CN107818255A - A kind of method based on fingerprint recognition encryption strengthening system safety - Google Patents

A kind of method based on fingerprint recognition encryption strengthening system safety Download PDF

Info

Publication number
CN107818255A
CN107818255A CN201711251499.3A CN201711251499A CN107818255A CN 107818255 A CN107818255 A CN 107818255A CN 201711251499 A CN201711251499 A CN 201711251499A CN 107818255 A CN107818255 A CN 107818255A
Authority
CN
China
Prior art keywords
user
fingerprint recognition
password
terminal
encryption lock
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711251499.3A
Other languages
Chinese (zh)
Other versions
CN107818255B (en
Inventor
张国磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Inspur Intelligent Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201711251499.3A priority Critical patent/CN107818255B/en
Publication of CN107818255A publication Critical patent/CN107818255A/en
Application granted granted Critical
Publication of CN107818255B publication Critical patent/CN107818255B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • Databases & Information Systems (AREA)
  • Bioethics (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of method based on fingerprint recognition encryption strengthening system safety, and terminal operating system is matched fingerprint recognition encryption lock with user name and password respectively;When fingerprint recognition encryption lock succeeds with user name and password match respectively, determine that user logins successfully.User increases fingerprint recognition encryption lock, and the username and password to match respectively with fingerprint recognition encryption lock when logging in, and improves the security of system.The personal information of user's registration is not stored in terminal, it is ensured that the safety of personal information.Do not store the personal information of user in terminal, be finished and wiped in terminal, ensure the personal information security of user.

