CN107070864A - Safe verification method and system based on fingerprint - Google Patents
Safe verification method and system based on fingerprint Download PDFInfo
- Publication number
- CN107070864A CN107070864A CN201611264817.5A CN201611264817A CN107070864A CN 107070864 A CN107070864 A CN 107070864A CN 201611264817 A CN201611264817 A CN 201611264817A CN 107070864 A CN107070864 A CN 107070864A
- Authority
- CN
- China
- Prior art keywords
- fingerprint
- security incident
- mutual authentication
- authentication
- terminal device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Collating Specific Patterns (AREA)
Abstract
A kind of safe verification method and system based on fingerprint, including:When needing to perform security incident, all mutual authentication people of the fingerprint authentication solicited message to the security incident are sent;And according to the safe class set in advance of the security incident, when the fingerprint authentication success of the mutual authentication people of preset ratio at least corresponding with the safe class, perform the security incident.The present invention also provides a kind of security authentication systems based on fingerprint and terminal device.The present invention can improve the security of fingerprint authentication.
Description
Technical field
The present invention relates to safety verification technical field, verified in particular to a kind of distributed security based on fingerprint
Method and system.
Background technology
Current finger print safety verification is widely used, and is used for the various safety verification demands on intelligent terminal.Work as needs
When carrying out identity security checking, fingerprint module collection finger print information, then with the finger print information contrast prestored, if
Match somebody with somebody, safety verification can pass through.
However, prior art is mostly to use single fingerprint matching pattern, there is risk in safety verification process.If met
To external force effect, for example, when compromised, single finger print safety checking is equal to invalid checking.
The content of the invention
In view of the foregoing, it is necessary to propose a kind of safe verification method based on fingerprint, fingerprint authentication can be improved
Security.
A kind of safe verification method based on fingerprint, applied in the terminal device as security incident originating end, wherein,
The safe verification method based on fingerprint includes:
When needing to perform the security incident, fingerprint authentication solicited message is sent to all common of the security incident
Identifier;And
According to the safe class set in advance of the security incident, when default ratio at least corresponding with the safe class
During the fingerprint authentication success of the mutual authentication people of example, the security incident is performed.
In the preferred embodiment of the present invention, the preset ratio is X=n/N, and wherein N is all common of the security incident
The quantity of identifier, and the n is the need for presetting while the mutual authentication people being verified.
In the preferred embodiment of the present invention, before the security incident is performed, methods described also includes:
The safe class of the security incident is set;
Select one or more mutual authentication people of the security incident;
Fingerprint typing information is sent to one or more of mutual authentication people, until receiving all mutual authentication people
Fingerprint typing complete information.
In the preferred embodiment of the present invention, methods described also includes:
One or more mutual authentication people is deleted, or changes other mutual authentication people.
A kind of safe verification method based on fingerprint, applied to the terminal device as mutual authentication end, wherein, the base
Include in the safe verification method of fingerprint:
When receiving the fingerprint typing information as the terminal device transmission of security incident originating end, typing user is pointed out
Fingerprint, and the user fingerprints are stored in secure storage section;
Fingerprint typing completion information is sent to the terminal device as security incident originating end;
When receiving the fingerprint authentication solicited message as the terminal device transmission of security incident originating end, input is pointed out
User fingerprints, and the fingerprint of input is matched with being stored in finger print information in secure storage section;And
When fingerprint matching success, to the terminal device as security incident originating end send fingerprint authentication into
The information of work(.
In view of the foregoing, it there is a need to a kind of security authentication systems based on fingerprint of proposition, fingerprint authentication can be improved
Security.
A kind of security authentication systems based on fingerprint, applied in the terminal device as security incident originating end, wherein,
The security authentication systems based on fingerprint include:
Security incident performing module, for when needing to perform the security incident, send fingerprint authentication solicited message to
All mutual authentication people of the security incident, and according to the safe class set in advance of the security incident, when at least with
During the fingerprint authentication success of the mutual authentication people of the corresponding preset ratio of the safe class, the security incident is performed.
In the preferred embodiment of the present invention, the preset ratio is X=n/N, and wherein N is all common of the security incident
The quantity of identifier, and the n is the need for presetting while the mutual authentication people being verified.
In the preferred embodiment of the present invention, the system also includes:
Security incident encrypting module, the safe class for setting the security incident selects the one of the security incident
Individual or multiple mutual authentication people, and fingerprint typing information is sent to one or more of mutual authentication people, until receiving
Fingerprint typing to all mutual authentication people completes information.
