CN109766681A - User ID authentication method, device, fingerprint logger and readable storage medium storing program for executing - Google Patents

User ID authentication method, device, fingerprint logger and readable storage medium storing program for executing Download PDF

Info

Publication number
CN109766681A
CN109766681A CN201910027663.5A CN201910027663A CN109766681A CN 109766681 A CN109766681 A CN 109766681A CN 201910027663 A CN201910027663 A CN 201910027663A CN 109766681 A CN109766681 A CN 109766681A
Authority
CN
China
Prior art keywords
fingerprint
matching result
user
target
fingerprint characteristic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910027663.5A
Other languages
Chinese (zh)
Inventor
郑茳
肖佐楠
时贵均
匡启和
王廷平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CCore Technology Suzhou Co Ltd
Original Assignee
CCore Technology Suzhou Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CCore Technology Suzhou Co Ltd filed Critical CCore Technology Suzhou Co Ltd
Priority to CN201910027663.5A priority Critical patent/CN109766681A/en
Publication of CN109766681A publication Critical patent/CN109766681A/en
Pending legal-status Critical Current

Links

Landscapes

  • Collating Specific Patterns (AREA)
  • Image Input (AREA)

Abstract

The invention discloses a kind of user ID authentication methods, method includes the following steps: using the fingerprint image of fingerprint sensor acquisition target user, and the fingerprint characteristic for the image that takes the fingerprint;Fingerprint characteristic is compared with legal fingerprint characteristic, obtains matching result;Matching result is encrypted, object matching result is obtained;Object matching result is sent to target terminal, authentication is carried out to target user so that target terminal is based on object matching result.This method is not necessarily to user fingerprints being passed to target terminal, can ensure the safety of user fingerprints data.The invention also discloses a kind of subscriber authentication device, fingerprint logger and readable storage medium storing program for executing, have corresponding technical effect.

