CN107229857A - The generation method and device of a kind of identifying code - Google Patents

The generation method and device of a kind of identifying code Download PDF

Info

Publication number
CN107229857A
CN107229857A CN201610179364.XA CN201610179364A CN107229857A CN 107229857 A CN107229857 A CN 107229857A CN 201610179364 A CN201610179364 A CN 201610179364A CN 107229857 A CN107229857 A CN 107229857A
Authority
CN
China
Prior art keywords
fingerprint image
checking
fingerprint
user
verification code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610179364.XA
Other languages
Chinese (zh)
Inventor
何华
葛福臻
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201610179364.XA priority Critical patent/CN107229857A/en
Publication of CN107229857A publication Critical patent/CN107229857A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1347Preprocessing; Feature extraction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a kind of generation method of identifying code and device.This method includes:Gather the fingerprint image of user;Extract the characteristic point in the fingerprint image;According to the characteristic point in the fingerprint image, the random verification code for checking is generated.The characteristics of present invention has uniqueness using fingerprint, gathers the fingerprint image of user, and the characteristic point in the image that takes the fingerprint, and is many parts by Fingerprint Image Segmentation, and based on every part of feature point number included, generates random verification code.Random verification code is applied in user's checking, it is safe, and multioperation is crossed without user, it is convenient and reliable.