In the preferred embodiment of the present invention, the security incident encrypting module is additionally operable to:
One or more mutual authentication people is deleted, or changes other mutual authentication people.
A kind of security authentication systems based on fingerprint, applied to the terminal device as mutual authentication end, wherein, the base
Include in the security authentication systems of fingerprint:
Fingerprint typing and authentication module, in the fingerprint for receiving the terminal device transmission as security incident originating end
During typing information, typing user fingerprints are pointed out, and the user fingerprints are stored in secure storage section, fingerprint typing is complete
The terminal device as security incident originating end is sent into information;Receiving the terminal as security incident originating end
During the fingerprint authentication solicited message that equipment is sent, input user fingerprints are pointed out, and by the fingerprint of input and be stored in safe storage
Finger print information is matched in region, and when fingerprint matching success, to the terminal as security incident originating end
Equipment sends the successful information of fingerprint authentication.
Compared to prior art, safe verification method and system provided by the present invention based on fingerprint are referred to using multiple
Line is verified, and fingerprint authentication is carried out in different terminals, can effectively prevent the abnormal scene being likely to occur during fingerprint authentication from causing
Safety problem, be on the hazard, be spoofed or be forged to such as undesirable checking scene, so as to improve fingerprint authentication
Security.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, below will be to institute in embodiment and description of the prior art
The accompanying drawing needed to use is briefly described, it should be apparent that, drawings in the following description are only some implementations of the present invention
Example, for those of ordinary skill in the art, on the premise of not paying creative work, can also be obtained according to these accompanying drawings
Obtain other accompanying drawings.
It is the application environment schematic diagram of the safe verification method preferred embodiment of the invention based on fingerprint shown in Fig. 1.
It is the method flow diagram of safe verification method first preferred embodiment of the invention based on fingerprint shown in Fig. 2.
It is the method flow diagram of safe verification method second preferred embodiment of the invention based on fingerprint shown in Fig. 3.
It is the method flow diagram of safe verification method the 3rd preferred embodiment of the invention based on fingerprint shown in Fig. 4.
Fig. 5 is the functional block diagram of the security authentication systems preferred embodiment of the invention based on fingerprint.
Fig. 6 is the structural representation of terminal device preferred embodiment of the present invention.
Main element symbol description
Terminal device 1
Network 2
Security authentication systems 10 based on fingerprint
Security incident encrypting module 100
Fingerprint typing and authentication module 101
Security incident performing module 102
Memory 11
Processor 12
Communicator 13
Input/output unit 14
Communication bus 15
Embodiment
The embodiment of the present invention provides a kind of safe verification method based on fingerprint, to realize user without entering to terminal device
The operation of row bright screen unblock, it is possible to perform the open and close operation of network, save user's trouble, improve Consumer's Experience.This hair
Bright embodiment also provides the corresponding security authentication systems based on fingerprint, terminal device and computer-readable recording medium.
In order that those skilled in the art more fully understand the present invention program, below in conjunction with the embodiment of the present invention
Accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described.Obviously, described embodiment is only
The embodiment of a part of the invention, rather than whole embodiments.Based on the embodiment in the present invention, ordinary skill people
The every other embodiment that member is obtained under the premise of creative work is not made, should all belong to the model that the present invention is protected
Enclose.
Below by each specific embodiment, it is described in detail respectively.
Embodiment one,
It is the application environment schematic diagram of the safe verification method preferred embodiment of the invention based on fingerprint with reference to shown in Fig. 1.
In present pre-ferred embodiments, the safe verification method based on fingerprint is applied in multiple terminal devices 1.
Any one in the multiple terminal device 1 may be, but not limited to, for example, the computer of user, such as desk-top
Machine, notebook computer, tablet personal computer etc., and smart mobile phone, intelligent wearable equipment etc..
In other preferred embodiments of the invention, any one in the multiple terminal device 1 can also be an insertion
Formula equipment, can be embedded into existing any information household appliances and industrial control system, for example, being embedded into anti-theft door system.
Row data communication can be entered by network 2 between the multiple terminal device 1.
The network 2 can be internet or intranet etc..
In present pre-ferred embodiments, in the multiple terminal device 1, each terminal device 1 can serve as safety
Event originating end, and other-end equipment 1 is then as the mutual authentication end of the security incident.
Security incident of the present invention can be that any need takes secrecy provision, for example, the safety verification based on fingerprint
The event that could be performed.The security incident can include, but not limited to open classified document, opening safety case, open bank
Account etc..