Description

User ID authentication method, device, fingerprint logger and readable storage medium storing program for executing
Technical field
The present invention relates to computer security technical fields, log in more particularly to user ID authentication method, device, fingerprint Device and readable storage medium storing program for executing.
Background technique
With the maturation development of biotechnology, in computer safety field of today, this biological characteristic of fingerprint is in user Safety and convenience are able to ascend in authentication.Each manufacturer computer also has launched the height with finger prints processing chip Hold computer.
The common approach of the authentication with finger prints processing chip is at present: utilizing has the hot-swappable of USB interface Fingerprint logger acquires finger print data, then reaches finger print data in computer by USB interface, then carries out fingerprint by system Registration and matching operation.Collected finger print data is transferred directly to the scheme of computer, is easy to be broken easily by USB monitoring of software Solution steals finger print data, and safety is poor.
In conclusion the problems such as how ensureing the safety of finger print data during subscriber authentication, is current sheet Field technical staff technical problem urgently to be solved.
Summary of the invention
The object of the present invention is to provide user ID authentication method, device, fingerprint logger and readable storage medium storing program for executing, with The safety of finger print data is ensured during subscriber authentication.
In order to solve the above technical problems, the invention provides the following technical scheme:
A kind of user ID authentication method, comprising:
Using the fingerprint image of fingerprint sensor acquisition target user, and extract the fingerprint characteristic of the fingerprint image;
The fingerprint characteristic is compared with legal fingerprint characteristic, obtains matching result;
The matching result is encrypted, object matching result is obtained;
The object matching result is sent to target terminal, so that the target terminal is based on the object matching result Authentication is carried out to the target user.
Preferably, the matching result is encrypted, obtains object matching result, comprising:
Random number is obtained, the matching result is encrypted using the random number as encryption parameter, obtains target pair Compare result.
Preferably, the matching result is encrypted, obtains object matching result, comprising:
The matching result is encrypted in the way of symmetric cryptography, obtains the object matching result.
Preferably, the fingerprint characteristic is compared with legal fingerprint characteristic, obtains matching result, comprising:
Calculate separately the similarity of the fingerprint characteristic Yu each legal fingerprint characteristic;
It, will be corresponding with the target similarity described legal using the maximum similarity of numerical value as target similarity Fingerprint characteristic is as the legal fingerprint characteristic of target;
When the target similarity is greater than preset threshold, the matching result is successful match, and is read and the mesh Legal fingerprint characteristic is marked to be added in the matching result with the account information of mapping relations.
Preferably, the target terminal be based on the object matching result to the target user carry out authentication it Afterwards, further includes:
Receive the authentication result of the target terminal feedback;
When the authentication result is to be verified, it is stored in the fingerprint characteristic as the legal fingerprint characteristic In EFlash.
Preferably, using the fingerprint characteristic as in the legal fingerprint characteristic deposit EFlash, comprising:
The legal fingerprint characteristic is encrypted, and the encrypted legal fingerprint characteristic is stored in the EFlash In.
Preferably, the object matching result is sent to target terminal, comprising:
Using with PC there is the USB communication link of communication connection the object matching result is sent to the target end End.
A kind of subscriber authentication device, comprising:
Finger print characteristic abstract module, for the fingerprint image using fingerprint sensor acquisition target user, and described in extraction The fingerprint characteristic of fingerprint image;
Matching result obtains module, for the fingerprint characteristic to be compared with legal fingerprint characteristic, obtains matching knot Fruit;
Object matching result obtains module, for encrypting to the matching result, obtains object matching result;
Object matching result sending module, for the object matching result to be sent to target terminal, so as to the mesh It marks terminal and is based on the object matching result to target user progress authentication.
A kind of fingerprint logger, comprising:
Main control chip, fingerprint sensor and data transmission interface;Wherein, fingerprint sensor, for acquiring the fingerprint of user Image;The data transmission interface, for establishing communication link with target terminal;The main control chip includes readable storage medium storing program for executing And processing component, the readable storage medium storing program for executing is for storing computer program, and the processing component is for executing the computer It realizes when program such as the step of above-mentioned user ID authentication method.
A kind of readable storage medium storing program for executing is stored with computer program, the computer program quilt on the readable storage medium storing program for executing The step of processor realizes above-mentioned user ID authentication method when executing.
Using method provided by the embodiment of the present invention, using the fingerprint image of fingerprint sensor acquisition target user, and Take the fingerprint the fingerprint characteristic of image;Fingerprint characteristic is compared with legal fingerprint characteristic, obtains matching result;Matching is tied Fruit is encrypted, and object matching result is obtained;Object matching result is sent to target terminal, so that target terminal is based on target Matching result carries out authentication to target user.
