CN107679387A - A kind of identity identifying method and device based on finger-print cipher - Google Patents
A kind of identity identifying method and device based on finger-print cipher Download PDFInfo
- Publication number
- CN107679387A CN107679387A CN201711106864.1A CN201711106864A CN107679387A CN 107679387 A CN107679387 A CN 107679387A CN 201711106864 A CN201711106864 A CN 201711106864A CN 107679387 A CN107679387 A CN 107679387A
- Authority
- CN
- China
- Prior art keywords
- fingerprint
- sequence
- authentication
- finger
- standard
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/1365—Matching; Classification
Abstract
The present invention relates to a kind of identity identifying method and device based on finger-print cipher, the method comprising the steps of:Obtain the fingerprint sequence of user's typing;By the fingerprint of each position in the fingerprint sequence, it is compared with the fingerprint of correspondence position in the standard fingerprint sequence to prestore, counts the number of fingerprint matching, if fingerprint matching rate is more than or equal to given threshold, authentication success, otherwise authentication fails.Authentication is carried out by the inventive method and device, can not only be guaranteed safety, reliability, can also be avoided because finger injuries or other reasonses cause the situation of fingerprint recognition failure, and influences the normal use of finger-print cipher.
Description
Technical field
The present invention relates to identity identification technical field, more particularly to a kind of identity identifying method and dress based on finger-print cipher
Put.
Background technology
Currently everyone can possess all kinds of passwords, such as all kinds of passwords such as bank cipher, website password, wechat password,
The more easy forgettings of password, so many people are just used uniformly a password.Once but the password is stolen, it will causes institute
There is the information leakage using the password, larger potential safety hazard be present.Fingerprint is everyone exclusive biological characteristic, therefore is used
Fingerprint can improve security as password.It is Publication No. CN105354464A, entitled in order to further improve security
The Chinese patent application of " method and apparatus based on finger print information identification user identity " proposes a kind of new scheme, and password is adopted
Formed with multiple fingerprints, and multiple fingerprints arrange in particular order, even if replicating multiple fingerprints by referring to mould, it is not known that
Multiple fingerprints put in order also can not successful decryption, security is relative to increase.
However, the particularity of limitation and fingerprint based on technology, fingerprint recognition especially exist there is also certain mortality
In the case of finger injuries, mortality will be higher, and the success rate k of a fingerprint recognition may be higher, but n fingerprint composition
The success rate of fingerprint sequence would is that k n powers, fingerprint number is more, and success rate is lower, if possibility can not be identified successfully
Heavy losses or influence can be brought to user.If for example, using fingerprint sequence as bank cipher, refer to once can not successfully identify
Line sequence, it will lead to not carry out financial transaction, heavy economic losses may be brought to user.
The content of the invention
It is an object of the invention to improve the deficiency in the presence of prior art, there is provided a kind of new based on finger-print cipher
Identity identifying method and device.
In order to realize foregoing invention purpose, the embodiments of the invention provide following technical scheme:
A kind of identity identifying method based on finger-print cipher, including step:Obtain the fingerprint sequence of user's typing;This is referred to
The fingerprint of each position in line sequence, it is compared with the fingerprint of correspondence position in the standard fingerprint sequence to prestore, statistics refers to
The number of line matching, if fingerprint matching rate is more than or equal to given threshold, authentication success, otherwise authentication fails.
As a kind of embodiment, if a certain position does not collect fingerprint in the fingerprint sequence obtained, or collect
Fingerprint is not consistent with the fingerprint of correspondence position in standard fingerprint sequence, then judge obtain fingerprint sequence in the position fingerprint with
The fingerprint of correspondence position mismatches in standard fingerprint sequence.
In the above method, by counting fingerprint matching rate, if fingerprint matching rate is more than or equal to given threshold, authentication
Success, can avoid causing because of some finger injuries not collecting fingerprint, or the fingerprint of collection is incomplete, and then cause to refer to
The situation that line password is unable to normal use occurs.