For example, a classified document that is stored with some terminal device 1, then the terminal device 1 can be used as safe thing
Part originating end, request other-end equipment 1 is as mutual authentication end, and typing is used for the finger print information of safety verification, with to described
Classified document is encrypted, and when the classified document needs to open, asks the mutual authentication end input finger print information, with
Carry out safety verification.
Embodiment two,
It is the method flow diagram of safe verification method first preferred embodiment of the invention based on fingerprint with reference to shown in Fig. 2.
According to different demands, the execution sequence in flow chart shown in the figure can change, some to omit.
First preferred embodiment of the safe verification method of the present invention based on fingerprint is used to add security incident
It is close, it is possible to apply in any one terminal device 1, including:
S10, the terminal device 1 sets the safe class of security incident, and select one of the security incident or
Multiple mutual authentication people.
As described above, the security incident, which can be any need, takes secrecy provision, for example, the safety based on fingerprint is tested
Demonstrate,prove the event that could be performed.The security incident can include, but not limited to for example, open classified document, opening safety case,
Open bank account etc..
The safe class of the security incident can be that such as safe class of opening safety case is 1, opens bank account
It is 0.8 etc. with opening the safe class of classified document.
In present pre-ferred embodiments, multiple ends that the terminal device 1 can be from same LAN be connected to
One or more of which is selected in end equipment 1 as the mutual authentication people of the security incident.
In other preferred embodiments of the invention, selected one or more mutual authentication people and the terminal device 1
It can also be not limited in same LAN.
S11, the terminal device 1 sends fingerprint typing information to one or more of mutual authentication people, and in S12
In, judge whether that the fingerprint typing for receiving all mutual authentication people completes information.
When the fingerprint typing for receiving selected all mutual authentication people completes information, the security incident encryption is held
Row is finished.
When the fingerprint for having any one mutual authentication people does not have typing completion, the terminal device 1 can continue to this
Mutual authentication people sends fingerprint typing information, until the fingerprint typing of selected all mutual authentication people is completed.
In other preferred embodiments of the invention, the terminal device 1 can also delete one or more mutual authentication people,
Or change other mutual authentication people.
Embodiment three,
It is the method flow diagram of safe verification method second preferred embodiment of the invention based on fingerprint with reference to shown in Fig. 3.
According to different demands, the execution sequence in flow chart shown in the figure can change, some to omit.
Second preferred embodiment of the safe verification method of the present invention based on fingerprint is used to perform the security incident,
Such as opening classified document, it is possible to apply in the terminal device 1 described in above-mentioned Fig. 2, including:
S20, when needing to perform security incident, for example, opens classified document, the terminal device 1 sends fingerprint authentication please
Ask all mutual authentication people of the information to the security incident.
S21, the terminal device 1 according to the safe class set in advance of the security incident, judge whether at least with
The fingerprint authentication success of the mutual authentication people of the corresponding preset ratio of the safe class.
For example, the safe class of the security incident is 1, then its corresponding preset ratio is 1, that is, needs 100% to be total to
With the fingerprint authentication success of identifier;When the safe class of the security incident is 0.8, then its corresponding preset ratio is 0.8,
Only need to the fingerprint authentication success of 80% mutual authentication people.
For example, the preset ratio is X=n/N, wherein N is the quantity of all mutual authentication people of the security incident,
And the n is the need for presetting while the mutual authentication people being verified.For example, the quantity of all mutual authentication people
Quantity is 5, the mutual authentication artificial 4 being verified simultaneously the need for advance equipment, then the preset ratio X=4/5=80%.
When at least fingerprint authentication success of the mutual authentication people of preset ratio, S22 is performed, the terminal device 1 is performed
The security incident, such as opening classified document.
When being not reaching to the success of the fingerprint authentication of mutual authentication people of preset ratio, S23 is performed, the security incident is held
Row failure.
Example IV,
It is the method flow diagram of safe verification method the 3rd preferred embodiment of the invention based on fingerprint with reference to shown in Fig. 4.
According to different demands, the execution sequence in flow chart shown in the figure can change, some to omit.
3rd preferred embodiment of the safe verification method of the present invention based on fingerprint performs and is being used as mutual authentication people
Terminal device 1 in, including.
S30, the terminal device 1 judges whether to receive the finger of the transmission of terminal device 1 as security incident originating end
Line typing information.
