identification on the fingerprint image to obtain digitized real-time fingerprint characteristic data, generating a user characteristic factor by a token device based on the real-time fingerprint characteristic data and a current time period, generating a shared key according to an SHA-1 algorithm based on a token identifier and the user characteristic factor, generating a dynamic password according to a hashing algorithm based on the shared key and a current value of a counter of the token device, displaying the dynamic password on a display device of the token device, and recording a user ID (identifier) and the generated dynamic password into an authentication window corresponding to an identify authentication server by the user to perform identity authentication on the user. Through the identity authentication method provided by the invention, special fingerprint characteristics of different users can be reasonably used for authenticating whether the current user is legal or not, thereby increasing the difficulty in cracking the dynamic password and expanding the application market of a dynamic password authentication device.

Description

Based on the identity identifying method of finger print information
The divisional application that the present invention is application number is 201410191861.2, the applying date is on May 7th, 2014, denomination of invention is the patent of " identity identifying method based on finger print information ".
Technical field
The present invention relates to Electronic dicrimination field, particularly relate to a kind of identity identifying method based on finger print information.
Background technology
Along with the development of ecommerce and the progress of electronics software and hardware technology, using computer network to carry out electronic transaction has become the important consumption pattern of people.The most common and the simplest access control method uses password, by confirming the legitimacy of user to the coupling of password.Password is dangerous is ubiquitous hidden danger in network system.According to specialty safety association of the U.S., the investigation of nearly thousand company network managers is shown, the place having the network system of 60 percent first to be attacked and to break through is exactly password, and loaded down with trivial details password setup brings many troubles to user simultaneously, to this, network management side is in a dilemma.
Static password is easily cracked main because following several situation: (1) password is is easily intercepted and captured and analyzed in Internet Transmission; (2) user habit Long-Time Service password, the probability revealing password is larger; (3) user preference uses oneself familiar name, date, number, telephone number and combination thereof as password, and to facilitate memory, but such password is easy to be guessed right by others; (4) share a password in multiple Network service and the application system of being everlasting, reduce the fail safe of password.
In order to solve the various problems that static password exists, identity authorization system have employed the scheme producing one-time password based on the time and carrys out alternative traditional static password, thus avoids password and to divulge a secret the potential safety hazard brought.But the reliability of the time synchronized dynamic password only generated based on time single factor test of the prior art not enough, after easily repeatedly being intercepted by other people, is cracked by analysis rule, bring economic loss equally to user and businessman.
Therefore, need a kind of identity identifying method based on dynamic password newly, on the existing basis generating the technical scheme of dynamic password based on time single factor test, introduce in the generation and authentication that user distinctive finger print information participates in dynamic password as another factor, strengthen the difficulty that unauthorized access person cracks dynamic password, improve time cost and Financial cost that unauthorized access person cracks dynamic password, thus improve the security performance of the identity verification scheme based on dynamic password significantly.
Summary of the invention
In order to solve the problem, the invention provides a kind of identity identifying method based on finger print information, the fingerprint image of user is read by fingerprint reading systems, by image processing equipment, sharpening process is carried out to described fingerprint image, by identification of fingerprint equipment, identification of fingerprint is carried out to the image after sharpening process, obtain digitized real time fingerprint characteristic, and described real time fingerprint characteristic is participated in the generation of time synchronized dynamic password, dynamic password generate pattern is changed into dual factors from single factor test, when increasing small hardware cost, improve the reliability of identity authorization system largely, for good trading environment improves in user and businessman.
According to an aspect of the present invention, provide a kind of identity identifying method based on finger print information, described identity identifying method comprises:
Step 1: the fingerprint image being read user by fingerprint reading systems;
Step 2: image processing equipment carries out sharpening process to described fingerprint image, obtains the intensification image that definition strengthens;
Step 3: identification of fingerprint equipment carries out identification of fingerprint to described intensification image, obtains digitized real time fingerprint characteristic;
Step 4: token device generates first user characterization factor based on described real time fingerprint characteristic and current slot;
Step 5: token device generates the first shared key according to SHA-1 algorithm based on token identifications and described first user characterization factor;
Step 6: token device generates the first binary sequence according to hash algorithm based on described first shared key and the first counter currency;
Step 7: token device is carried out binary system to described first binary sequence and changed to the decimal system, obtains the first decimal data, intercepts described first metric last eight bit data and is presented on the display of token device as the first dynamic password;
Step 8: user ID and described first dynamic password are entered in the authentication window corresponding with authentication server by user;
Step 9: authentication server carries out certification according to the user ID of user's typing and the first dynamic password to user identity;
Step 10: authentication server is to described authentication window return authentication result;
Wherein, authentication server carries out certification according to the user ID of user's typing and the first dynamic password to user identity and comprises, and authentication server searches the pre-stored fingerprint characteristic corresponding with described user ID and the token identifications that prestores in a database based on described user ID; The second user characteristics factor is generated based on pre-stored fingerprint characteristic and current slot; The second shared key is generated based on prestore token identifications and the described second user characteristics factor according to SHA-1 algorithm; The second binary sequence is generated based on the second shared key and the second counter currency according to hash algorithm; Carry out binary system to the second binary sequence to change to the decimal system, obtain the second decimal data; Intercept the second metric last eight bit data as the second dynamic password; Second dynamic password and the first dynamic password are compared, if the same authentication result is successfully, if not identical, authentication result is unsuccessfully;