Description

The generation method and device of a kind of identifying code
Technical field
The present invention relates to the generation method and device of communication technical field, more particularly to a kind of identifying code.
Background technology
In order to lift internet security, the use of identifying code is increasingly popularized.At present, identifying code is generally service Device end is generated, and is sent to user, by user's input validation code, the identifying code of server authentication user input It is whether identical with the identifying code of generation, if identical, it is verified, otherwise verifies and do not pass through.
It is client payment process than more typical application scenarios, server sends the first random verification code to shifting Dynamic client, the identifying code that mobile client is received is defined as the second random verification code, and server judges the Two random verification codes it is ageing, and judge the first identifying code and user input the second identifying code uniformity To complete to pay.
But, the defect of prior art is that the use process of random verification code is more inconvenient, especially in net In the case that network is not good, user may need multiple input validation code, and Consumer's Experience is not good.
The content of the invention
It is a primary object of the present invention to provide the generation method and device of a kind of identifying code, with solve it is existing with The problem of use of machine identifying code is more inconvenient.
For above-mentioned technical problem, the present invention is solved by the following technical programs.
The invention provides a kind of generation method of identifying code, including:Gather the fingerprint image of user;Extract Characteristic point in the fingerprint image;According to the characteristic point in the fingerprint image, generate for checking with Machine identifying code.
Wherein, after the characteristic point in extracting the fingerprint image, and tested at random for what is verified in generation Before card code, in addition to:According to the fingerprint image prestored, the fingerprint image progress to collection With checking;In the case where matching is verified, the random verification code for checking is generated.
Wherein, the fingerprint image of user is gathered, including:Using default fingerprint module, the finger of user is gathered Print image.
Wherein, the characteristic point in the fingerprint image, generates the random verification code for checking, including: Fingerprint module is divided into multiple regions in advance;Determine the characteristic point that the fingerprint image is in each region Number;The feature point number included based on each region, generates the random verification code for checking.
Wherein, the characteristic point includes:Distal point and bifurcation.
Present invention also offers a kind of generating means of identifying code, including:Acquisition module, for gathering user Fingerprint image;Extraction module, for extracting the characteristic point in the fingerprint image;Generation module, is used for According to the characteristic point in the fingerprint image, the random verification code for checking is generated.
Wherein, described device also includes authentication module;The authentication module, for extracting the fingerprint image After characteristic point as in, and before random verification code of the generation for checking, according to the finger prestored Print image, matching checking is carried out to the fingerprint image of collection;It is raw in the case where matching is verified Into the random verification code for checking.
Wherein, the acquisition module, specifically for utilizing default fingerprint module, gathers the fingerprint image of user Picture.
Wherein, the generation module, specifically for:Fingerprint module is divided into multiple regions in advance;It is determined that The fingerprint image is in the feature point number in each region;The characteristic point included based on each region Number, generates the random verification code for checking.
Wherein, the characteristic point includes:Distal point and bifurcation.
The present invention has the beneficial effect that:
The characteristics of present invention has uniqueness using fingerprint, gathers the fingerprint image of user, and the figure that takes the fingerprint Characteristic point as in, is many parts by Fingerprint Image Segmentation, and based on every part of feature point number included, generation Random verification code.Random verification code is applied in user's checking, it is safe, and excessively grasped without user Make, it is convenient and reliable.
Brief description of the drawings
Accompanying drawing described herein is used for providing a further understanding of the present invention, constitutes the part of the application, The schematic description and description of the present invention is used to explain the present invention, does not constitute the improper limit to the present invention It is fixed.In the accompanying drawings:
Fig. 1 is the flow chart of the generation method of identifying code according to an embodiment of the invention;
Fig. 2 is the schematic diagram of fingerprint module according to an embodiment of the invention;
Fig. 3 is the step flow chart used of identifying code according to an embodiment of the invention;
Fig. 4 is the step flow chart of extraction characteristic point according to an embodiment of the invention;
Fig. 5 is the structure chart of the generating means of identifying code according to an embodiment of the invention.
Embodiment
The characteristics of present invention has uniqueness using fingerprint, gathers the fingerprint image of user, and the figure that takes the fingerprint Characteristic point as in, is many parts by Fingerprint Image Segmentation, and based on every part of feature point number included, generation Random verification code.Because the fingerprint of user has uniqueness, the random verification code also has uniqueness. Random verification code is applied in user's checking, it is safe, and multioperation is crossed without user, it is convenient and reliable. Further, the random verification code can be used for paying.
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing and specific implementation Example, is described in further detail to the present invention.
There is provided a kind of generation method of identifying code for embodiments in accordance with the present invention.Fig. 1 is according to the present invention The flow chart of the generation method of the identifying code of one embodiment.
Step S110, gathers the fingerprint image of user.
The fingerprint image of user is gathered by fingerprint collecting technology.Fingerprint collecting technology includes:Optical total-reflection Technology, silicon crystal sensor technology, ultrasound scanning etc..It is currently preferred, passed by fingerprint Sensor (fingerprint module) gathers the fingerprint image of user.