When carrying out authentication, using the fingerprint image of fingerprint sensor acquisition target user, finger is then extracted The fingerprint characteristic of print image.Fingerprint characteristic is compared with legal fingerprint characteristic, obtains matching result.Then to matching result It is encrypted, obtains the object matching result of ciphertext form.Object matching result is sent to target terminal, in this way, target is whole End can carry out authentication to target user based on object matching result.As it can be seen that in entire authentication process itself, without that will use The finger print data at family is passed to target terminal, can carry out authentication by this unique biological characteristic based on fingerprint, be transferred to The comparison result for simply meaning to line feature Yu legal fingerprint characteristic of target terminal, not finger print data, even if object matching result Intercepted and decoding, is also unable to get the finger print data of target user.Refer to relative to currently with fingerprint sensor acquisition user User fingerprints data are simultaneously passed to the identity verification mode that target terminal is carried out by line data, and the present invention is without passing user fingerprints Enter target terminal, can ensure the safety of user fingerprints data.
In addition, incoming target terminal is only object matching as a result, data volume is few relative to finger print data, transmission speed is more Fastly, authentication efficiency also can be improved.
Correspondingly, the embodiment of the invention also provides subscriber authentications corresponding with above-mentioned user ID authentication method Device, fingerprint logger and readable storage medium storing program for executing, have above-mentioned technique effect, details are not described herein.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is a kind of implementation flow chart of user ID authentication method in the embodiment of the present invention;
Fig. 2 is a kind of finger print information register flow path schematic diagram in the embodiment of the present invention;
Fig. 3 is that system fingerprint matches flow diagram in the embodiment of the present invention;
Fig. 4 is a kind of structural schematic diagram of subscriber authentication device in the embodiment of the present invention;
Fig. 5 is a kind of structural schematic diagram of fingerprint logger in the embodiment of the present invention.
Specific embodiment
In order to enable those skilled in the art to better understand the solution of the present invention, with reference to the accompanying drawings and detailed description The present invention is described in further detail.Obviously, described embodiments are only a part of the embodiments of the present invention, rather than Whole embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not making creative work premise Under every other embodiment obtained, shall fall within the protection scope of the present invention.
Embodiment one:
Referring to FIG. 1, Fig. 1 is a kind of flow chart of user ID authentication method in the embodiment of the present invention, this method can be answered With in fingerprint logger, fingerprint logger and target terminal are established and communicated to connect, when user demand logs in target terminal, just It can will be by fingerprint logger typing finger print information to carry out authentication.
The auth method the following steps are included:
S101, the fingerprint image that target user is acquired using fingerprint sensor, and the fingerprint characteristic for the image that takes the fingerprint.
Wherein, fingerprint sensor (fingerprint Sensor) is the Primary Component for realizing fingerprint automatic collection.Implement in the present invention In example, fingerprint sensor can collect fingerprint image, unlimited to its model and working principle etc., therefore can be selected Optical fingerprint sensor, semicoductor capacitor sensor, semiconductor heat dependent sensor, semiconductor pressure sensor, supersonic sensing The common fingerprint sensor such as device and radio frequency sensor, the work of this is no longer going to repeat them fingerprint sensor acquisition fingerprint image Make principle.
After fingerprint logger collects the fingerprint image of target user using its included fingerprint sensor, it can extract The fingerprint characteristic of fingerprint image.Specifically, conventional pretreatment can be also carried out to fingerprint image before the feature that takes the fingerprint, Such as fingerprint image is calibrated, Quality estimation (such as true and false finger judges) is carried out to fingerprint image.Different fingerprint sensings Pretreatment corresponding to device can the difference of working principle or performance parameter based on fingerprint sensor and it is different, correspondingly, extraction The fingerprint characteristic of fingerprint image is also closely bound up with fingerprint sensor, the specific extraction process of the fingerprint characteristic for the image that takes the fingerprint It can be found in common Finger print characteristic abstract process, this is no longer going to repeat them.
S102, fingerprint characteristic is compared with legal fingerprint characteristic, obtains matching result.
In embodiments of the present invention, before logging in target terminal using fingerprint logger or carrying out authentication, may be used also Registering fingerprint information, account information in fingerprint logger.Specifically, it is special to be stored in legal fingerprint in fingerprint logger Sign, can store one or more legal fingerprint characteristic in a fingerprint logger.
When an only legal fingerprint characteristic, fingerprint characteristic can be compared with the legal fingerprint characteristic, will be compared To result directly as matching result.The comparison result shows whether fingerprint characteristic and legal fingerprint characteristic are same user Fingerprint.
When there are more than one legal fingerprint characteristic, can by fingerprint characteristic successively with each legal fingerprint characteristic It is compared, is then based on multiple comparison results and determines matching result.Specifically, can be determined in multiple legal fingerprint characteristics A possibility that one legal fingerprint characteristic of target, the legal fingerprint characteristic and fingerprint characteristic are from the fingerprint of the same user is most Greatly.The comparison result being then based between the legal fingerprint of target and fingerprint characteristic determines matching result.