Wherein, described fingerprint reading systems, described image processing equipment, described identification of fingerprint equipment and described first counter are all integrated in described token device, described second counter set is formed in described authentication server, and described first counter is synchronous with described second rolling counters forward.
More specifically, described identity identifying method also comprises, after described dynamic password is entered in the authentication window corresponding with authentication server by user, described authentication window arranges scheduled time window, when in described scheduled time window, described authentication server is not to described authentication window return authentication result, described authentication window reminding user re-enters described dynamic password, and authentication server and token device perform a heavy synchronizing process simultaneously.
More specifically, described identity identifying method also comprises, at authentication server to after described authentication window return authentication result, if authentication result is successfully, then described authentication window prompting user is validated user, if authentication result is unsuccessfully, then described authentication window prompting user is disabled user.
More specifically, described identity identifying method also comprises, when authentication server to described authentication window return authentication result be repeatedly unsuccessfully time, the locking of described authentication window, forbids that user continues the described authentication window of access on the same day.
More specifically, in described identity identifying method, described real time fingerprint characteristic and described pre-stored fingerprint characteristic all comprise fingerprint general characteristic and fingerprint local feature, and described fingerprint general characteristic comprises ring-like, arcuate and spiral type.
Accompanying drawing explanation
Below with reference to accompanying drawing, embodiment of the present invention are described, wherein:
Fig. 1 is the method flow diagram of the identity identifying method based on finger print information illustrated according to an embodiment of the present invention.
Fig. 2 is the block diagram of the identity authorization system based on finger print information illustrated according to an embodiment of the present invention.
Embodiment
Below with reference to accompanying drawings the embodiment of the identity identifying method based on finger print information of the present invention is described in detail.
The skin of people by epidermis, corium and hypodermis three part form.Fingerprint is exactly the streakline of epidermis upper process.Due to the hereditary capacity of people.Although fingerprint everybody all have, different.Fingerprint is divided into polytype: have concentric circles or spiral streakline, looks as whirlpool in water, is whorl; Some streaklines are openings at one side, just as dustpan, are loop; Some line shape shapes, as bow, are bow strain line.Each one fingerprint is except shape difference, and the number of line shape, length are also different.Fingerprint generally just starts to produce fetus on the three or four month, just defines by about six months.When baby grows to manhood, fingerprint also only amplifies and increases slightly, and his grain pattern remains unchanged.Also do not find two identical people of fingerprint now.Therefore, fingerprint is used to carry out user identity identification very effective.
In order to the uniqueness of Appropriate application fingerprint, need to take fingerprint, extract characteristic sum feature digitized processing, thus obtain and can carry out digitally coded fingerprint characteristic data.Generally, read the image of somatic fingerprint by fingerprint reading systems, after getting fingerprint image, preliminary process will be carried out to original image, make it more clear.Next, identification of fingerprint software sets up numeral and the characteristic of fingerprint, a kind of unidirectional conversion, can convert characteristic to from fingerprint but can not be converted into fingerprint from characteristic, and two pieces of different fingerprints can not produce identical characteristic.Some finger print datas are more complicated, and node and directional information combination are created more data, and these directional informations indicate the relation between each node, and the algorithm also had also processes view picture fingerprint image.These fingerprint characteristic datas, are commonly referred to template, save as the record of 1K size.Finally, by the method for computer Fuzzy comparisons, the template of two fingerprints is compared, calculate their similarity degree, finally obtain the matching result of two fingerprints.
Therefore, based in the dynamic password identity authentication method of finger print information and system, only need extract correct digital user fingerprint characteristic data at token device end, and preserve identical digital user fingerprint characteristic data at certificate server end in advance, simultaneously two identical time synchronized dynamic passwords can be generated based on finger print information and time according to predictive encoding algorithm at two ends, thus completing user certification.On the contrary, if disabled user carries out certification, what then token device end extracted is wrong digital user fingerprint characteristic data, what generate is also wrong dynamic password, cannot mate with the correct dynamic password that server end generates, thus ensure to only have validated user just by the just rights and interests of certification.
Fig. 1 is the method flow diagram of the identity identifying method based on finger print information illustrated according to an embodiment of the present invention, and described identity identifying method comprises the following steps:
Step 101: the fingerprint image being read user by fingerprint reading systems;
Step 102: image processing equipment carries out sharpening process to described fingerprint image, obtains the intensification image that definition strengthens;
Step 103: identification of fingerprint equipment carries out identification of fingerprint to described intensification image, obtains digitized real time fingerprint characteristic;
Step 104: token device generates first user characterization factor based on described real time fingerprint characteristic and current slot;
Step 105: token device generates the first shared key according to SHA-1 algorithm based on token identifications and described first user characterization factor;
Step 106: token device generates the first binary sequence according to hash algorithm based on described first shared key and the first counter currency;