Description

A kind of method based on fingerprint recognition encryption strengthening system safety
Technical field
The present invention relates to operating system security field, more particularly to it is a kind of based on fingerprint recognition encryption strengthening system safety Method.
Background technology
With the development of information technology, the continuous improvement of the level of informatization, information security increasingly receives significant attention, special It is not the safety of server.Server is a kind of mode generally used during management, by remote management, in order to strengthen The security of current mode.
In the prior art, in linux operating system landfall processes, the mode of guarantee system safety be using user name and Password is logged in, and such security means is more single, and easy decryption, brings safety hidden to system and user's use Suffer from, and easily the personal information of user is caused to reveal.
The content of the invention
In order to overcome above-mentioned deficiency of the prior art, the present invention provides a kind of based on fingerprint recognition encryption strengthening system peace Full method, including:Terminal, terminal are provided with operating system, and method includes:
User initiates logging request by operating system client to terminal, and logging request includes:Fingerprint recognition encryption lock And the username and password to match respectively with fingerprint recognition encryption lock;
Terminal recognition fingerprint recognition encryption lock, and the port that user inputs user name and password is provided;
Terminal operating system is matched fingerprint recognition encryption lock with user name and password respectively;
When fingerprint recognition encryption lock succeeds with user name and password match respectively, determine that user logins successfully.
Preferably, also wrapped after step operation system is matched fingerprint recognition encryption lock with user name and password respectively Include:When fingerprint recognition encryption lock and user name mismatch, or fingerprint recognition encryption lock and password mismatch, or fingerprint recognition encryption When lock mismatches with user name and password, locking system, user is forbidden to log in.
Preferably, user initiates also to include before logging request by operating system client to terminal:User exists in advance Preserved in the operating system of terminal fingerprint recognition encryption lock and, the user name that matches respectively with fingerprint recognition encryption lock and close Code.
Preferably, including:The information registering server to be communicated with terminal data;
Step user initiates also to include before logging request by operating system client to terminal:User access information is noted Volume server, register personal information, fingerprint recognition encryption lock information, username and password;And fingerprint recognition is encrypted into lock information Respectively with registering personal information, username and password is mutually bound;
After the completion of registration, information registering server issues the user with unique fingerprint recognition encryption lock information, user name and Password;
Information registering server by the personal information of user, be stored in the database of information registering server.
Preferably, user initiates logging request by operating system client to terminal;
After terminal receives logging request, in the fingerprint recognition encryption lock of locally retrieval user, while terminal recognition fingerprint is known Other encryption lock, and the port that user inputs user name and password is provided;
User name and password whether there is, if being not present, access information registrar, in information registering server Obtain the fingerprint recognition encryption lock of user, user name and password;
Terminal operating system is matched fingerprint recognition encryption lock with user name and password respectively;When fingerprint recognition is encrypted When locking respectively with user name and password match success, determine that user logins successfully.
Preferably, after determining that user logins successfully, the user fingerprints identification that information registering server erasing terminal obtains adds Close lock, user name and password;
When fingerprint recognition encryption lock and user name mismatch, or fingerprint recognition encryption lock are known with password mismatch, or fingerprint When other encryption lock mismatches with user name and password, locking system, user is forbidden to log in;
The user fingerprints identification encryption lock that information registering server erasing terminal obtains, user name and password.
Preferably, after user logins successfully,
After terminal receives the fingerprint recognition encryption lock that user inputs again, terminal inputs user name and close to provide user The port of code;
User's user name for being matched with fingerprint recognition encryption lock of input and password, terminal storage fingerprint recognition encryption lock and The username and password to match respectively with fingerprint recognition encryption lock;
After user inputs user name and password again, user name and password are inquired about.
Preferably, after user logins successfully, user to user name and password are modified;
Terminal according to the fingerprint recognition encryption lock of user and the user name to match respectively with fingerprint recognition encryption lock and Password, the first random number series is generated, the first random number series is combined with username and password respectively;
Terminal sends communication key request to information registering server, obtains the communication key of a user;
Terminal will obtain the communication key of the user, then enter respectively with the username and password with the first random number series Row combined ciphering, and form digital signature summary;
Digital signature summary in terminal is using RSA Algorithm respectively to the user with communication key and the first random number series Name and password, which are combined, to be digitally signed, and username and password after encryption and its digital signature summary are sent into information Registrar;
After information registering server receives information, sign test and decryption are carried out to the data received, and by after decryption Account user name and password preserve.
As can be seen from the above technical solutions, the present invention has advantages below:
Terminal operating system is matched fingerprint recognition encryption lock with user name and password respectively;When fingerprint recognition is encrypted When locking respectively with user name and password match success, determine that user logins successfully.User increases fingerprint recognition encryption when logging in Lock, and the username and password to match respectively with fingerprint recognition encryption lock, improve the security of system.
In the present invention, the personal information of user's registration is not stored in terminal, it is ensured that the safety of personal information.At end The personal information of user is not stored in end, is finished and is wiped in terminal, ensure the personal information security of user.And user exists After user name and the password of changing the matching of fingerprint recognition encryption lock, then the user name that amended fingerprint recognition encryption lock is matched And password is uploaded to information registering server.The present invention relates to a set of communication process that there is secrecy to set, communication ensure that Confidentiality.
Brief description of the drawings
In order to illustrate more clearly of technical scheme, the required accompanying drawing used in description will be made below simple Ground introduction, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for ordinary skill For personnel, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is the method flow diagram that strengthening system safety is encrypted based on fingerprint recognition.