According to the difference of position of the user's finger on fingerprint sensor, it is poor that the fingerprint image of collection can also be present It is different, so, it can make the identifying code ultimately generated that there is randomness.For example:Finger is placed on sensor Position to the left or position to the right, the fingerprint image collected is different.So not only fingerprint has The characteristics of uniqueness, can provide the security of checking, and the placement location of finger also improves the security of checking.
Characteristic point in step S120, the image that takes the fingerprint.
The characteristic point of fingerprint image includes:Destination node (distal point), bifurcation on fingerprint lines.Specifically Feature point extracting step the embodiment below is described in detail.
In one embodiment, in order to ensure client secure, after the characteristic point in the image that takes the fingerprint, And before random verification code of the generation for checking, can also be according to the fingerprint image prestored, to adopting The fingerprint image of collection carries out matching checking;In the case where matching is verified, generate for checking Random verification code;In matching checking not in the case of, user is pointed out to input fingerprint again, if matching is tested Demonstrate,prove the number of times that does not pass through and exceed predetermined matching checking number of times, then alarmed, such as beep or to Another client of client binding sends the short message of protection predetermined content.
Specifically, by the characteristic point extracted from the fingerprint image of collection and the spy of fingerprint image prestored Levy and be a little compared, find both reference points, two width fingerprint images are aligned;Then two are tried to achieve The similarity of the characteristic point of fingerprint image;If the similarity tried to achieve is higher than this threshold value, matching is verified, Otherwise do not pass through.
Step S130, the characteristic point in fingerprint image generates the random verification code for checking.
According in fingerprint graph characteristic point quantity generate random verification code, the random verification code be bar code, Quick Response Code or random code.
Specifically, fingerprint module is divided into multiple regions in advance;Finger is pressed against on fingerprint module by user Fingerprint image is gathered, the feature point number that the fingerprint image is in each region is determined;Based on each area The feature point number that domain includes, generates the random verification code for checking.It is possible to further in collection The characteristic point in each region is extracted during fingerprint image, and calculates the number of characteristic point in each region.
For example:The shape of common fingerprint module has circular and square, and the size of fingerprint module is divided into 8 parts, As shown in Fig. 2 the position according to fingerprint in fingerprint module, counts the number of characteristic point in each region (0-99), is indicated with two decimal numbers, and such as region 1, which includes 1 characteristic point, region 2, includes 3 characteristic points, regions 3 include 7 including 4 characteristic points, region 4 including 6 characteristic points, region 5 Individual characteristic point, region 6 include 1 characteristic point, region 7 includes 5 including 12 characteristic points, region 8 Individual characteristic point;It is according to area code order that characteristic point quantity is arranged together, obtain sixteen bit with Machine code 0103040607011205, can be converted into bar code by the random code, and random code and bar code is same When display in the client.
The random verification code can be used for checking, such as authentication, security verification.
For example:In the position of the prior analog subscriber input fingerprint of server end, and generate the checking for comparing Code, after client generates random verification code, is sent to server, is matched in server end, such as The match is successful for fruit, then be verified, otherwise checking does not pass through.
And for example:The random verification code of generation is sent to server by this client;Other clients are from this client End obtains the random verification code and is sent to server;Server is if it find that the random of this client transmission is tested Demonstrate,prove code identical with the random verification code that other clients are sent, then judge that other clients possess and this client The main body interacted, it is allowed to which other clients and this client are interacted by server;Conversely, prohibiting Only other clients are interacted by server.
In the use of random verification code, it may comprise steps of.
Fig. 3 is the step flow chart used of identifying code according to an embodiment of the invention.
Step S310, the first client generates random verification code according to the fingerprint image of the first user.
First user is the user using the first client.First user adds the first use in the first client Family information, and the third party bound with first user profile is set.The third party of first user profile binding It can be the first data server.In the first data server, the account of the first user is provided with.
Random verification code, the first user profile are sent to server by step S320, the first client.
Step S330, the second client obtains random verification code at the first client, and by the random of acquisition Identifying code, second user information are sent to server.
Second user is the user using the second client.Second user adds the second use in the second client Family information, and the third party bound with the second user information is set.The third party of second user information binding It can be the second data server.In the second data server, the account of second user is provided with.
Step S340, server are if it find that the random verification code and the second client hair that the first client is sent The random verification code sent is identical, then allows third party and the binding of second user information that the first user profile is bound Third party carry out data interaction.
The third party of first user profile binding and the third party of second user information binding carry out data interaction, It that is to say and data interaction is carried out between the account of the first user and the account of second user.
For example:Subscription client generates random verification code according to fingerprint image, and it is included in subscription client In, and it is sent to server;Merchant client is obtained by scanning random verification code in subscription client The random verification code is obtained, the random verification code is sent to server;Server finds that subscription client is sent Random verification code it is identical with the accidental validation that merchant client is sent, then allow subscription client and businessman visitor Payment transaction between the end of family, on the contrary do not allow.