Step 107: token device is carried out binary system to described first binary sequence and changed to the decimal system, obtains the first decimal data, intercepts described first metric last eight bit data and is presented on the display of token device as the first dynamic password;
Step 108: user ID and described first dynamic password are entered in the authentication window corresponding with authentication server by user;
Step 109: authentication server carries out certification according to the user ID of user's typing and the first dynamic password to user identity;
Step 110: authentication server is to described authentication window return authentication result;
In addition, in step 109, further comprising the steps:
Step 1101: authentication server searches the pre-stored fingerprint characteristic corresponding with described user ID and the token identifications that prestores in a database based on described user ID;
Step 1102: generate the second user characteristics factor based on pre-stored fingerprint characteristic and current slot;
Step 1103: generate the second shared key based on prestore token identifications and the described second user characteristics factor according to SHA-1 algorithm;
Step 1104: generate the second binary sequence based on the second shared key and the second counter currency according to hash algorithm;
Step 1105: binary system is carried out to the second binary sequence and changes to the decimal system, obtain the second decimal data;
Step 1106: intercept the second metric last eight bit data as the second dynamic password;
Step 1107: the second dynamic password and the first dynamic password are compared, if the same authentication result is successfully, if not identical, authentication result is unsuccessfully;
In addition, after step 108, described authentication window also can arrange scheduled time window, when in described scheduled time window, described authentication server is not to described authentication window return authentication result, described authentication window reminding user re-enters described dynamic password, and authentication server and token device perform a heavy synchronizing process simultaneously; Described identity identifying method also can comprise, and after step 110, if authentication result is successfully, then described authentication window prompting user is validated user, if authentication result is unsuccessfully, then described authentication window prompting user is disabled user; And described identity identifying method also can comprise, when authentication server to described authentication window return authentication result be repeatedly unsuccessfully time, described authentication window locking, and forbid that user continues the described authentication window of access on the same day.
In addition, described fingerprint reading systems, described image processing equipment, described identification of fingerprint equipment and described first counter can all be integrated in described token device, described second counter can be integrated in described authentication server, and described first counter and described second counter are count synchronization; In described identity identifying method, described real time fingerprint characteristic and described pre-stored fingerprint characteristic all comprise fingerprint general characteristic and fingerprint local feature, and described fingerprint general characteristic can comprise ring-like, arcuate and spiral type.
Wherein, SHA-1 algorithm is the member of SHA algorithm family, and SHA algorithm is U.S.National Security Agency (NSA) design, a series of Cryptographic Hash Functions that National Institute of Standards and Technology (NIST) issues.Formal name is SHA.SHA family first member is published on 1993.But people have got an informal title SHA-0 to avoid obscuring with his succession to it.After 2 years, SHA-1, the succession of first SHA has issued.Also have four kinds of variants in addition, once issued scope and some trickle designs of change of promoting output: SHA-224, SHA-256, SHA-384 and SHA-512 (these are sometimes also referred to as SHA-2).SHA-0 and SHA-1 can produce the summary of a string 160 bits from the information of a maximum 2^64 bit, then encrypts based on the similar principle designing MD4 and MD5 message digest algorithm.
Wherein, hash computing is also known as hash function, and Hash function (also claiming hash function or hash algorithm), is changing into input message string long arbitrarily a kind of function of the output string of fixed length exactly.Hash function is a very important instrument in information security, and he applies operation to the message m of a random length, and return Hash Value h (m) of a regular length, hash function need not be maintained secrecy to processing procedure disclosed in being.
Then, with reference to figure 2 continuation, the present invention will be described, Fig. 2 is the block diagram of the identity authorization system based on finger print information illustrated according to an embodiment of the present invention, described identity authorization system comprises token device 21, communication network 22 and authentication server 23, fingerprint reading systems is integrated with in token device 21, image processing equipment, identification of fingerprint equipment and the first counter, the second counter is integrated with in authentication server 23, described first counter and described second counter are count synchronization, token device 21 inputs fingerprint based on user and generates digitize fingerprint characteristic, and based on digitize fingerprint characteristic, current slot and token identifications coding, generate and show dynamic password, the dynamic password generated is inputted the authentication window corresponding with authentication server 23 by user, to send to authentication server 23 place to carry out certification by communication network 22 dynamic password, authentication result is turned back to described authentication window place by communication network 22 by authentication server 23 equally.
Adopt the identity identifying method based on finger print information of the present invention, forming element for existing time synchronized dynamic password generate pattern is single, be easy to the technical problem that cracks, the distinctive digitize fingerprint characteristic of adding users carries out the generation of dynamic password, use the complexity of finger print information, improve the complexity of Verification System and crack difficulty, by introducing less hardware cost, improve the reliability of Verification System largely, promote the use confidence of user, widen the application market of Related product.
Be understandable that, although the present invention with preferred embodiment disclose as above, but above-described embodiment and be not used to limit the present invention.For any those of ordinary skill in the art, do not departing under technical solution of the present invention ambit, the technology contents of above-mentioned announcement all can be utilized to make many possible variations and modification to technical solution of the present invention, or be revised as the Equivalent embodiments of equivalent variations.Therefore, every content not departing from technical solution of the present invention, according to technical spirit of the present invention to any simple modification made for any of the above embodiments, equivalent variations and modification, all still belongs in the scope of technical solution of the present invention protection.