Embodiment
To enable goal of the invention, feature, the advantage of the present invention more obvious and understandable, will use below specific Embodiment and accompanying drawing, the technical scheme protected to the present invention are clearly and completely described, it is clear that implementation disclosed below Example is only part of the embodiment of the present invention, and not all embodiment.Based on the embodiment in this patent, the common skill in this area All other embodiment that art personnel are obtained under the premise of creative work is not made, belong to the model of this patent protection Enclose.
The present invention provides a kind of method based on fingerprint recognition encryption strengthening system safety, including:Terminal, terminal are provided with Operating system, as shown in figure 1, method includes:
S1, user initiate logging request by operating system client to terminal, and logging request includes:Fingerprint recognition is encrypted Lock and the username and password to match respectively with fingerprint recognition encryption lock;
S2, terminal recognition fingerprint recognition encryption lock, and the port that user inputs user name and password is provided;
S3, terminal operating system are matched fingerprint recognition encryption lock with user name and password respectively;
S4, when fingerprint recognition encryption lock succeeds with user name and password match respectively, determine that user logins successfully.
Wherein, also wrapped after step operation system is matched fingerprint recognition encryption lock with user name and password respectively Include:When fingerprint recognition encryption lock and user name mismatch, or fingerprint recognition encryption lock and password mismatch, or fingerprint recognition encryption When lock mismatches with user name and password, locking system, user is forbidden to log in.
User initiates also to include before logging request by operating system client to terminal:User is in advance in the behaviour of terminal Make in system preserve fingerprint recognition encryption lock and, the username and password to match respectively with fingerprint recognition encryption lock.
A further embodiment of the present invention includes:The information registering server to be communicated with terminal data;
Step user initiates also to include before logging request by operating system client to terminal:User access information is noted Volume server, register personal information, fingerprint recognition encryption lock information, username and password;And fingerprint recognition is encrypted into lock information Respectively with registering personal information, username and password is mutually bound;After the completion of registration, information registering server issues the user with uniquely Fingerprint recognition encryption lock information, username and password;Information registering server by the personal information of user, be stored in information note In the database of volume server.The personal information of so user's registration is not stored in terminal, it is ensured that the peace of personal information Entirely.
In the present embodiment, user initiates logging request by operating system client to terminal;Terminal receives logging request Afterwards, the fingerprint recognition encryption lock of user, while terminal recognition fingerprint recognition encryption lock are locally being retrieved, and user is provided and inputs use The port of name in an account book and password;
User name and password whether there is, if being not present, access information registrar, in information registering server Obtain the fingerprint recognition encryption lock of user, user name and password;
Terminal operating system is matched fingerprint recognition encryption lock with user name and password respectively;When fingerprint recognition is encrypted When locking respectively with user name and password match success, determine that user logins successfully.
After determining that user logins successfully, the user fingerprints that information registering server erasing terminal obtains identify encryption lock, use Name in an account book and password;
When fingerprint recognition encryption lock and user name mismatch, or fingerprint recognition encryption lock are known with password mismatch, or fingerprint When other encryption lock mismatches with user name and password, locking system, user is forbidden to log in;Information registering server wipes terminal The user fingerprints identification encryption lock of acquisition, user name and password.
Do not store the personal information of user so in terminal, be finished and wiped in terminal, ensure the personal letter of user Breath safety.
In the present embodiment, after user logins successfully, after terminal receives the fingerprint recognition encryption lock that user inputs again, eventually Hold to provide the port that user inputs user name and password;
User's user name for being matched with fingerprint recognition encryption lock of input and password, terminal storage fingerprint recognition encryption lock and The username and password to match respectively with fingerprint recognition encryption lock;After user inputs user name and password again, to user name And password is inquired about.
After user determines the security of terminal, the user name and password that fingerprint recognition encryption lock matches can be stored in In terminal.
In the present embodiment, user name and password that user can be matched by terminal-pair fingerprint recognition encryption lock are repaiied Change, inquire about.It is that after user logins successfully, user to user name and password are modified wherein to change process;
Terminal according to the fingerprint recognition encryption lock of user and the user name to match respectively with fingerprint recognition encryption lock and Password, the first random number series is generated, the first random number series is combined with username and password respectively;
Terminal sends communication key request to information registering server, obtains the communication key of a user;
Terminal will obtain the communication key of the user, then enter respectively with the username and password with the first random number series Row combined ciphering, and form digital signature summary;
Digital signature summary in terminal is using RSA Algorithm respectively to the user with communication key and the first random number series Name and password, which are combined, to be digitally signed, and username and password after encryption and its digital signature summary are sent into information Registrar;
After information registering server receives information, sign test and decryption are carried out to the data received, and by after decryption Account user name and password preserve.
So user, then will be amended after the user name and password matched by terminal modifications fingerprint recognition encryption lock The user name and password of fingerprint recognition encryption lock matching are uploaded to information registering server.
Each embodiment is described by the way of progressive in this specification, what each embodiment stressed be and other The difference of embodiment, identical similar portion refers to mutually between each embodiment.
The foregoing description of the disclosed embodiments, professional and technical personnel in the field are enable to realize or using the present invention. A variety of modifications to these embodiments will be apparent for those skilled in the art, as defined herein General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, it is of the invention The embodiments shown herein is not intended to be limited to, and is to fit to and principles disclosed herein and features of novelty phase one The most wide scope caused.