In another embodiment, methods described also includes step:If fingerprint matching rate is less than given threshold, enter one
Walk in criterion fingerprint sequence, whether the fingerprint for mismatching position is same fingerprint, if then authentication success, otherwise
Authentication fails.
In fingerprint sequence, it is understood that there may be the situation that the fingerprint of a finger is used multiple times, if as the finger injuries
And the large percentage that the fingerprint of the finger is shared in standard fingerprint sequence, then authentication will be caused to fail, the above method
Such case can be avoided so that the use of finger-print cipher is with more reliability, security.
Compared with prior art, authentication is carried out by the inventive method and device, can not only guaranteed safety, can
By property, it can also avoid because finger injuries or other normal reasons cause fingerprint recognition to fail, and then it is normal to influence finger-print cipher
Situation about using, the inventive method and device can cause the use of finger-print cipher on the premise of guaranteeing safety, to have more
Reliability, practicality.
In addition, in method disclosed in background patents, with the shape of specific symbol after being randomly generated due to the order of password
Formula is presented to user, therefore is easy to be seen by other people during presentation, refers to if copying to user by referring to mould again
Line, then finger-print cipher will be caused to be cracked, and in turn result in and divulge a secret, security has very big leak.And heretofore described finger
Line password, putting in order for multiple fingerprints is user oneself setting, in the absence of the process of displaying, and then can be reduced by other people
The risk seen, i other words, the security using the inventive method progress authentication is higher, more practical.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by embodiment it is required use it is attached
Figure is briefly described, it will be appreciated that the following drawings illustrate only certain embodiments of the present invention, therefore be not construed as pair
The restriction of scope, for those of ordinary skill in the art, on the premise of not paying creative work, can also be according to this
A little accompanying drawings obtain other related accompanying drawings.
Fig. 1 is a kind of flow chart for identity identifying method based on finger-print cipher that the embodiment of the present invention 1 provides.
Fig. 2 is a kind of flow chart for identity identifying method based on finger-print cipher that the embodiment of the present invention 2 provides.
Fig. 3 is the flow chart for another identity identifying method based on finger-print cipher that the embodiment of the present invention 2 provides.
Fig. 4 is a kind of structural schematic block diagram of the identification authentication system based on finger-print cipher provided in an embodiment of the present invention.
Embodiment
Below in conjunction with accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Ground describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.Generally exist
The component of the embodiment of the present invention described and illustrated in accompanying drawing can be configured to arrange and design with a variety of herein.Cause
This, the detailed description of the embodiments of the invention to providing in the accompanying drawings is not intended to limit claimed invention below
Scope, but it is merely representative of the selected embodiment of the present invention.Based on embodiments of the invention, those skilled in the art are not doing
The every other embodiment obtained on the premise of going out creative work, belongs to the scope of protection of the invention.
Embodiment 1
Referring to Fig. 1, the identity identifying method based on finger-print cipher provided in the present embodiment, including step:
Obtain the fingerprint sequence of user's typing.Fingerprint sequence includes multiple fingerprints, and multiple fingerprints are in particular order
Arrangement.User can not repeat typing in typing fingerprint sequence, for the fingerprint of same position, such as can not be because of some hand
The fingerprint of finger does not have typing success and repeats the fingerprint of the typing finger, avoids influenceing the judgement whether fingerprint matches.
By the fingerprint of each position in the fingerprint sequence, enter with the fingerprint of correspondence position in the standard fingerprint sequence that prestores
Row compares, and counts the number of fingerprint matching.
In this step, if a certain position does not collect fingerprint in the fingerprint sequence obtained, or the fingerprint and mark collected
The fingerprint of correspondence position is not consistent in quasi- fingerprint sequence, then judges the fingerprint and standard fingerprint of the position in the fingerprint sequence of acquisition
The fingerprint of correspondence position mismatches in sequence.Fingerprint can not be collected, it may be possible to because the fingertip tracking leads to not typing and referred to
Line, it is also possible to the finger injuries and cause the fingerprint of typing very fuzzy and None- identified.The fingerprint and standard fingerprint collected
The fingerprint of correspondence position is not consistent in sequence, it may be possible to which finger part missing causes the fingerprint of typing to be only the one of finger print
Part, or because order misremembers and causes the fingerprint of other fingers of typing.