Claims (1)

1. based on an identity identifying method for finger print information, it is characterized in that, described identity identifying method passablecomprise:
The fingerprint image of user is read by fingerprint reading systems;
Image processing equipment carries out sharpening process to described fingerprint image, obtains the intensification image that definition strengthens;
Identification of fingerprint equipment carries out identification of fingerprint to described intensification image, obtains digitized real time fingerprint characteristic;
Token device generates first user characterization factor based on described real time fingerprint characteristic and current slot;
Token device generates the first shared key according to SHA-1 algorithm based on token identifications and described first user characterization factor;
Token device generates the first binary sequence according to hash algorithm based on described first shared key and the first counter currency;
Token device is carried out binary system to described first binary sequence and is changed to the decimal system, obtains the first decimal data, intercepts described first metric last eight bit data and is presented on the display of token device as the first dynamic password;
User ID and described first dynamic password are entered in the authentication window corresponding with authentication server by user;
Authentication server carries out certification according to the user ID of user's typing and the first dynamic password to user identity;
Authentication server is to described authentication window return authentication result;
Wherein, authentication server carries out certification according to the user ID of user's typing and the first dynamic password to user identity and comprises:
Authentication server searches the pre-stored fingerprint characteristic corresponding with described user ID and the token identifications that prestores in a database based on described user ID; The second user characteristics factor is generated based on pre-stored fingerprint characteristic and current slot; The second shared key is generated based on prestore token identifications and the described second user characteristics factor according to SHA-1 algorithm; The second binary sequence is generated based on the second shared key and the second counter currency according to hash algorithm; Carry out binary system to the second binary sequence to change to the decimal system, obtain the second decimal data; Intercept the second metric last eight bit data as the second dynamic password; Second dynamic password and the first dynamic password are compared, if the same authentication result is successfully, if not identical, authentication result is unsuccessfully;
Wherein, described fingerprint reading systems, described image processing equipment, described identification of fingerprint equipment and described first counter are all integrated in described token device, described second counter set is formed in described authentication server, and described first counter is synchronous with described second rolling counters forward;
After described dynamic password is entered in the authentication window corresponding with authentication server by user, described authentication window arranges scheduled time window, when in described scheduled time window, described authentication server is not to described authentication window return authentication result, described authentication window reminding user re-enters described dynamic password, and authentication server and token device perform a heavy synchronizing process simultaneously;
At authentication server to after described authentication window return authentication result, if authentication result is successfully, then described authentication window prompting user be validated user, if authentication result is unsuccessfully, then described authentication window points out user to be disabled user;
When authentication server to described authentication window return authentication result be repeatedly unsuccessfully time, the locking of described authentication window, forbids that user continues the described authentication window of access on the same day.
CN201510137692.9A 2014-05-07 2014-05-07 Based on the identity identifying method of finger print information Expired - Fee Related CN104683115B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510137692.9A CN104683115B (en) 2014-05-07 2014-05-07 Based on the identity identifying method of finger print information