Claims (8)

1. a kind of method based on fingerprint recognition encryption strengthening system safety, including:Terminal, terminal are provided with operating system, its It is characterised by, method includes:
User initiates logging request by operating system client to terminal, and logging request includes:Fingerprint recognition encryption lock and The username and password to match respectively with fingerprint recognition encryption lock;
Terminal recognition fingerprint recognition encryption lock, and the port that user inputs user name and password is provided;
Terminal operating system is matched fingerprint recognition encryption lock with user name and password respectively;
When fingerprint recognition encryption lock succeeds with user name and password match respectively, determine that user logins successfully.
2. the method according to claim 1 based on fingerprint recognition encryption strengthening system safety, it is characterised in that
Step operation system also includes after fingerprint recognition encryption lock is matched with user name and password respectively:When fingerprint is known Other encryption lock mismatches with user name, or fingerprint recognition encryption lock mismatches with password, or fingerprint recognition encryption lock and user name And password locking system, forbids user to log in when mismatching.
3. the method according to claim 1 based on fingerprint recognition encryption strengthening system safety, it is characterised in that
User initiates also to include before logging request by operating system client to terminal:User is in advance in the operation system of terminal In system preserve fingerprint recognition encryption lock and, the username and password to match respectively with fingerprint recognition encryption lock.
4. the method according to claim 1 based on fingerprint recognition encryption strengthening system safety, it is characterised in that including: The information registering server to be communicated with terminal data;
Step user initiates also to include before logging request by operating system client to terminal:User access information registration clothes Business device, register personal information, fingerprint recognition encryption lock information, username and password;And fingerprint recognition encryption lock information is distinguished With registering personal information, username and password is mutually bound;
After the completion of registration, information registering server issues the user with unique fingerprint recognition encryption lock information, username and password;
Information registering server by the personal information of user, be stored in the database of information registering server.
5. the method according to claim 4 based on fingerprint recognition encryption strengthening system safety, it is characterised in that
User initiates logging request by operating system client to terminal;
After terminal receives logging request, in the fingerprint recognition encryption lock of locally retrieval user, while terminal recognition fingerprint recognition adds Close lock, and the port that user inputs user name and password is provided;
User name and password whether there is, if being not present, access information registrar, be obtained in information registering server The fingerprint recognition encryption lock of user, user name and password;
Terminal operating system is matched fingerprint recognition encryption lock with user name and password respectively;When fingerprint recognition encryption lock point When not with user name and password match success, determine that user logins successfully.
6. the method according to claim 5 based on fingerprint recognition encryption strengthening system safety, it is characterised in that
After determining that user logins successfully, the user fingerprints that information registering server erasing terminal obtains identify encryption lock, user name And password;
When fingerprint recognition encryption lock and user name mismatch, or fingerprint recognition encryption lock add with password mismatch, or fingerprint recognition When close lock mismatches with user name and password, locking system, user is forbidden to log in;
The user fingerprints identification encryption lock that information registering server erasing terminal obtains, user name and password.
7. the method according to claim 5 based on fingerprint recognition encryption strengthening system safety, it is characterised in that Yong Hudeng After recording successfully,
After terminal receives the fingerprint recognition encryption lock that user inputs again, terminal is to provide user to input user name and password Port;
The user name and password, terminal storage fingerprint recognition encryption lock and difference that user's input matches with fingerprint recognition encryption lock The username and password to match with fingerprint recognition encryption lock;
After user inputs user name and password again, user name and password are inquired about.
8. the method according to claim 7 based on fingerprint recognition encryption strengthening system safety, it is characterised in that
After user logins successfully, user to user name and password are modified;
Terminal according to the fingerprint recognition encryption lock of user and the username and password to match respectively with fingerprint recognition encryption lock, The first random number series is generated, the first random number series is combined with username and password respectively;
Terminal sends communication key request to information registering server, obtains the communication key of a user;
Terminal will obtain the communication key of the user, then carry out group with the username and password with the first random number series respectively Encryption is closed, and forms digital signature summary;
Digital signature summary in terminal using RSA Algorithm respectively to the user name with communication key and the first random number series and Password, which is combined, to be digitally signed, and username and password after encryption and its digital signature summary are sent into information registering Server;
After information registering server receives information, the data that receive are carried out with sign test and decryption, and by the account after decryption Username and password preserves.
CN201711251499.3A 2017-12-01 2017-12-01 Method for enhancing system security based on fingerprint identification encryption Active CN107818255B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711251499.3A CN107818255B (en) 2017-12-01 2017-12-01 Method for enhancing system security based on fingerprint identification encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711251499.3A CN107818255B (en) 2017-12-01 2017-12-01 Method for enhancing system security based on fingerprint identification encryption

Publications (2)

Publication Number Publication Date
CN107818255A true CN107818255A (en) 2018-03-20
CN107818255B CN107818255B (en) 2020-08-18

Family

ID=61606526

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711251499.3A Active CN107818255B (en) 2017-12-01 2017-12-01 Method for enhancing system security based on fingerprint identification encryption

Country Status (1)