Judge whether fingerprint matching rate is more than or equal to given threshold, if it is, authentication success, otherwise authentication
Failure.Threshold value is set to bigger, and the security that finger-print cipher uses is higher, and threshold value sets smaller, the spirit that finger-print cipher uses
Activity is bigger, can avoid because various normal reasons cause the fingerprint sequence of user's typing to differ with the standard fingerprint sequence to prestore
The situation of cause.Authentication side can require to carry out different settings according to different.
For example, for the ease of description, the fingerprint of a finger is represented with a numeral herein, such as 1/2/3/4/
5 represent the fingerprint of the left hand thumb/forefinger/middle finger/third finger/little finger of toe respectively, 6/7/8/9/0 represent respectively hand thumb/forefinger/
The fingerprint of the middle finger/third finger/little finger of toe.It is assumed that threshold value is 80%, the standard fingerprint sequence to prestore is 3,4,6,2,1,0,5.
If the fingerprint sequence of user's typing is 3,4,6,2 ,-, 0,5, for the ease of description, represent not adopt with "-" herein
Collect fingerprint, then fingerprint matching rate is 85.71%, authentication success.
If the fingerprint sequence of user's typing is 3, A, 6,2,1,0, A, for the ease of description, represent to gather with alphabetical A herein
To fingerprint be not consistent with the fingerprint of correspondence position in standard fingerprint sequence, then fingerprint matching rate be 71.42%, authentication lose
Lose.
Authentication is carried out by the above method, the security that finger-print cipher uses can be ensured, must also be avoided because of hand
Refer to the normal reason such as injury and cause the fingerprint sequence of typing and standard fingerprint sequence not quite identical, and then cause finger-print cipher
It is unable to the situation of normal use.
Embodiment 2
Referring to Fig. 2, the identity identifying method based on finger-print cipher provided in the present embodiment, including step:
Obtain the fingerprint sequence of user's typing.
By the fingerprint of each position in the fingerprint sequence, enter with the fingerprint of correspondence position in the standard fingerprint sequence that prestores
Row compares, and counts the number of fingerprint matching.
Judge whether fingerprint matching rate is more than or equal to given threshold, if it is, authentication success, if fingerprint matching
Rate is less than given threshold, then determines whether in standard fingerprint sequence, and whether the fingerprint for mismatching position is same fingerprint, if
It is then authentication success, otherwise authentication fails.
Illustrate, it is assumed that threshold value 80%, the standard fingerprint sequence to prestore are 3,4,6,2,1,2,5.If user because
Cause the part missing of left index finger for certain reason, then the fingerprint sequence of user's typing would is that 3,4,6, A, 1, A, 5, lead to
Cross with standard fingerprint sequence alignment, matching rate 71.42%, but mismatch position fingerprint be to come from left index finger, this
When then judge authentication success.
If the fingerprint sequence of user's typing is 3,4,6, A, 1,2, A, by being with standard fingerprint sequence alignment, matching rate
71.42%, but in standard fingerprint sequence, respectively from left index finger and left hand little finger of toe, i.e., the fingerprint for mismatching position is
Respectively from different fingers, now then think to may not be user's operation, potential safety hazard be present, therefore judge authentication
Failure.
In finger-print cipher, the fingerprint that same finger be present is used multiple times, can by the present embodiment method
To avoid the fingerprint because of some finger from not gathering correctly, and in the case that the fingerprint of the finger is used multiple times, cause fingerprint
Password can not be proper use of situation.
Usually, based on security consideration, when setting finger-print cipher, user generally will not be by the fingerprint of same finger
Reuse too much, such as in a standard fingerprint sequence, there are 7 fingerprints, wherein 4 and above fingerprint come from same hand
Refer to, therefore, if fingerprint matching rate too it is low may if be not because normal reason causes the fingerprint sequence of typing and standard fingerprint sequence
The outer not quite identical situation of row, and more likely it is not user's operation.Therefore in order to improve security, as shown in figure 3, on
If stating fingerprint matching rate is less than given threshold, determine whether in standard fingerprint sequence, mismatch position fingerprint whether
For same fingerprint, if then authentication success, otherwise the step of authentication failure, is replaced by following steps:
If fingerprint matching rate is less than given threshold, and is more than or equal to lower threshold, then standard fingerprint sequence is determined whether
In row, whether the fingerprint for mismatching position is same fingerprint, if then authentication success, otherwise authentication fails.