When receiving the fingerprint typing information, S31 is performed, typing user fingerprints are pointed out, and by the user fingerprints
Be stored in secure storage section, and in S32, fingerprint typing is completed information be sent to it is described as security incident originating end
Terminal device 1.
In present pre-ferred embodiments, the secure storage section can be local safe storage or peace
Full remote server.
When being not received by the fingerprint typing information, S33 is performed, the terminal device 1 further determines whether to connect
Receive the fingerprint authentication solicited message of the transmission of terminal device 1 as security incident originating end.
When receiving the fingerprint authentication solicited message, S34 is performed, the prompting of terminal device 1 inputs user fingerprints,
And matched the fingerprint of input with being stored in finger print information in secure storage section, and in S35, the terminal device 1 is sentenced
Whether the match is successful for severed finger line.
When fingerprint matching success, then S36 is performed, the terminal device 1 is to described as security incident originating end
Terminal device 1 sends the successful information of fingerprint authentication.
When the fingerprint is without the match is successful, then S37 is performed, the terminal device 1 is initiated to described as security incident
The terminal device 1 at end sends the information of fingerprint authentication failure.
Above-mentioned Fig. 2~4 describe the safe verification method based on fingerprint of the present invention in detail, with reference to the 5th~6 figure,
Respectively to realizing that the security authentication systems 10 based on fingerprint and terminal device 1 of the above-mentioned safe verification method based on fingerprint are entered
Row is introduced.
It should be appreciated that the embodiment is only purposes of discussion, do not limited in patent claim by this structure.
Embodiment five,
As shown in figure 5, being the structural representation of the security authentication systems preferred embodiment of the invention based on fingerprint.
Security authentication systems 10 of the present invention based on fingerprint can be made up of including multiple computer program code
Program segment, may be mounted in the multiple terminal device 1, and as performed by the multiple terminal device 1, to realize safety
The safety verification based on fingerprint of event.
As shown in fig.5, the function of the security authentication systems 10 according to performed by it based on fingerprint, can be divided
For multiple functional modules.In present pre-ferred embodiments, the functional module in the security authentication systems 10 based on fingerprint is extremely
It can include less:Security incident encrypting module 100, security incident performing module 101 and fingerprint typing and authentication module 102.
Wherein, the security incident encrypting module 100 and the security incident performing module 101 are run on as safety
In the terminal device 1 of event originating end, and the fingerprint typing and authentication module 102 run on it is described as mutual authentication end
Terminal device 1 in.
The security incident encrypting module 100 is used for the safe class for setting security incident, selects the security incident
One or more mutual authentication people, and fingerprint typing information is sent to one or more of mutual authentication people, Zhi Daojie
The fingerprint typing for receiving all mutual authentication people completes information.
The security incident can be that any need takes secrecy provision, for example, the safety verification based on fingerprint can just be held
Capable event.The security incident can include, but not limited to for example, opening classified document, opening safety case, opening bank
Account etc..
The safe class of the security incident can be that such as safe class of opening safety case is 1, opens bank account
It is 0.8 etc. with opening the safe class of classified document.In present pre-ferred embodiments, the security incident encrypting module 100
One or more of which is selected to be used as the safety in multiple terminal devices 1 that can be from same LAN is connected to
The mutual authentication people of event.
In other preferred embodiments of the invention, selected one or more mutual authentication people and the terminal device 1
It can also be not limited in same LAN.
In present pre-ferred embodiments, when the fingerprint for having any one mutual authentication people does not have typing completion, the peace
Total event encrypting module 100 can continue to send fingerprint typing information to mutual authentication people, until selected all common
The fingerprint typing of identifier is completed.
In other preferred embodiments of the invention, when the fingerprint for having any one mutual authentication people does not have typing completion, institute
One or more mutual authentication people can also be deleted by stating security incident encrypting module 100, or change other mutual authentications
People.
The security incident performing module 101 is used for when needing to perform the security incident, sends fingerprint authentication request
Information gives all mutual authentication people of the security incident, according to the safe class set in advance of the security incident, when extremely
During the fingerprint authentication success of the mutual authentication people of few preset ratio corresponding with the safe class, the security incident is performed.
For example, the safe class of the security incident is 1, then its corresponding preset ratio is 1, that is, needs 100% to be total to
With the fingerprint authentication success of identifier;When the safe class of the security incident is 0.8, then its corresponding preset ratio is 0.8,
Only need to the fingerprint authentication success of 80% mutual authentication people.
For example, the preset ratio is X=n/N, wherein N is the quantity of all mutual authentication people of the security incident,
And the n is the need for presetting while the mutual authentication people being verified.For example, the quantity of all mutual authentication people
Quantity is 5, the mutual authentication artificial 4 being verified simultaneously the need for advance equipment, then the preset ratio X=4/5=80%.
When being not reaching to the success of the fingerprint authentication of mutual authentication people of preset ratio, the security incident performs failure.
The fingerprint typing and authentication module 102 are used to send out receiving the terminal device 1 as security incident originating end
During the fingerprint typing information sent, typing user fingerprints are pointed out, and the user fingerprints are stored in secure storage section, and will
Fingerprint typing completes information and is sent to the terminal device as security incident originating end, and is receiving as safe thing
During the fingerprint authentication solicited message that the terminal device of part originating end is sent, point out input user fingerprints, and by the fingerprint of input with
It is stored in finger print information in secure storage section to be matched, when fingerprint matching success, security incident is used as to described
The terminal device 1 of originating end sends the successful information of fingerprint authentication.
In present pre-ferred embodiments, the secure storage section can be local safe storage or peace
Full remote server.
Further, when the match is successful for the fingerprint, the fingerprint typing can also be to institute with authentication module 102
State the information that fingerprint authentication failure is sent as the terminal device 1 of security incident originating end.
Embodiment six,
As shown in fig. 6, being the terminal device preferred embodiment for realizing the safe verification method of the present invention based on fingerprint
Structural representation.
Any one in the multiple terminal device 1 may be, but not limited to, for example, the computer of user, such as desk-top
Machine, notebook computer, tablet personal computer etc., and smart mobile phone, intelligent wearable equipment etc..
In other preferred embodiments of the invention, any one in the multiple terminal device 1 can also be an insertion
Formula equipment, can be embedded into existing any information household appliances and industrial control system, for example, being embedded into anti-theft door system.
As shown in figure 5, the terminal device 1 in the embodiment of the present invention includes at least one memory 11, at least one processing
Device 12, at least one communicator 13, at least one input/output unit 14 and communication bus 15.
In other of the invention preferred embodiments, according to difference the need for, the terminal device 1 can also include other portions
Part, is not limited solely to the part of above-mentioned exposure.
The communication bus 15 can realize the memory 11, processor 12, communicator 13 and input and output dress
Put the communication between 14.
The communicator 13 is for carrying out wired or radio communication equipment between the multiple terminal device 1.
The input/output unit 14 is the interface that user carries out data interaction with terminal device 1, can include data defeated
Enter equipment, such as keyboard and mouse, camera, fingerprint logging apparatus, display screen.
The memory 11 has program stored therein code.The memory 11 can be smart media card (smart media
Card), the storage facilities such as safe digital card (secure digital card), flash memory cards (flash card).
The processor 12 can perform the operating system of the terminal device 1 and the types of applications program of installation etc..Institute
One or more central processing unit, microprocessor, digital processing unit etc. can be included by stating processor 12.
In present pre-ferred embodiments, the processor 12 can call the memory 11 by the communication bus 15
The program code of middle storage with perform correlation function.For example, the modules described in Fig. 5 are (for example, the security incident adds
Close module 100, fingerprint typing and authentication module 101 and security incident performing module 102 etc.) it is stored in the memory 11
In program code, and as performed by the processor 12, to realize a kind of safe verification method based on fingerprint.
Specifically, the safe verification method based on fingerprint includes:
When needing to perform security incident, all mutual authentications of the fingerprint authentication solicited message to the security incident are sent
People;And
According to the safe class set in advance of the security incident, when default ratio at least corresponding with the safe class
During the fingerprint authentication success of the mutual authentication people of example, the security incident is performed.
In the preferred embodiment of the present invention, the preset ratio is X=n/N, and wherein N is all common of the security incident
The quantity of identifier, and the n is the need for presetting while the mutual authentication people being verified.
In the preferred embodiment of the present invention, before the security incident is performed, the safe verification method based on fingerprint
Also include:
The safe class of the security incident is set;
Select one or more mutual authentication people of the security incident;
Fingerprint typing information is sent to one or more of mutual authentication people, until receiving all mutual authentication people
Fingerprint typing complete information.
In the preferred embodiment of the present invention, the safe verification method based on fingerprint also includes:
One or more mutual authentication people is deleted, or changes other mutual authentication people.