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510137692.9A CN104683115B (en) 2014-05-07 2014-05-07 Based on the identity identifying method of finger print information
CN201410191861.2A CN103986578B (en) 2014-05-07 2014-05-07 Based on the identity identifying method of finger print information

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201410191861.2A Division CN103986578B (en) 2014-05-07 2014-05-07 Based on the identity identifying method of finger print information

Publications (2)

Publication Number Publication Date
CN104683115A true CN104683115A (en) 2015-06-03
CN104683115B CN104683115B (en) 2016-01-06

Family

ID=51278405

Family Applications (3)

Application Number Title Priority Date Filing Date
CN201510137507.6A Expired - Fee Related CN104683114B (en) 2014-05-07 2014-05-07 Based on the identity identifying method of finger print information
CN201510137692.9A Expired - Fee Related CN104683115B (en) 2014-05-07 2014-05-07 Based on the identity identifying method of finger print information
CN201410191861.2A Active CN103986578B (en) 2014-05-07 2014-05-07 Based on the identity identifying method of finger print information

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201510137507.6A Expired - Fee Related CN104683114B (en) 2014-05-07 2014-05-07 Based on the identity identifying method of finger print information

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201410191861.2A Active CN103986578B (en) 2014-05-07 2014-05-07 Based on the identity identifying method of finger print information

Country Status (1)

Country Link
CN (3) CN104683114B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106921611A (en) * 2015-12-25 2017-07-04 南昌欧菲生物识别技术有限公司 A kind of fingerprint identification system and method

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104270252B (en) * 2014-10-16 2018-03-02 广州柏诚智能科技有限公司 The method that calorimeter long-distance meter-reading system and the system realize credible enhancing
CN104634108A (en) * 2014-12-25 2015-05-20 贵州永兴科技有限公司 Universal electric furnace switch with fingerprint identification function
CN104634110B (en) * 2014-12-25 2016-09-28 贵州永兴科技有限公司 A kind of information-based universal electric furnace with counting and fingerprint identification function
CN104596282A (en) * 2014-12-25 2015-05-06 贵州永兴科技有限公司 Informationized all-purpose electric stove with functions of count and fingerprint recognition
CN105049209B (en) * 2015-06-16 2018-10-23 中国银行股份有限公司 Dynamic password formation method and device
CN104994114B (en) * 2015-07-27 2018-10-16 上海位坤电子商务有限公司 A kind of identity authorization system and method based on electronic ID card
CN105162767B (en) * 2015-07-31 2018-06-12 中国联合网络通信集团有限公司 Authentication method and system based on fingerprint
CN106503534B (en) * 2015-09-08 2020-05-12 腾讯科技(深圳)有限公司 Information processing method and terminal
CN105553667A (en) * 2015-12-16 2016-05-04 北京海泰方圆科技股份有限公司 Dynamic password generating method
CN106022035A (en) * 2016-05-03 2016-10-12 识益生物科技(北京)有限公司 Method and system for electronic signature
CN113468514A (en) * 2021-06-28 2021-10-01 深圳供电局有限公司 Multi-factor identity authentication method and system in intranet environment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101674181A (en) * 2008-09-08 2010-03-17 郑建德 User certification system using biological characteristic token
CN102394896A (en) * 2011-12-13 2012-03-28 甘肃农业大学 Privacy-protection fingerprint authentication method and system based on token