By the present embodiment, the fingerprint that the first client is inputted according to user can carry out the first client-side User's checking, can generate random verification code, it is to avoid given birth to by server side using traditional according to fingerprint image Into identifying code, the security that uses of increase identifying code, in the process, user is simple to operate.
In order that feature of present invention point extract process become apparent from, below to feature point extraction the step of carry out Further illustrate.Fig. 4 is the step flow chart of extraction characteristic point according to an embodiment of the invention.
Step S410, fingerprint image is normalized.
It is the contrast for increasing strong crestal line and valley line in image fingerprint image to be normalized the purpose of operation, is made Fingerprint image is in same intensity level, is easy to the threshold value of follow-up dividing processing to choose.
Fingerprint image I is divided into N × N blocks, N > 1;I (i, j) represents what the row of fingerprint image i-th, jth were arranged Gray value.Assuming that image resolution ratio is 500dpi, then the average gray value M (I) and gray value of fingerprint image Variance VAR (I) be respectively:
M (I) and VAR (I) are normalized, normalized formula is:
Wherein, G (i, j) is the gray value after normalization, M0It is the expectation of average gray, VAR0It is variance The expectation of value.The gray value of fingerprint image after normalization is all in M0Near.
Take the fingerprint display foreground in step S420, fingerprint image after normalization.
The segmentation of foreground and background is carried out to the fingerprint image after normalization, subsequent operation is only to fingerprint image Foreground zone is handled, so as to improve treatment effeciency.
Step S430, enhancing processing is filtered to fingerprint image prospect.
When being filtered increase processing, noise can also be further removed to fingerprint image prospect, ridge is connected The place of thread breakage.Gabor filter or direction template wave filter can be specifically used to perform.
Step S440, binary conversion treatment is carried out to the fingerprint image prospect after filtering enhancing processing.
Binarization operation is carried out after the filtering of fingerprint image prospect again, namely crestal line extracts operation.
The lines of crestal line in fingerprint image prospect and valley line after binaryzation will become very clear.
The present embodiment is preferred, using direction split plot design carries out binary conversion treatment to fingerprint graph prospect.Direction Split plot design is the method that utilization orientation information carries out binaryzation, and this method also has certain enhancing effect.
The framework information of extracting ridges in fingerprint graph prospect after binary conversion treatment, is removed and feature extraction Unrelated redundancy, reduces the amount of storage of information.
Step S450, the local feature for the display foreground that takes the fingerprint.
Fingerprint characteristic includes global characteristics and local feature, and global characteristics are applied to the classification of fingerprint, local special The matching in fingerprint is taken over for use, so only needing to extract local feature in the present invention.
Local feature is the minutia in fingerprint, can be tried to achieve by the fingerprint image after refinement, because carefully The gray value of all pixels point in fingerprint image after change is only 0 or 1,0 expression background dot gray scale (white), 1 represents streakline point gray scale (black).
The minutia that the present embodiment is extracted includes:Distal point and bifurcation.
Step S460, extracts characteristic point in local feature.
After fingerprint image after being refined, in the template of one 3 × 3, it is with measuring point P (i, j) to be checked Central point, it is as shown in table 1 below, according to the relation between adjacent spots gray value, it can be determined that measuring point to be checked Whether P (i, j) is characterized a little.
P4(i+1,j-1) P3(i+1,j) P2(i+1,j+1)
P5(i,j-1) P(i,j) P1(i,j+1)
P6(i-1,j-1) P7(i-1,j) P8(i-1,j+1)
If adjacent spots gray value CNWhen meeting following formula, then P (i, j) is distal point.
If adjacent spots gray value CNWhen meeting following formula, then P (i, j) is bifurcation.
In formula, P (k) is Pk(i, j) corresponding gray value, 8 >=k >=1.
To the fingerprint image after refinement, along the traversal of crestal line progress from top to bottom, from left to right, with above-mentioned Two formulas are basis for estimation, preserve type and the position of characteristic point, and are obtained on the direction and crestal line of local ridge Sampling point information.
Pseudo-random numbers generation can be included in the extraction process of characteristic point, can be removed it.Further, according to spy Position relationship between levying a little filters out pseudo-random numbers generation.The marginal portion of fingerprint image prospect is shown as multiple end points, These end points are removed.
The invention provides a kind of generating means of identifying code.Fig. 5 is checking according to an embodiment of the invention The structure chart of the generating means of code.
Described device includes:
Acquisition module 510, the fingerprint image for gathering user.
Extraction module 520, for extracting the characteristic point in the fingerprint image.The characteristic point includes:End Tip point and bifurcation.
Generation module 530, for the characteristic point in the fingerprint image, is generated for the random of checking Identifying code.
Described device also includes authentication module (not shown);The authentication module, for extracting described refer to After characteristic point in print image, and before generation is for the random verification code verified, according to prestoring Fingerprint image, matching checking is carried out to the fingerprint image of collection;In the case where matching is verified, Generate the random verification code for checking.
In one embodiment, the acquisition module 510, specifically for utilizing default fingerprint module, is adopted Collect the fingerprint image of user.The generation module 530, specifically for:Fingerprint module is divided into advance many Individual region;Determine the feature point number that the fingerprint image is in each region;Based on each region Zhong Bao The feature point number included, generates the random verification code for checking.
The function of device described in the present embodiment is retouched in the embodiment of the method shown in Fig. 1-Fig. 4 State, therefore not detailed part in the description of the present embodiment, the related description in previous embodiment is may refer to, This is not repeated.
Embodiments of the invention are the foregoing is only, are not intended to limit the invention, for this area For technical staff, the present invention can have various modifications and variations.Within the spirit and principles of the invention, Any modification, equivalent substitution and improvements made etc., should be included within scope of the presently claimed invention.