In another preferred embodiment of the present invention, the safe verification method based on fingerprint includes:
When receiving the fingerprint typing information as the terminal device transmission of security incident originating end, typing user is pointed out
Fingerprint, and the user fingerprints are stored in secure storage section;
Fingerprint typing completion information is sent to the terminal device as security incident originating end;
When receiving the fingerprint authentication solicited message as the terminal device transmission of security incident originating end, input is pointed out
User fingerprints, and the fingerprint of input is matched with being stored in finger print information in secure storage section;And
When fingerprint matching success, to the terminal device as security incident originating end send fingerprint authentication into
The information of work(.
Embodiment six,
The embodiment of the present invention also provides a kind of computer-readable recording medium for storing one or more programs, one
Or multiple programs include instruction, the instruction makes the end when the terminal device 1 for being included one or more processors is performed
End equipment 1 performs the safe verification method based on fingerprint as described in embodiment of the method above.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and is not described in some embodiment
Part, may refer to the associated description of other embodiments.
It should be noted that for foregoing each method embodiment, in order to be briefly described, therefore it is all expressed as a series of
Combination of actions, but those skilled in the art should know, the present invention is not limited by described sequence of movement because according to
According to the present invention, some steps can use other orders or carry out simultaneously.Secondly, those skilled in the art should also know,
Embodiment described in this description belongs to preferred embodiment, and not necessarily the present invention must for involved action and module
Must.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can
To instruct the hardware of correlation to complete by program, the program can be stored in a computer-readable recording medium, storage
Medium can include:ROM, RAM, disk or CD etc..
, can be by it in several embodiments provided by the present invention, it should be understood that disclosed apparatus and method
Its mode is realized.For example, device embodiment described above is only schematical, for example, the division of the module, only
Only a kind of division of logic function, can there is other dividing mode when actually realizing.
The module illustrated as separating component can be or may not be it is physically separate, it is aobvious as module
The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
On NE.Some or all of module therein can be selected to realize the mesh of this embodiment scheme according to the actual needs
's.
In addition, each functional module in each embodiment of the invention can be integrated in a processing unit, can also
That unit is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated list
Member can both be realized in the form of hardware, it would however also be possible to employ hardware adds the form of software function module to realize.
It is obvious to a person skilled in the art that the invention is not restricted to the details of above-mentioned one exemplary embodiment, Er Qie
In the case of without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter
From the point of view of which point, embodiment all should be regarded as exemplary, and be nonrestrictive, the scope of the present invention is by appended power
Profit is required rather than described above is limited, it is intended that all in the implication and scope of the equivalency of claim by falling
Change is included in the present invention.The right that any attached associated diagram mark in claim should not be considered as involved by limitation will
Ask.Furthermore, it is to be understood that the word of " comprising " one is not excluded for other units or step, odd number is not excluded for plural number.Stated in device claim
Multiple modules or device can also by a module or device by software or hardware come 17 realizations.The first, the second grade word
Pragmatic represents that name 17 claims, and is not offered as any specific along 17 sequences.
Most it will be understood by those within the art that, technical scheme can be modified or equally replaced
Change, without departing from the spirit and scope of technical solution of the present invention.
Claims (10)
1. a kind of safe verification method based on fingerprint, applied in the terminal device as security incident originating end, its feature
It is, the safe verification method based on fingerprint includes:
When needing to perform security incident, all mutual authentication people of the fingerprint authentication solicited message to the security incident are sent;
And
According to the safe class set in advance of the security incident, when preset ratio at least corresponding with the safe class
During the fingerprint authentication success of mutual authentication people, the security incident is performed.
2. the safe verification method as claimed in claim 1 based on fingerprint, it is characterised in that the preset ratio is X=n/
N, wherein N are the quantity of all mutual authentication people of the security incident, and the n is to be verified the need for presetting
Mutual authentication people.
3. the safe verification method based on fingerprint as claimed in claim 1, it is characterised in that perform the security incident it
Before, methods described also includes:
The safe class of the security incident is set;
Select one or more mutual authentication people of the security incident;
Fingerprint typing information is sent to one or more of mutual authentication people, the finger until receiving all mutual authentication people
Line typing completes information.
4. the safe verification method as claimed in claim 3 based on fingerprint, it is characterised in that methods described also includes:
One or more mutual authentication people is deleted, or changes other mutual authentication people.