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1674500A (en) * 2005-03-23 2005-09-28 西安青松科技股份有限公司 Dynamic cipher network identification system based on fingerprint and realizing method thereof
CN101098232B (en) * 2007-07-12 2012-05-09 兰州大学 Dynamic password and multiple biological characteristics combined identification authenticating method
CN101197665B (en) * 2007-12-24 2011-11-09 北京飞天诚信科技有限公司 Dynamic password generation method and device thereof
CN102916968B (en) * 2012-10-29 2016-01-27 北京天诚盛业科技有限公司 Identity identifying method, authentication server and identification authentication system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101674181A (en) * 2008-09-08 2010-03-17 郑建德 User certification system using biological characteristic token
CN102394896A (en) * 2011-12-13 2012-03-28 甘肃农业大学 Privacy-protection fingerprint authentication method and system based on token

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106921611A (en) * 2015-12-25 2017-07-04 南昌欧菲生物识别技术有限公司 A kind of fingerprint identification system and method

Also Published As

Publication number Publication date
CN104683114A (en) 2015-06-03
CN104683114B (en) 2016-05-11
CN103986578A (en) 2014-08-13
CN104683115B (en) 2016-01-06
CN103986578B (en) 2015-10-28

Similar Documents

Publication Publication Date Title
CN104683115B (en) Based on the identity identifying method of finger print information
US20210314174A1 (en) System and method for verifying an identity of a user using a cryptographic challenge based on a cryptographic operation
US10530577B1 (en) Systems and methods for biometric key generation in data access control, data verification, and path selection in block chain-linked workforce data management
Tan et al. Can unicorns help users compare crypto key fingerprints?
US8838990B2 (en) Bio-cryptography: secure cryptographic protocols with bipartite biotokens
CN106161006B (en) Digital encryption algorithm
CN108600213B (en) Composite identity authentication method and composite identity authentication system applying same
CN107209821A (en) For the method and authentication method being digitally signed to e-file
EP2150915B1 (en) Secure login protocol
CN102035654A (en) Identity authentication method, identity authentication equipment, server and identity authentication-based encryption method
WO1999012144A1 (en) Digital signature generating server and digital signature generating method
WO2014141263A1 (en) Asymmetric otp authentication system
JP2010165323A (en) Biometric authentication method and system
CN103297391A (en) Graphical dynamic password inputting and verifying method
Singh et al. Blockchain technology in biometric database system
CN101877636A (en) Equation password encryption method
EP3440805A1 (en) Method and system for secure password storage
KR20200092950A (en) Match the center of the fingerprint in 2 steps
GB2457491A (en) Identifying a remote network user having a password
CN104702414A (en) Identity authentication method based on fingerprint information
CN109923545B (en) Method and device for enabling authentication of a user of a client device over a secure communication channel based on biometric data
CN112528254A (en) Password security detection method
Govinda et al. T SECURE DATA STORAGE IN CLOUD ENVIRONMENT USING FINGERPRINT
CN112446677B (en) Electronic signature method, device, equipment and storage medium
JP5574005B2 (en) Biometric authentication method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C41 Transfer of patent application or patent right or utility model
CB03 Change of inventor or designer information

Inventor after: Ye Xulang

Inventor before: Request for anonymity

COR Change of bibliographic data
TA01 Transfer of patent application right

Effective date of registration: 20151204

Address after: Heshun Road Economic and Technological Development Zone of Haian County in Jiangsu province Nantong City, No. 2, 226600

Applicant after: JIANGSU TOPDRIVE EQUIPMENT Co.,Ltd.

Address before: 250101 Shandong city of Ji'nan province high tech Zone Shun Road No. 747 6 floor

Applicant before: Sun Qiang

C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220311

Address after: 201313 building 41, No. 1-42, Lane 83, Hongxiang North Road, Wanxiang Town, Pudong New Area, Shanghai

Patentee after: SHANGHAI FANGZHAN FIRE TECHNOLOGY CO.,LTD.

Address before: 226600 No. 2, Heshun Middle Road, economic and Technological Development Zone, Hai'an County, Nantong City, Jiangsu Province

Patentee before: JIANGSU TOPDRIVE EQUIPMENT Co.,Ltd.

CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160106