Claims (10)

1. a kind of generation method of identifying code, it is characterised in that including:
Gather the fingerprint image of user;
Extract the characteristic point in the fingerprint image;
According to the characteristic point in the fingerprint image, the random verification code for checking is generated.
2. according to the method described in claim 1, it is characterised in that in the fingerprint image is extracted After characteristic point, and before random verification code of the generation for checking, in addition to:
According to the fingerprint image prestored, matching checking is carried out to the fingerprint image of collection;
In the case where matching is verified, the random verification code for checking is generated.
3. according to the method described in claim 1, it is characterised in that the fingerprint image of collection user, bag Include:
Using default fingerprint module, the fingerprint image of user is gathered.
4. method according to claim 3, it is characterised in that according to the spy in the fingerprint image Levy a little, generate the random verification code for checking, including:
Fingerprint module is divided into multiple regions in advance;
Determine the feature point number that the fingerprint image is in each region;
The feature point number included based on each region, generates the random verification code for checking.
5. the method according to any one of claim 1-4, it is characterised in that the characteristic point bag Include:Distal point and bifurcation.
6. a kind of generating means of identifying code, it is characterised in that including:
Acquisition module, the fingerprint image for gathering user;
Extraction module, for extracting the characteristic point in the fingerprint image;
Generation module, for the characteristic point in the fingerprint image, generates the accidental validation for checking Code.
7. device according to claim 6, it is characterised in that described device also includes authentication module;
The authentication module, after the characteristic point in the extraction fingerprint image, and is used in generation Before the random verification code of checking, according to the fingerprint image prestored, the fingerprint image of collection is entered Row matching checking;In the case where matching is verified, the random verification code for checking is generated.
8. device according to claim 6, it is characterised in that the acquisition module, specifically for Using default fingerprint module, the fingerprint image of user is gathered.
9. device according to claim 8, it is characterised in that the generation module, specifically for:
Fingerprint module is divided into multiple regions in advance;
Determine the feature point number that the fingerprint image is in each region;
The feature point number included based on each region, generates the random verification code for checking.
10. the device according to any one of claim 6-9, it is characterised in that the characteristic point bag Include:Distal point and bifurcation.
CN201610179364.XA 2016-03-25 2016-03-25 The generation method and device of a kind of identifying code Pending CN107229857A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610179364.XA CN107229857A (en) 2016-03-25 2016-03-25 The generation method and device of a kind of identifying code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610179364.XA CN107229857A (en) 2016-03-25 2016-03-25 The generation method and device of a kind of identifying code

Publications (1)

Publication Number Publication Date
CN107229857A true CN107229857A (en) 2017-10-03

Family

ID=59932096

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610179364.XA Pending CN107229857A (en) 2016-03-25 2016-03-25 The generation method and device of a kind of identifying code

Country Status (1)

Country Link
CN (1) CN107229857A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107786572A (en) * 2017-11-07 2018-03-09 苏州工业园区服务外包职业学院 A kind of verification method of user identity, device and terminal
CN109344593A (en) * 2018-10-24 2019-02-15 三星(中国)半导体有限公司 Biometric information verification method and authentication server, typing and verifying client
WO2020134113A1 (en) * 2018-12-28 2020-07-02 武汉极意网络科技有限公司 Memory, reasoning-based verification code implementation method and apparatus, and device
CN112668412A (en) * 2020-12-15 2021-04-16 深兰科技(上海)有限公司 Two-dimensional code generation method and device, electronic equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101631023A (en) * 2009-07-31 2010-01-20 北京飞天诚信科技有限公司 Method for authenticating identity and system thereof
CN101895542A (en) * 2010-07-05 2010-11-24 北京畅游时空软件技术有限公司 Verification code acquiring method and device
CN102594842A (en) * 2012-03-21 2012-07-18 江苏新大诚信息技术有限公司 Device-fingerprint-based network management message authentication and encryption scheme
CN103037323A (en) * 2012-07-11 2013-04-10 江苏省南京市南京公证处 Random code verification system based on mobile terminal and verification method thereof
CN103532933A (en) * 2013-09-28 2014-01-22 刘琦 Method of realizing client operation authorization through fingerprint confirmation, and intelligent terminal
WO2015187504A1 (en) * 2014-06-04 2015-12-10 Grandios Technologies, Llc Smartphone fingerprint pass-through system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101631023A (en) * 2009-07-31 2010-01-20 北京飞天诚信科技有限公司 Method for authenticating identity and system thereof
CN101895542A (en) * 2010-07-05 2010-11-24 北京畅游时空软件技术有限公司 Verification code acquiring method and device
CN102594842A (en) * 2012-03-21 2012-07-18 江苏新大诚信息技术有限公司 Device-fingerprint-based network management message authentication and encryption scheme
CN103037323A (en) * 2012-07-11 2013-04-10 江苏省南京市南京公证处 Random code verification system based on mobile terminal and verification method thereof
CN103532933A (en) * 2013-09-28 2014-01-22 刘琦 Method of realizing client operation authorization through fingerprint confirmation, and intelligent terminal
WO2015187504A1 (en) * 2014-06-04 2015-12-10 Grandios Technologies, Llc Smartphone fingerprint pass-through system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107786572A (en) * 2017-11-07 2018-03-09 苏州工业园区服务外包职业学院 A kind of verification method of user identity, device and terminal
CN109344593A (en) * 2018-10-24 2019-02-15 三星(中国)半导体有限公司 Biometric information verification method and authentication server, typing and verifying client
WO2020134113A1 (en) * 2018-12-28 2020-07-02 武汉极意网络科技有限公司 Memory, reasoning-based verification code implementation method and apparatus, and device
CN112668412A (en) * 2020-12-15 2021-04-16 深兰科技(上海)有限公司 Two-dimensional code generation method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
US8810366B2 (en) Service providing device, service providing method, biometric information authentication server, biometric information authentication method, program, and service providing system
CN110166438B (en) Account information login method and device, computer equipment and computer storage medium
JP5971089B2 (en) Biological information correction apparatus, biological information correction method, and biological information correction computer program
CN105069622B (en) A kind of face recognition payment system and method for facing moving terminal
CN106709866B (en) method and device for removing grid watermark from certificate photo and method and device for verifying human face
CN101681512B (en) Vein pattern management system, vein pattern registration device, vein pattern authentication device, vein pattern registration method, and vein pattern authentication method
CN104580143A (en) Security authentication method based on gesture recognition, terminal, server and system
CN107229857A (en) The generation method and device of a kind of identifying code
CN204576535U (en) A kind of bank slip recognition device
US20210312465A1 (en) Transaction processing method, apparatus, device, medium and system
CN103310339A (en) Identity recognition device and method as well as payment system and method
CN104751040A (en) Fingerprint detection method based on intelligent mobile information equipment
CN110516672A (en) Card card information identifying method, device and terminal
Zhou et al. A benchmark 3D fingerprint database
US20100226545A1 (en) Vein pattern management system, vein pattern registration apparatus, vein pattern authentication apparatus, vein pattern registration method, vein pattern authentication method, program, and vein data configuration
CN106203326B (en) A kind of image processing method, device and mobile terminal
CN104579682A (en) Access method and system for multi-service server
CN105868699A (en) Terminal payment method and device based on fingerprint
CN106649829B (en) Service processing method and device based on palm print data
CN101711399B (en) Vein pattern management system, vein pattern registration device, vein pattern authentication device, vein pattern registration method, vein pattern authentication method, vein data storage device
WO2018121552A1 (en) Palmprint data based service processing method, apparatus and program, and medium
CN101681498B (en) Vein pattern management system, vein pattern registration device, vein pattern authentication device, vein pattern registration method, vein pattern authentication method, program, and vein data struc
Vijayalakshmi et al. Finger and palm print based multibiometric authentication system with GUI interface
CN104615992A (en) Long-distance fingerprint dynamic authentication method
CN205427857U (en) Identity identification system based on many biological characteristics combine equipment fingerprint

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20171003

RJ01 Rejection of invention patent application after publication