Still using above-mentioned for example, set lower threshold as 60%, if the fingerprint sequence of user's typing is 3,4,6, A,
1 ,-, A, by with standard fingerprint sequence alignment, matching rate 57.14%, but be less than lower threshold, now then judge identity
Authentification failure.
Referring to Fig. 4, provide a kind of identification authentication system based on finger-print cipher, including fingerprint simultaneously in the present embodiment
Retrieval module, fingerprint comparison module, and authentication module.Wherein,
Fingerprint sequence acquisition module is used for the fingerprint sequence for obtaining user's typing;
Fingerprint comparison module is used for the fingerprint of each position in the fingerprint sequence, and in the standard fingerprint sequence that prestores
The fingerprint of correspondence position is compared, and provides the result whether matched.Fingerprint comparison module is when comparing, if the fingerprint obtained
A certain position does not collect fingerprint in sequence, or the fingerprint not phase of the fingerprint collected and correspondence position in standard fingerprint sequence
Symbol, then judge that the fingerprint of the fingerprint of the position and correspondence position in standard fingerprint sequence in the fingerprint sequence of acquisition mismatches.
Authentication module is used for the number for counting fingerprint matching, if fingerprint matching rate is more than or equal to given threshold, identity is recognized
Demonstrate,prove successfully, otherwise authentication fails.
In another embodiment, authentication module is used to count the number of fingerprint matching, if fingerprint matching rate is more than etc.
In given threshold, then authentication success;If fingerprint matching rate is less than given threshold, determine whether to mismatch the finger of position
Whether line is same fingerprint, if then authentication success, otherwise authentication fails.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, any
Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, should all be contained
Cover within protection scope of the present invention.
Claims (8)
1. a kind of identity identifying method based on finger-print cipher, it is characterised in that comprise the following steps:
Obtain the fingerprint sequence of user's typing;
By the fingerprint of each position in the fingerprint sequence, compared with the fingerprint of correspondence position in the standard fingerprint sequence that prestores
It is right, the number of fingerprint matching is counted, if fingerprint matching rate is more than or equal to given threshold, authentication success, otherwise identity is recognized
Card failure.
2. according to the method for claim 1, it is characterised in that if a certain position does not collect finger in the fingerprint sequence obtained
Line, or the fingerprint collected are not consistent with the fingerprint of correspondence position in standard fingerprint sequence, then judge the fingerprint sequence obtained
In the position fingerprint and standard fingerprint sequence in the fingerprint of correspondence position mismatch.
3. according to the method for claim 1, it is characterised in that methods described also includes step:
If fingerprint matching rate is less than given threshold, determine whether in standard fingerprint sequence, mismatch position fingerprint whether
For same fingerprint, if then authentication success, otherwise authentication fails.
4. according to the method for claim 1, it is characterised in that methods described also includes step:
If fingerprint matching rate is less than given threshold, and is more than or equal to lower threshold, then determine whether in standard fingerprint sequence, no
Whether the fingerprint of matched position is same fingerprint, if then authentication success, otherwise authentication fails.
A kind of 5. identification authentication system based on finger-print cipher, it is characterised in that including:
Fingerprint sequence acquisition module, for obtaining the fingerprint sequence of user's typing;
Fingerprint comparison module is and right in the standard fingerprint sequence that prestores for by the fingerprint of each position in the fingerprint sequence
Answer the fingerprint of position to be compared, and provide the result whether matched;
Authentication module, for counting the number of fingerprint matching, if fingerprint matching rate is more than or equal to given threshold, authentication into
Work(, otherwise authentication fail.