5. a kind of safe verification method based on fingerprint, applied to the terminal device as mutual authentication end, it is characterised in that institute
Stating the safe verification method based on fingerprint includes:
When receiving the fingerprint typing information as the terminal device transmission of security incident originating end, typing user is pointed out to refer to
Line, and the user fingerprints are stored in secure storage section;
Fingerprint typing completion information is sent to the terminal device as security incident originating end;
When receiving the fingerprint authentication solicited message as the terminal device transmission of security incident originating end, input user is pointed out
Fingerprint, and the fingerprint of input is matched with being stored in finger print information in secure storage section;And
When fingerprint matching success, fingerprint authentication is sent to the terminal device as security incident originating end successful
Information.
6. a kind of security authentication systems based on fingerprint, applied in the terminal device as security incident originating end, its feature
It is, the security authentication systems based on fingerprint include:
Security incident performing module, for when needing to perform the security incident, sending fingerprint authentication solicited message to described
All mutual authentication people of security incident, and according to the safe class set in advance of the security incident, when at least with it is described
During the fingerprint authentication success of the mutual authentication people of the corresponding preset ratio of safe class, the security incident is performed.
7. the security authentication systems as claimed in claim 6 based on fingerprint, it is characterised in that the preset ratio is X=n/
N, wherein N are the quantity of all mutual authentication people of the security incident, and the n is checking simultaneously the need for presetting
The mutual authentication people passed through.
8. the security authentication systems as claimed in claim 6 based on fingerprint, it is characterised in that the system also includes:
Security incident encrypting module, the safe class for setting the security incident, select one of the security incident or
The multiple mutual authentication people of person, and fingerprint typing information is sent to one or more of mutual authentication people, until receiving
The fingerprint typing for having mutual authentication people completes information.
9. the security authentication systems as claimed in claim 8 based on fingerprint, it is characterised in that the security incident encrypting module
It is additionally operable to:
One or more mutual authentication people is deleted, or changes other mutual authentication people.
10. a kind of security authentication systems based on fingerprint, applied to the terminal device as mutual authentication end, it is characterised in that
The security authentication systems based on fingerprint include:
Fingerprint typing and authentication module, in the fingerprint typing for receiving the terminal device transmission as security incident originating end
During information, typing user fingerprints are pointed out, and the user fingerprints are stored in secure storage section, fingerprint typing is completed to believe
Breath is sent to the terminal device as security incident originating end;Receiving the terminal device as security incident originating end
During the fingerprint authentication solicited message of transmission, input user fingerprints are pointed out, and by the fingerprint of input and be stored in secure storage section
Middle finger print information is matched, and when fingerprint matching success, to the terminal device as security incident originating end
Send the successful information of fingerprint authentication.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611264817.5A CN107070864A (en) | 2016-12-30 | 2016-12-30 | Safe verification method and system based on fingerprint |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611264817.5A CN107070864A (en) | 2016-12-30 | 2016-12-30 | Safe verification method and system based on fingerprint |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107070864A true CN107070864A (en) | 2017-08-18 |
Family
ID=59624383
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611264817.5A Pending CN107070864A (en) | 2016-12-30 | 2016-12-30 | Safe verification method and system based on fingerprint |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107070864A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107733868A (en) * | 2017-09-13 | 2018-02-23 | 深圳市三阶微控实业有限公司 | Mobile terminal and fingerprint simultaneously close checking implementation method and storage medium |
CN110516427A (en) * | 2019-08-29 | 2019-11-29 | 深圳市沃特沃德股份有限公司 | Auth method, device, storage medium and the computer equipment of terminal user |
CN111986405A (en) * | 2020-09-01 | 2020-11-24 | 中国银行股份有限公司 | Method and device for verifying withdrawal of common property based on ATM |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101364984A (en) * | 2008-08-13 | 2009-02-11 | 西安鼎蓝通信技术有限公司 | Method for guarantee safety of electronic file |
CN101464945A (en) * | 2008-11-14 | 2009-06-24 | 清华大学深圳研究生院 | Identification characteristic identification method based on finger back arthrosis veins |
CN201465114U (en) * | 2009-04-22 | 2010-05-12 | 上海幻维数码创意科技有限公司 | Multi-person synchronous fingerprint verification system |
CN103873446A (en) * | 2012-12-17 | 2014-06-18 | 中航物联技术(北京)有限公司 | Method for logging in system |
CN104036176A (en) * | 2014-07-03 | 2014-09-10 | 南昌欧菲生物识别技术有限公司 | Fingerprint feature point registration method based on security levels, authentication method based on security levels and terminal equipment |
CN105260643A (en) * | 2015-10-30 | 2016-01-20 | 南昌欧菲生物识别技术有限公司 | Multi-fingerprint cross-unlocking method and system |
CN105279413A (en) * | 2015-09-30 | 2016-01-27 | 宇龙计算机通信科技(深圳)有限公司 | System switching method, system switching device and electronic equipment |
CN105389502A (en) * | 2015-10-23 | 2016-03-09 | 京东方科技集团股份有限公司 | Permission control system and method, mouse, and computer system |
-
2016
- 2016-12-30 CN CN201611264817.5A patent/CN107070864A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101364984A (en) * | 2008-08-13 | 2009-02-11 | 西安鼎蓝通信技术有限公司 | Method for guarantee safety of electronic file |
CN101464945A (en) * | 2008-11-14 | 2009-06-24 | 清华大学深圳研究生院 | Identification characteristic identification method based on finger back arthrosis veins |
CN201465114U (en) * | 2009-04-22 | 2010-05-12 | 上海幻维数码创意科技有限公司 | Multi-person synchronous fingerprint verification system |
CN103873446A (en) * | 2012-12-17 | 2014-06-18 | 中航物联技术(北京)有限公司 | Method for logging in system |
CN104036176A (en) * | 2014-07-03 | 2014-09-10 | 南昌欧菲生物识别技术有限公司 | Fingerprint feature point registration method based on security levels, authentication method based on security levels and terminal equipment |
CN105279413A (en) * | 2015-09-30 | 2016-01-27 | 宇龙计算机通信科技(深圳)有限公司 | System switching method, system switching device and electronic equipment |
CN105389502A (en) * | 2015-10-23 | 2016-03-09 | 京东方科技集团股份有限公司 | Permission control system and method, mouse, and computer system |
CN105260643A (en) * | 2015-10-30 | 2016-01-20 | 南昌欧菲生物识别技术有限公司 | Multi-fingerprint cross-unlocking method and system |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107733868A (en) * | 2017-09-13 | 2018-02-23 | 深圳市三阶微控实业有限公司 | Mobile terminal and fingerprint simultaneously close checking implementation method and storage medium |
CN110516427A (en) * | 2019-08-29 | 2019-11-29 | 深圳市沃特沃德股份有限公司 | Auth method, device, storage medium and the computer equipment of terminal user |
CN110516427B (en) * | 2019-08-29 | 2022-03-11 | 深圳市沃特沃德软件技术有限公司 | Terminal user identity authentication method and device, storage medium and computer equipment |
CN111986405A (en) * | 2020-09-01 | 2020-11-24 | 中国银行股份有限公司 | Method and device for verifying withdrawal of common property based on ATM |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103793636B (en) | A kind of method of equipment and protection equipment privacy | |
CN105117663B (en) | The encrypted object display methods and device of a kind of application | |
CN101252439B (en) | System and method for increasing information safety equipment security | |
CN103336924B (en) | Startup for application program for mobile terminal is locked | |
CN103380592B (en) | Method, server and system for personal authentication | |
CN104751032A (en) | Authentication method and authentication device | |
CN104751038A (en) | Identity authentication method, device and system | |
CN105160227A (en) | Remote fingerprint verification method, user terminal and fingerprint verification system | |
CN106648583B (en) | Information processing method and terminal | |
CN107070864A (en) | Safe verification method and system based on fingerprint | |
CN106446667B (en) | Password data processing method, device and equipment | |
CN108173648A (en) | Security processing method, equipment and storage medium based on private key escrow | |
CN105868601A (en) | Pressure touch screen-based electronic terminal, encryption unlocking controller and method | |
CN107294981B (en) | Authentication method and equipment | |
CN114244568A (en) | Security access control method, device and equipment based on terminal access behavior | |
CN108540591A (en) | Book management method, address book management device and electronic equipment | |
CN112636914B (en) | Identity verification method, identity verification device and smart card | |
CN105760733B (en) | Data ciphering method and module, data access method and module | |
CN106161481A (en) | A kind of mobile terminal physical button isolation safe module takes precautions against the device of security risk | |
CN106375304A (en) | One-time authentication method realized by utilization of intelligent hardware | |
CN109324843A (en) | A kind of finger prints processing system, method and fingerprint equipment | |
CN105069332A (en) | Fingerprint-based password authentication method and password authentication apparatus | |
CN108932441A (en) | The operation method and computing device of safety keyboard system, safety keyboard | |
CN108234491A (en) | Agreement correlating validation method, apparatus and electronic equipment | |
CN114255042A (en) | Secret payment-free signing method and device, computer equipment and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170818 |