Country Link
CN (1) CN107818255B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110147658A (en) * 2019-04-16 2019-08-20 平安科技(深圳)有限公司 User information encipher-decipher method, system and computer equipment
CN110620781A (en) * 2019-09-27 2019-12-27 深圳市大头互动文化传播有限公司 User registration login management system based on game platform
CN115529163A (en) * 2022-08-25 2022-12-27 江苏电力信息技术有限公司 Login identification encryption method for digital business hall of electric power system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120331156A1 (en) * 2011-06-21 2012-12-27 Colpitts Cameron Wireless control system, methods and apparatus
CN103701774A (en) * 2013-12-03 2014-04-02 乐视网信息技术(北京)股份有限公司 Login method and device
CN103957202A (en) * 2014-04-22 2014-07-30 中国工商银行股份有限公司 Safety login method and system
CN105207992A (en) * 2015-08-17 2015-12-30 上海斐讯数据通信技术有限公司 Fingerprint management account system and method
US9253192B1 (en) * 2009-12-21 2016-02-02 Emc Corporation Pluggable login architecture and dynamic resource recognition

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9253192B1 (en) * 2009-12-21 2016-02-02 Emc Corporation Pluggable login architecture and dynamic resource recognition
US20120331156A1 (en) * 2011-06-21 2012-12-27 Colpitts Cameron Wireless control system, methods and apparatus
CN103701774A (en) * 2013-12-03 2014-04-02 乐视网信息技术(北京)股份有限公司 Login method and device
CN103957202A (en) * 2014-04-22 2014-07-30 中国工商银行股份有限公司 Safety login method and system
CN105207992A (en) * 2015-08-17 2015-12-30 上海斐讯数据通信技术有限公司 Fingerprint management account system and method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110147658A (en) * 2019-04-16 2019-08-20 平安科技(深圳)有限公司 User information encipher-decipher method, system and computer equipment
CN110620781A (en) * 2019-09-27 2019-12-27 深圳市大头互动文化传播有限公司 User registration login management system based on game platform
CN115529163A (en) * 2022-08-25 2022-12-27 江苏电力信息技术有限公司 Login identification encryption method for digital business hall of electric power system

Also Published As

Publication number Publication date
CN107818255B (en) 2020-08-18

Similar Documents

Publication Publication Date Title
US10680808B2 (en) 1:N biometric authentication, encryption, signature system
US9740849B2 (en) Registration and authentication of computing devices using a digital skeleton key
US20200358614A1 (en) Securing Transactions with a Blockchain Network
EP1571525B1 (en) A method, a hardware token, and a computer program for authentication
US8041954B2 (en) Method and system for providing a secure login solution using one-time passwords
KR20210072071A (en) Distributed Ledger for Encrypted Digital Identity
JP5147673B2 (en) Biometric authentication system and method
US20080120698A1 (en) Systems and methods for authenticating a device
US20080120707A1 (en) Systems and methods for authenticating a device by a centralized data server
CN110326251A (en) The system and method that the general dispersion solution of user is verified using cross validation feature are provided
US20120078798A1 (en) Systems and methods for transmitting financial account information
JP2005522775A (en) Information storage system
CN103929425B (en) A kind of identity registration, identity authentication method, equipment and system
CN108965222A (en) Identity identifying method, system and computer readable storage medium
CN107818255A (en) A kind of method based on fingerprint recognition encryption strengthening system safety
CN107920052A (en) A kind of encryption method and intelligent apparatus
US20070136589A1 (en) Identification and authentication system and method
CN110300971A (en) Telnet based on biological characteristic
US20230208637A1 (en) Key management method and apparatus
CN112039665A (en) Key management method and device
CN108737079B (en) Distributed quantum key management system and method
CN113205628B (en) Intelligent door lock control method and system based on biological feature recognition
CN116318617A (en) Medical rescue material charity donation method based on RFID and blockchain
CN108122108A (en) Mobile device authentication system and mobile equipment authentication method
US11516014B2 (en) Methods, systems, and apparatuses for cryptographic wireless detection and authentication of fluids

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200722

Address after: 215100 No. 1 Guanpu Road, Guoxiang Street, Wuzhong Economic Development Zone, Suzhou City, Jiangsu Province

Applicant after: SUZHOU LANGCHAO INTELLIGENT TECHNOLOGY Co.,Ltd.

Address before: 450000 Henan province Zheng Dong New District of Zhengzhou City Xinyi Road No. 278 16 floor room 1601

Applicant before: ZHENGZHOU YUNHAI INFORMATION TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant