CN107229857A - The generation method and device of a kind of identifying code - Google Patents
The generation method and device of a kind of identifying code Download PDFInfo
- Publication number
- CN107229857A CN107229857A CN201610179364.XA CN201610179364A CN107229857A CN 107229857 A CN107229857 A CN 107229857A CN 201610179364 A CN201610179364 A CN 201610179364A CN 107229857 A CN107229857 A CN 107229857A
- Authority
- CN
- China
- Prior art keywords
- fingerprint image
- checking
- fingerprint
- user
- verification code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/1347—Preprocessing; Feature extraction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- Biodiversity & Conservation Biology (AREA)
- Life Sciences & Earth Sciences (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention discloses a kind of generation method of identifying code and device.This method includes:Gather the fingerprint image of user;Extract the characteristic point in the fingerprint image;According to the characteristic point in the fingerprint image, the random verification code for checking is generated.The characteristics of present invention has uniqueness using fingerprint, gathers the fingerprint image of user, and the characteristic point in the image that takes the fingerprint, and is many parts by Fingerprint Image Segmentation, and based on every part of feature point number included, generates random verification code.Random verification code is applied in user's checking, it is safe, and multioperation is crossed without user, it is convenient and reliable.
Description
Technical field
The present invention relates to the generation method and device of communication technical field, more particularly to a kind of identifying code.
Background technology
In order to lift internet security, the use of identifying code is increasingly popularized.At present, identifying code is generally service
Device end is generated, and is sent to user, by user's input validation code, the identifying code of server authentication user input
It is whether identical with the identifying code of generation, if identical, it is verified, otherwise verifies and do not pass through.
It is client payment process than more typical application scenarios, server sends the first random verification code to shifting
Dynamic client, the identifying code that mobile client is received is defined as the second random verification code, and server judges the
Two random verification codes it is ageing, and judge the first identifying code and user input the second identifying code uniformity
To complete to pay.
But, the defect of prior art is that the use process of random verification code is more inconvenient, especially in net
In the case that network is not good, user may need multiple input validation code, and Consumer's Experience is not good.
The content of the invention
It is a primary object of the present invention to provide the generation method and device of a kind of identifying code, with solve it is existing with
The problem of use of machine identifying code is more inconvenient.
For above-mentioned technical problem, the present invention is solved by the following technical programs.
The invention provides a kind of generation method of identifying code, including:Gather the fingerprint image of user;Extract
Characteristic point in the fingerprint image;According to the characteristic point in the fingerprint image, generate for checking with
Machine identifying code.
Wherein, after the characteristic point in extracting the fingerprint image, and tested at random for what is verified in generation
Before card code, in addition to:According to the fingerprint image prestored, the fingerprint image progress to collection
With checking;In the case where matching is verified, the random verification code for checking is generated.
Wherein, the fingerprint image of user is gathered, including:Using default fingerprint module, the finger of user is gathered
Print image.
Wherein, the characteristic point in the fingerprint image, generates the random verification code for checking, including:
Fingerprint module is divided into multiple regions in advance;Determine the characteristic point that the fingerprint image is in each region
Number;The feature point number included based on each region, generates the random verification code for checking.
Wherein, the characteristic point includes:Distal point and bifurcation.
Present invention also offers a kind of generating means of identifying code, including:Acquisition module, for gathering user
Fingerprint image;Extraction module, for extracting the characteristic point in the fingerprint image;Generation module, is used for
According to the characteristic point in the fingerprint image, the random verification code for checking is generated.
Wherein, described device also includes authentication module;The authentication module, for extracting the fingerprint image
After characteristic point as in, and before random verification code of the generation for checking, according to the finger prestored
Print image, matching checking is carried out to the fingerprint image of collection;It is raw in the case where matching is verified
Into the random verification code for checking.
Wherein, the acquisition module, specifically for utilizing default fingerprint module, gathers the fingerprint image of user
Picture.
Wherein, the generation module, specifically for:Fingerprint module is divided into multiple regions in advance;It is determined that
The fingerprint image is in the feature point number in each region;The characteristic point included based on each region
Number, generates the random verification code for checking.
Wherein, the characteristic point includes:Distal point and bifurcation.
The present invention has the beneficial effect that:
The characteristics of present invention has uniqueness using fingerprint, gathers the fingerprint image of user, and the figure that takes the fingerprint
Characteristic point as in, is many parts by Fingerprint Image Segmentation, and based on every part of feature point number included, generation
Random verification code.Random verification code is applied in user's checking, it is safe, and excessively grasped without user
Make, it is convenient and reliable.
Brief description of the drawings
Accompanying drawing described herein is used for providing a further understanding of the present invention, constitutes the part of the application,
The schematic description and description of the present invention is used to explain the present invention, does not constitute the improper limit to the present invention
It is fixed.In the accompanying drawings:
Fig. 1 is the flow chart of the generation method of identifying code according to an embodiment of the invention;
Fig. 2 is the schematic diagram of fingerprint module according to an embodiment of the invention;
Fig. 3 is the step flow chart used of identifying code according to an embodiment of the invention;
Fig. 4 is the step flow chart of extraction characteristic point according to an embodiment of the invention;
Fig. 5 is the structure chart of the generating means of identifying code according to an embodiment of the invention.
Embodiment
The characteristics of present invention has uniqueness using fingerprint, gathers the fingerprint image of user, and the figure that takes the fingerprint
Characteristic point as in, is many parts by Fingerprint Image Segmentation, and based on every part of feature point number included, generation
Random verification code.Because the fingerprint of user has uniqueness, the random verification code also has uniqueness.
Random verification code is applied in user's checking, it is safe, and multioperation is crossed without user, it is convenient and reliable.
Further, the random verification code can be used for paying.
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing and specific implementation
Example, is described in further detail to the present invention.
There is provided a kind of generation method of identifying code for embodiments in accordance with the present invention.Fig. 1 is according to the present invention
The flow chart of the generation method of the identifying code of one embodiment.
Step S110, gathers the fingerprint image of user.
The fingerprint image of user is gathered by fingerprint collecting technology.Fingerprint collecting technology includes:Optical total-reflection
Technology, silicon crystal sensor technology, ultrasound scanning etc..It is currently preferred, passed by fingerprint
Sensor (fingerprint module) gathers the fingerprint image of user.
According to the difference of position of the user's finger on fingerprint sensor, it is poor that the fingerprint image of collection can also be present
It is different, so, it can make the identifying code ultimately generated that there is randomness.For example:Finger is placed on sensor
Position to the left or position to the right, the fingerprint image collected is different.So not only fingerprint has
The characteristics of uniqueness, can provide the security of checking, and the placement location of finger also improves the security of checking.
Characteristic point in step S120, the image that takes the fingerprint.
The characteristic point of fingerprint image includes:Destination node (distal point), bifurcation on fingerprint lines.Specifically
Feature point extracting step the embodiment below is described in detail.
In one embodiment, in order to ensure client secure, after the characteristic point in the image that takes the fingerprint,
And before random verification code of the generation for checking, can also be according to the fingerprint image prestored, to adopting
The fingerprint image of collection carries out matching checking;In the case where matching is verified, generate for checking
Random verification code;In matching checking not in the case of, user is pointed out to input fingerprint again, if matching is tested
Demonstrate,prove the number of times that does not pass through and exceed predetermined matching checking number of times, then alarmed, such as beep or to
Another client of client binding sends the short message of protection predetermined content.
Specifically, by the characteristic point extracted from the fingerprint image of collection and the spy of fingerprint image prestored
Levy and be a little compared, find both reference points, two width fingerprint images are aligned;Then two are tried to achieve
The similarity of the characteristic point of fingerprint image;If the similarity tried to achieve is higher than this threshold value, matching is verified,
Otherwise do not pass through.
Step S130, the characteristic point in fingerprint image generates the random verification code for checking.
According in fingerprint graph characteristic point quantity generate random verification code, the random verification code be bar code,
Quick Response Code or random code.
Specifically, fingerprint module is divided into multiple regions in advance;Finger is pressed against on fingerprint module by user
Fingerprint image is gathered, the feature point number that the fingerprint image is in each region is determined;Based on each area
The feature point number that domain includes, generates the random verification code for checking.It is possible to further in collection
The characteristic point in each region is extracted during fingerprint image, and calculates the number of characteristic point in each region.
For example:The shape of common fingerprint module has circular and square, and the size of fingerprint module is divided into 8 parts,
As shown in Fig. 2 the position according to fingerprint in fingerprint module, counts the number of characteristic point in each region
(0-99), is indicated with two decimal numbers, and such as region 1, which includes 1 characteristic point, region 2, includes
3 characteristic points, regions 3 include 7 including 4 characteristic points, region 4 including 6 characteristic points, region 5
Individual characteristic point, region 6 include 1 characteristic point, region 7 includes 5 including 12 characteristic points, region 8
Individual characteristic point;It is according to area code order that characteristic point quantity is arranged together, obtain sixteen bit with
Machine code 0103040607011205, can be converted into bar code by the random code, and random code and bar code is same
When display in the client.
The random verification code can be used for checking, such as authentication, security verification.
For example:In the position of the prior analog subscriber input fingerprint of server end, and generate the checking for comparing
Code, after client generates random verification code, is sent to server, is matched in server end, such as
The match is successful for fruit, then be verified, otherwise checking does not pass through.
And for example:The random verification code of generation is sent to server by this client;Other clients are from this client
End obtains the random verification code and is sent to server;Server is if it find that the random of this client transmission is tested
Demonstrate,prove code identical with the random verification code that other clients are sent, then judge that other clients possess and this client
The main body interacted, it is allowed to which other clients and this client are interacted by server;Conversely, prohibiting
Only other clients are interacted by server.
In the use of random verification code, it may comprise steps of.
Fig. 3 is the step flow chart used of identifying code according to an embodiment of the invention.
Step S310, the first client generates random verification code according to the fingerprint image of the first user.
First user is the user using the first client.First user adds the first use in the first client
Family information, and the third party bound with first user profile is set.The third party of first user profile binding
It can be the first data server.In the first data server, the account of the first user is provided with.
Random verification code, the first user profile are sent to server by step S320, the first client.
Step S330, the second client obtains random verification code at the first client, and by the random of acquisition
Identifying code, second user information are sent to server.
Second user is the user using the second client.Second user adds the second use in the second client
Family information, and the third party bound with the second user information is set.The third party of second user information binding
It can be the second data server.In the second data server, the account of second user is provided with.
Step S340, server are if it find that the random verification code and the second client hair that the first client is sent
The random verification code sent is identical, then allows third party and the binding of second user information that the first user profile is bound
Third party carry out data interaction.
The third party of first user profile binding and the third party of second user information binding carry out data interaction,
It that is to say and data interaction is carried out between the account of the first user and the account of second user.
For example:Subscription client generates random verification code according to fingerprint image, and it is included in subscription client
In, and it is sent to server;Merchant client is obtained by scanning random verification code in subscription client
The random verification code is obtained, the random verification code is sent to server;Server finds that subscription client is sent
Random verification code it is identical with the accidental validation that merchant client is sent, then allow subscription client and businessman visitor
Payment transaction between the end of family, on the contrary do not allow.
By the present embodiment, the fingerprint that the first client is inputted according to user can carry out the first client-side
User's checking, can generate random verification code, it is to avoid given birth to by server side using traditional according to fingerprint image
Into identifying code, the security that uses of increase identifying code, in the process, user is simple to operate.
In order that feature of present invention point extract process become apparent from, below to feature point extraction the step of carry out
Further illustrate.Fig. 4 is the step flow chart of extraction characteristic point according to an embodiment of the invention.
Step S410, fingerprint image is normalized.
It is the contrast for increasing strong crestal line and valley line in image fingerprint image to be normalized the purpose of operation, is made
Fingerprint image is in same intensity level, is easy to the threshold value of follow-up dividing processing to choose.
Fingerprint image I is divided into N × N blocks, N > 1;I (i, j) represents what the row of fingerprint image i-th, jth were arranged
Gray value.Assuming that image resolution ratio is 500dpi, then the average gray value M (I) and gray value of fingerprint image
Variance VAR (I) be respectively:
M (I) and VAR (I) are normalized, normalized formula is:
Wherein, G (i, j) is the gray value after normalization, M0It is the expectation of average gray, VAR0It is variance
The expectation of value.The gray value of fingerprint image after normalization is all in M0Near.
Take the fingerprint display foreground in step S420, fingerprint image after normalization.
The segmentation of foreground and background is carried out to the fingerprint image after normalization, subsequent operation is only to fingerprint image
Foreground zone is handled, so as to improve treatment effeciency.
Step S430, enhancing processing is filtered to fingerprint image prospect.
When being filtered increase processing, noise can also be further removed to fingerprint image prospect, ridge is connected
The place of thread breakage.Gabor filter or direction template wave filter can be specifically used to perform.
Step S440, binary conversion treatment is carried out to the fingerprint image prospect after filtering enhancing processing.
Binarization operation is carried out after the filtering of fingerprint image prospect again, namely crestal line extracts operation.
The lines of crestal line in fingerprint image prospect and valley line after binaryzation will become very clear.
The present embodiment is preferred, using direction split plot design carries out binary conversion treatment to fingerprint graph prospect.Direction
Split plot design is the method that utilization orientation information carries out binaryzation, and this method also has certain enhancing effect.
The framework information of extracting ridges in fingerprint graph prospect after binary conversion treatment, is removed and feature extraction
Unrelated redundancy, reduces the amount of storage of information.
Step S450, the local feature for the display foreground that takes the fingerprint.
Fingerprint characteristic includes global characteristics and local feature, and global characteristics are applied to the classification of fingerprint, local special
The matching in fingerprint is taken over for use, so only needing to extract local feature in the present invention.
Local feature is the minutia in fingerprint, can be tried to achieve by the fingerprint image after refinement, because carefully
The gray value of all pixels point in fingerprint image after change is only 0 or 1,0 expression background dot gray scale
(white), 1 represents streakline point gray scale (black).
The minutia that the present embodiment is extracted includes:Distal point and bifurcation.
Step S460, extracts characteristic point in local feature.
After fingerprint image after being refined, in the template of one 3 × 3, it is with measuring point P (i, j) to be checked
Central point, it is as shown in table 1 below, according to the relation between adjacent spots gray value, it can be determined that measuring point to be checked
Whether P (i, j) is characterized a little.
P4(i+1,j-1) | P3(i+1,j) | P2(i+1,j+1) |
P5(i,j-1) | P(i,j) | P1(i,j+1) |
P6(i-1,j-1) | P7(i-1,j) | P8(i-1,j+1) |
If adjacent spots gray value CNWhen meeting following formula, then P (i, j) is distal point.
If adjacent spots gray value CNWhen meeting following formula, then P (i, j) is bifurcation.
In formula, P (k) is Pk(i, j) corresponding gray value, 8 >=k >=1.
To the fingerprint image after refinement, along the traversal of crestal line progress from top to bottom, from left to right, with above-mentioned
Two formulas are basis for estimation, preserve type and the position of characteristic point, and are obtained on the direction and crestal line of local ridge
Sampling point information.
Pseudo-random numbers generation can be included in the extraction process of characteristic point, can be removed it.Further, according to spy
Position relationship between levying a little filters out pseudo-random numbers generation.The marginal portion of fingerprint image prospect is shown as multiple end points,
These end points are removed.
The invention provides a kind of generating means of identifying code.Fig. 5 is checking according to an embodiment of the invention
The structure chart of the generating means of code.
Described device includes:
Acquisition module 510, the fingerprint image for gathering user.
Extraction module 520, for extracting the characteristic point in the fingerprint image.The characteristic point includes:End
Tip point and bifurcation.
Generation module 530, for the characteristic point in the fingerprint image, is generated for the random of checking
Identifying code.
Described device also includes authentication module (not shown);The authentication module, for extracting described refer to
After characteristic point in print image, and before generation is for the random verification code verified, according to prestoring
Fingerprint image, matching checking is carried out to the fingerprint image of collection;In the case where matching is verified,
Generate the random verification code for checking.
In one embodiment, the acquisition module 510, specifically for utilizing default fingerprint module, is adopted
Collect the fingerprint image of user.The generation module 530, specifically for:Fingerprint module is divided into advance many
Individual region;Determine the feature point number that the fingerprint image is in each region;Based on each region Zhong Bao
The feature point number included, generates the random verification code for checking.
The function of device described in the present embodiment is retouched in the embodiment of the method shown in Fig. 1-Fig. 4
State, therefore not detailed part in the description of the present embodiment, the related description in previous embodiment is may refer to,
This is not repeated.
Embodiments of the invention are the foregoing is only, are not intended to limit the invention, for this area
For technical staff, the present invention can have various modifications and variations.Within the spirit and principles of the invention,
Any modification, equivalent substitution and improvements made etc., should be included within scope of the presently claimed invention.
Claims (10)
1. a kind of generation method of identifying code, it is characterised in that including:
Gather the fingerprint image of user;
Extract the characteristic point in the fingerprint image;
According to the characteristic point in the fingerprint image, the random verification code for checking is generated.
2. according to the method described in claim 1, it is characterised in that in the fingerprint image is extracted
After characteristic point, and before random verification code of the generation for checking, in addition to:
According to the fingerprint image prestored, matching checking is carried out to the fingerprint image of collection;
In the case where matching is verified, the random verification code for checking is generated.
3. according to the method described in claim 1, it is characterised in that the fingerprint image of collection user, bag
Include:
Using default fingerprint module, the fingerprint image of user is gathered.
4. method according to claim 3, it is characterised in that according to the spy in the fingerprint image
Levy a little, generate the random verification code for checking, including:
Fingerprint module is divided into multiple regions in advance;
Determine the feature point number that the fingerprint image is in each region;
The feature point number included based on each region, generates the random verification code for checking.
5. the method according to any one of claim 1-4, it is characterised in that the characteristic point bag
Include:Distal point and bifurcation.
6. a kind of generating means of identifying code, it is characterised in that including:
Acquisition module, the fingerprint image for gathering user;
Extraction module, for extracting the characteristic point in the fingerprint image;
Generation module, for the characteristic point in the fingerprint image, generates the accidental validation for checking
Code.
7. device according to claim 6, it is characterised in that described device also includes authentication module;
The authentication module, after the characteristic point in the extraction fingerprint image, and is used in generation
Before the random verification code of checking, according to the fingerprint image prestored, the fingerprint image of collection is entered
Row matching checking;In the case where matching is verified, the random verification code for checking is generated.
8. device according to claim 6, it is characterised in that the acquisition module, specifically for
Using default fingerprint module, the fingerprint image of user is gathered.
9. device according to claim 8, it is characterised in that the generation module, specifically for:
Fingerprint module is divided into multiple regions in advance;
Determine the feature point number that the fingerprint image is in each region;
The feature point number included based on each region, generates the random verification code for checking.
10. the device according to any one of claim 6-9, it is characterised in that the characteristic point bag
Include:Distal point and bifurcation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610179364.XA CN107229857A (en) | 2016-03-25 | 2016-03-25 | The generation method and device of a kind of identifying code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610179364.XA CN107229857A (en) | 2016-03-25 | 2016-03-25 | The generation method and device of a kind of identifying code |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107229857A true CN107229857A (en) | 2017-10-03 |
Family
ID=59932096
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610179364.XA Pending CN107229857A (en) | 2016-03-25 | 2016-03-25 | The generation method and device of a kind of identifying code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107229857A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107786572A (en) * | 2017-11-07 | 2018-03-09 | 苏州工业园区服务外包职业学院 | A kind of verification method of user identity, device and terminal |
CN109344593A (en) * | 2018-10-24 | 2019-02-15 | 三星(中国)半导体有限公司 | Biometric information verification method and authentication server, typing and verifying client |
WO2020134113A1 (en) * | 2018-12-28 | 2020-07-02 | 武汉极意网络科技有限公司 | Memory, reasoning-based verification code implementation method and apparatus, and device |
CN112668412A (en) * | 2020-12-15 | 2021-04-16 | 深兰科技(上海)有限公司 | Two-dimensional code generation method and device, electronic equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101631023A (en) * | 2009-07-31 | 2010-01-20 | 北京飞天诚信科技有限公司 | Method for authenticating identity and system thereof |
CN101895542A (en) * | 2010-07-05 | 2010-11-24 | 北京畅游时空软件技术有限公司 | Verification code acquiring method and device |
CN102594842A (en) * | 2012-03-21 | 2012-07-18 | 江苏新大诚信息技术有限公司 | Device-fingerprint-based network management message authentication and encryption scheme |
CN103037323A (en) * | 2012-07-11 | 2013-04-10 | 江苏省南京市南京公证处 | Random code verification system based on mobile terminal and verification method thereof |
CN103532933A (en) * | 2013-09-28 | 2014-01-22 | 刘琦 | Method of realizing client operation authorization through fingerprint confirmation, and intelligent terminal |
WO2015187504A1 (en) * | 2014-06-04 | 2015-12-10 | Grandios Technologies, Llc | Smartphone fingerprint pass-through system |
-
2016
- 2016-03-25 CN CN201610179364.XA patent/CN107229857A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101631023A (en) * | 2009-07-31 | 2010-01-20 | 北京飞天诚信科技有限公司 | Method for authenticating identity and system thereof |
CN101895542A (en) * | 2010-07-05 | 2010-11-24 | 北京畅游时空软件技术有限公司 | Verification code acquiring method and device |
CN102594842A (en) * | 2012-03-21 | 2012-07-18 | 江苏新大诚信息技术有限公司 | Device-fingerprint-based network management message authentication and encryption scheme |
CN103037323A (en) * | 2012-07-11 | 2013-04-10 | 江苏省南京市南京公证处 | Random code verification system based on mobile terminal and verification method thereof |
CN103532933A (en) * | 2013-09-28 | 2014-01-22 | 刘琦 | Method of realizing client operation authorization through fingerprint confirmation, and intelligent terminal |
WO2015187504A1 (en) * | 2014-06-04 | 2015-12-10 | Grandios Technologies, Llc | Smartphone fingerprint pass-through system |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107786572A (en) * | 2017-11-07 | 2018-03-09 | 苏州工业园区服务外包职业学院 | A kind of verification method of user identity, device and terminal |
CN109344593A (en) * | 2018-10-24 | 2019-02-15 | 三星(中国)半导体有限公司 | Biometric information verification method and authentication server, typing and verifying client |
WO2020134113A1 (en) * | 2018-12-28 | 2020-07-02 | 武汉极意网络科技有限公司 | Memory, reasoning-based verification code implementation method and apparatus, and device |
CN112668412A (en) * | 2020-12-15 | 2021-04-16 | 深兰科技(上海)有限公司 | Two-dimensional code generation method and device, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8810366B2 (en) | Service providing device, service providing method, biometric information authentication server, biometric information authentication method, program, and service providing system | |
CN110166438B (en) | Account information login method and device, computer equipment and computer storage medium | |
JP5971089B2 (en) | Biological information correction apparatus, biological information correction method, and biological information correction computer program | |
CN105069622B (en) | A kind of face recognition payment system and method for facing moving terminal | |
CN106709866B (en) | method and device for removing grid watermark from certificate photo and method and device for verifying human face | |
CN101681512B (en) | Vein pattern management system, vein pattern registration device, vein pattern authentication device, vein pattern registration method, and vein pattern authentication method | |
CN104580143A (en) | Security authentication method based on gesture recognition, terminal, server and system | |
CN107229857A (en) | The generation method and device of a kind of identifying code | |
CN204576535U (en) | A kind of bank slip recognition device | |
US20210312465A1 (en) | Transaction processing method, apparatus, device, medium and system | |
CN103310339A (en) | Identity recognition device and method as well as payment system and method | |
CN104751040A (en) | Fingerprint detection method based on intelligent mobile information equipment | |
CN110516672A (en) | Card card information identifying method, device and terminal | |
Zhou et al. | A benchmark 3D fingerprint database | |
US20100226545A1 (en) | Vein pattern management system, vein pattern registration apparatus, vein pattern authentication apparatus, vein pattern registration method, vein pattern authentication method, program, and vein data configuration | |
CN106203326B (en) | A kind of image processing method, device and mobile terminal | |
CN104579682A (en) | Access method and system for multi-service server | |
CN105868699A (en) | Terminal payment method and device based on fingerprint | |
CN106649829B (en) | Service processing method and device based on palm print data | |
CN101711399B (en) | Vein pattern management system, vein pattern registration device, vein pattern authentication device, vein pattern registration method, vein pattern authentication method, vein data storage device | |
WO2018121552A1 (en) | Palmprint data based service processing method, apparatus and program, and medium | |
CN101681498B (en) | Vein pattern management system, vein pattern registration device, vein pattern authentication device, vein pattern registration method, vein pattern authentication method, program, and vein data struc | |
Vijayalakshmi et al. | Finger and palm print based multibiometric authentication system with GUI interface | |
CN104615992A (en) | Long-distance fingerprint dynamic authentication method | |
CN205427857U (en) | Identity identification system based on many biological characteristics combine equipment fingerprint |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171003 |
|
RJ01 | Rejection of invention patent application after publication |