6. device according to claim 5, it is characterised in that the fingerprint comparison module is when comparing, if the finger obtained
A certain position does not collect fingerprint in line sequence, or in the fingerprint collected and standard fingerprint sequence correspondence position fingerprint not
It is consistent, then the fingerprint of the position mismatches with the fingerprint of correspondence position in standard fingerprint sequence in the fingerprint sequence for judging to obtain.
7. device according to claim 5, it is characterised in that the authentication module is specifically used for:
The number of fingerprint matching is counted, if fingerprint matching rate is more than or equal to given threshold, authentication success;If fingerprint matching
Rate is less than given threshold, then determine whether mismatch position fingerprint whether be same fingerprint, if then authentication into
Work(, otherwise authentication fail.
8. device according to claim 5, it is characterised in that the authentication module is specifically used for:
The number of fingerprint matching is counted, if fingerprint matching rate is more than or equal to given threshold, authentication success;If fingerprint matching
Rate is less than given threshold, and is more than or equal to lower threshold, then whether the fingerprint for determining whether to mismatch position is same finger
Line, if then authentication success, otherwise authentication fails.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711106864.1A CN107679387B (en) | 2017-11-10 | 2017-11-10 | Identity authentication method and device based on fingerprint password |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711106864.1A CN107679387B (en) | 2017-11-10 | 2017-11-10 | Identity authentication method and device based on fingerprint password |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107679387A true CN107679387A (en) | 2018-02-09 |
CN107679387B CN107679387B (en) | 2021-08-27 |
Family
ID=61146487
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711106864.1A Active CN107679387B (en) | 2017-11-10 | 2017-11-10 | Identity authentication method and device based on fingerprint password |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107679387B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109002702A (en) * | 2018-08-01 | 2018-12-14 | Oppo广东移动通信有限公司 | Solve lock control method and electronic device |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7017182B2 (en) * | 2000-02-08 | 2006-03-21 | Shoichi Kiyomoto | Method of securely transmitting information |
US20120283871A1 (en) * | 2011-05-02 | 2012-11-08 | Omnicell, Inc. | System and method for user access of dispensing unit |
CN104537290A (en) * | 2014-12-18 | 2015-04-22 | 无敌科技(西安)有限公司 | Password system and achievement method based on multi-fingerprint identification |
CN104751038A (en) * | 2013-12-25 | 2015-07-01 | 腾讯科技(深圳)有限公司 | Identity authentication method, device and system |
CN105160315A (en) * | 2015-08-31 | 2015-12-16 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint verification method and device and terminal |
CN105243307A (en) * | 2015-09-18 | 2016-01-13 | 京东方科技集团股份有限公司 | Fingerprint identification method and apparatus for touch screen |
CN105354464A (en) * | 2015-10-14 | 2016-02-24 | 中国银联股份有限公司 | Method and device for identifying user identity on the basis of fingerprint information |
CN105635052A (en) * | 2014-10-31 | 2016-06-01 | 江苏威盾网络科技有限公司 | Network identity dynamic fingerprint authentication method |
CN106958403A (en) * | 2017-05-28 | 2017-07-18 | 杭州力谱科技有限公司 | A kind of safety box |
CN107180182A (en) * | 2017-06-09 | 2017-09-19 | 青岛海信移动通信技术股份有限公司 | A kind of unlocked by fingerprint method and apparatus |
US20170293793A1 (en) * | 2016-04-11 | 2017-10-12 | Zwipe As | Fingerprint authorisable device |
-
2017
- 2017-11-10 CN CN201711106864.1A patent/CN107679387B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7017182B2 (en) * | 2000-02-08 | 2006-03-21 | Shoichi Kiyomoto | Method of securely transmitting information |
US20120283871A1 (en) * | 2011-05-02 | 2012-11-08 | Omnicell, Inc. | System and method for user access of dispensing unit |
CN104751038A (en) * | 2013-12-25 | 2015-07-01 | 腾讯科技(深圳)有限公司 | Identity authentication method, device and system |
CN105635052A (en) * | 2014-10-31 | 2016-06-01 | 江苏威盾网络科技有限公司 | Network identity dynamic fingerprint authentication method |
CN104537290A (en) * | 2014-12-18 | 2015-04-22 | 无敌科技(西安)有限公司 | Password system and achievement method based on multi-fingerprint identification |
CN105160315A (en) * | 2015-08-31 | 2015-12-16 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint verification method and device and terminal |
CN105243307A (en) * | 2015-09-18 | 2016-01-13 | 京东方科技集团股份有限公司 | Fingerprint identification method and apparatus for touch screen |
CN105354464A (en) * | 2015-10-14 | 2016-02-24 | 中国银联股份有限公司 | Method and device for identifying user identity on the basis of fingerprint information |
US20170293793A1 (en) * | 2016-04-11 | 2017-10-12 | Zwipe As | Fingerprint authorisable device |
CN106958403A (en) * | 2017-05-28 | 2017-07-18 | 杭州力谱科技有限公司 | A kind of safety box |
CN107180182A (en) * | 2017-06-09 | 2017-09-19 | 青岛海信移动通信技术股份有限公司 | A kind of unlocked by fingerprint method and apparatus |
Non-Patent Citations (1)
Title |
---|
林坤明: "基于指纹与指静脉的多模态身份识别方法研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109002702A (en) * | 2018-08-01 | 2018-12-14 | Oppo广东移动通信有限公司 | Solve lock control method and electronic device |
Also Published As
Publication number | Publication date |
---|---|
CN107679387B (en) | 2021-08-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shahzad et al. | Secure unlocking of mobile touch screen devices by simple gestures: You can see it but you can not do it | |
JP5861529B2 (en) | Biometric authentication device, biometric authentication system, biometric authentication method, biometric authentication program | |
Akhtar et al. | Biometrics: In search of identity and security (Q & A) | |
Arteaga-Falconi et al. | ECG and fingerprint bimodal authentication | |
CN104007929B (en) | Based on mobile terminal unlock method and the mobile terminal of gesture identification | |
CN103699995A (en) | Payment authentication method based on fingerprints and finger veins | |
CN107124283A (en) | A kind of physical characteristics collecting system and physical characteristics collecting method | |
CN104799865B (en) | Fingerprint recognition system | |
US10102357B2 (en) | Biometric identification and identity data protection method | |
CN106855939A (en) | A kind of fingerprint verification method and device | |
Goh et al. | A framework for multimodal biometric authentication systems with template protection | |
Raghavendra et al. | Iris technology: A review on iris based biometric systems for unique human identification | |
CN106250739A (en) | A kind of identity recognition device | |
CN107679387A (en) | A kind of identity identifying method and device based on finger-print cipher | |
CN100583765C (en) | Biological safety level model and its setting method and device | |
Xu | Application Research Based on Machine Learning in Network Privacy Security | |
CN101681498A (en) | Vein pattern management system, vein pattern registration device, vein pattern authentication device, vein pattern registration method, vein pattern authentication method, program, and vein data struc | |
CN101840505A (en) | Individual identity identification system | |
CN107194229A (en) | A kind of computer user's personal identification method | |
Coventry et al. | Biometric verification at a self service interface | |
CN106815506A (en) | A kind of identification and the method and terminal of unlock terminal | |
CN105678149A (en) | Unlocking method and terminal | |
CN107895114A (en) | A kind of management method of encrypted message, electronic equipment and readable storage medium storing program for executing | |
Reddy et al. | Iris Technology: A review on iris based biometric systems for unique human identification | |
US20190354988A1 (en) | Partial Fingerprint and Partial Iris Payment Device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20210805 Address after: 750004 room 107, building 27, group 1, Hupan Jiayuan phase II, Jinfeng District, Yinchuan City, Ningxia Hui Autonomous Region Applicant after: Ningxia Zhongke Hengrui Intelligent Technology Co.,Ltd. Address before: 750021 No. 204 Wenchang North Road, Xixia District, the Ningxia Hui Autonomous Region, Yinchuan Applicant before: Northern University for Nationalities |
|
GR01 | Patent grant | ||
GR01 | Patent grant |