Preferably, it in order to improve the portability and versatility of fingerprint logger, can be also stored in advance in fingerprint logger The corresponding relationship of multiple groups legal fingerprint characteristic and target terminal.In this way, can allow that there are multiple conjunctions on a target terminal Method user can also run its legal multiple target terminal of login for a legitimate user certainly.Fingerprint characteristic comparison is being carried out, Obtaining matching result then may particularly include:
Step 1: calculating separately the similarity of fingerprint characteristic Yu each legal fingerprint characteristic;
Step 2: using the maximum similarity of numerical value as target similarity, it will legal fingerprint corresponding with target similarity Feature is as the legal fingerprint characteristic of target;
Step 3: matching result is successful match when target similarity is greater than preset threshold, and reading is legal with target There is fingerprint characteristic the account information of mapping relations to be added in matching result.
For ease of description, above three step is combined below and is illustrated.
The similarity for calculating separately fingerprint characteristic Yu each legal fingerprint characteristic first, is then ranked up similarity, Select the maximum similarity of numerical value as target similarity.Then will legal fingerprint characteristic relatively corresponding with target as target Legal fingerprint characteristic.When target similarity is greater than preset threshold, then matching result is successful match, and reading is legal with target There is fingerprint characteristic the account information of mapping relations to be added in matching result, to distinguish the legal use of different target terminals Family avoids the occurrence of and obscures.Certainly, when target similarity is less than or equal to preset threshold, then matching result is that it fails to match, this When can be without adding corresponding account information in matching result.That is, in embodiments of the present invention, matching result can be roughly divided into " successful match+account information " or " it fails to match " both modes.
S103, matching result is encrypted, obtains object matching result.
In view of the data volume of matching result is less, it is easy to be decrypted and then fingerprint logger is caused to perform practically no function, it may It will lead to the authentication that illegal user successfully passes target terminal.To solve this problem, target end is being sent data to Before end, matching result can also be encrypted, to improve the reliability of authentication.Herein, encrypted matching knot Fruit is referred to as object matching result.Encryption Algorithm used by encrypting can be common Encryption Algorithm, such as the ease of decryption Symmetric cryptography mode.Matching result is encrypted in the way of symmetric cryptography, obtains object matching result.Wherein, right Claim cipher mode that common DES algorithm, 3DES algorithm, TDEA algorithm, Blowfish algorithm, RC5 algorithm and IDEA can be selected to calculate Any one in the symmetric encipherment algorithms such as method.
It preferably, can also be when being encrypted to matching result, using random number as encryption in order to avoid Replay Attack Parameter.Specifically, obtaining random number first i.e. when being encrypted, matching result is carried out using random number as encryption parameter Encryption obtains targeted contrast result.Wherein, the mode for obtaining random number can be by calling common random number generation function.Such as This when encrypting to matching result, all with random number, can resist Replay Attack in each authentication process itself, it is ensured that Safety.
S104, object matching result is sent to target terminal, so that target terminal is based on object matching result to target User carries out authentication.
After obtaining object matching result, object matching result can be sent to target terminal.Wherein, available and PC Object matching result is sent to target terminal by the USB communication link with communication connection.It certainly, can also be in fingerprint logger Wireless communication module is set, such as object matching result is sent to target terminal by bluetooth, WiFi wireless communication module.
After target terminal receives object matching result, identity can be carried out to target user based on object matching result Verifying.Specifically, directly determining and whether being verified, or further judge account if object matching result is successful match Whether information matches with the legal account information of the machine, and authentication passes through if matching;If object matching result is that it fails to match, It then can directly determine that authentication fails.
Preferably, in order to improve the efficiency of authentication, can also constantly to the legal fingerprint characteristic in fingerprint logger into Row updates or supplement.Specifically, may be used also after target terminal is based on object matching result to target user's progress authentication To receive the authentication result of target terminal feedback;When authentication result is to be verified, using fingerprint characteristic as conjunction Method fingerprint characteristic is stored in EFlash.Wherein, EFlash is embedded flash memory.Preferably, fingerprint login is stored in order to improve The safety of fingerprint characteristic in device can also be right during using fingerprint characteristic as in legal fingerprint characteristic deposit EFlash Legal fingerprint characteristic is encrypted, and will be in encrypted legal fingerprint characteristic deposit EFlash.
Using method provided by the embodiment of the present invention, using the fingerprint image of fingerprint sensor acquisition target user, and Take the fingerprint the fingerprint characteristic of image;Fingerprint characteristic is compared with legal fingerprint characteristic, obtains matching result;Matching is tied Fruit is encrypted, and object matching result is obtained;Object matching result is sent to target terminal, so that target terminal is based on target Matching result carries out authentication to target user.
When carrying out authentication, using the fingerprint image of fingerprint sensor acquisition target user, finger is then extracted The fingerprint characteristic of print image.Fingerprint characteristic is compared with legal fingerprint characteristic, obtains matching result.Then to matching result It is encrypted, obtains the object matching result of ciphertext form.Object matching result is sent to target terminal, in this way, target is whole End can carry out authentication to target user based on object matching result.As it can be seen that in entire authentication process itself, without that will use The finger print data at family is passed to target terminal, can carry out authentication by this unique biological characteristic based on fingerprint, be transferred to The comparison result for simply meaning to line feature Yu legal fingerprint characteristic of target terminal, not finger print data, even if object matching result Intercepted and decoding, is also unable to get the finger print data of target user.Refer to relative to currently with fingerprint sensor acquisition user User fingerprints data are simultaneously passed to the identity verification mode that target terminal is carried out by line data, and the present invention is without passing user fingerprints Enter target terminal, can ensure the safety of user fingerprints data.
In addition, incoming target terminal is only object matching as a result, data volume is few relative to finger print data, transmission speed is more Fastly, authentication efficiency also can be improved.
Embodiment two:
To more fully understand auth method provided by the embodiment of the present invention convenient for those skilled in the art, tie below For closing specific application scenarios, it is provided for the embodiments of the invention auth method and is described in detail.
It is specially below PC with target terminal, authentication is for logging in PC operating system.In authentication process itself It mainly include fingerprint logger and PC.
Wherein, the fingerprint logger of the USB interface of hot-swappable design, it is easy to carry, it can be in more notebooks or platform Formula electromechanics brain uses, and is integrated into notebook if necessary, can also be by notebook hardware design at notebook and fingerprint logger USB Interface connection.Using USB general-purpose interface, it can be used for laptop and desktop computer simultaneously, portability and versatile.It will use The fingerprint characteristic of family registration is stored encrypted in inside fingerprint logger, only returns to registering result by USB interface when registered fingerprint, USB communication link also uses cipher mode, and preventing can Replay Attack.Fingerprint logger internal cryptographic stores corresponding fingerprint account Information, it is ensured that the fingerprint is only used for logging in the account of the user.When to PC operating system registered fingerprint, the biography of fingerprint logger After sensor collects finger print data, by a series of processing (pretreatment in seeing above), the characteristic value of fingerprint is encrypted It is stored in after processing in internal EFlash, when the result of registered fingerprint then being returned to PC operating system, USB communication link Also it is handled by the way of symmetric cryptography, preventing can Replay Attack.In addition, also needing preservation fingerprint corresponding inside fingerprint logger PC operating system account information.After fingerprint logger logs in the account fingerprint matching of PC operating system, the return of fingerprint logger refers to The encrypted result of the whether matched result of line and corresponding account information, it is decrypted in the driving of PC operating system, according to fingerprint It matches the result returned and account information judges whether energy logon account.
The detailed process of login system based on auth method provided by the embodiment of the present invention includes:
When logging in system by user, finger is pressed on the sensor of fingerprint logger, fingerprint logger judges this and refers to Whether line matches with the fingerprint in the fingerprint base of storage inside, if mismatched, directly passes through USB interface to PC operating system Fingerprint is returned to mismatch, if with some fingerprint matching in fingerprint base, it can be by matched result and the corresponding PC of matching fingerprint The driving of PC operating system is transmitted to by USB interface after the encryption of operating system account information.All band random number in each encryption parameter, It can be with preventing playback attack, it is ensured that safety.
Wherein, fingerprint logger can be used USB interface and connect with PC, logger itself include a safe main control chip with Fingerprint sensor.Fingerprint sensor is mainly used to acquire fingerprint image, and safe main control chip is mainly used for handing over the information at the end PC Mutually, the finger print data of processing sensor acquisition extracts fingerprint feature point, and fingerprint register and fingerprint matching etc. operate, in addition, Safe main control chip is provided from hardware to fingerprint image, the safeguard protection of the privacy of user data such as fingerprint feature point.
In order to ensure the fingerprint stored in the account and fingerprint logger of system is one-to-one, it should guarantee system account The fingerprint of family registration can only log in the account, guarantee that the fingerprint logger used when there was only registered fingerprint could log in again and be System, other fingerprint loggers are unable to the account of login system, so needing the account ID of system and fingerprint logger ID (or the unique identification labels such as chip serial number, each fingerprint logger have unique ID) is bound, and is completed one-to-one Relationship.Specifically, referring to FIG. 2, Fig. 2 be the embodiment of the present invention in a kind of finger print information register flow path schematic diagram, finger can be passed through Line registration realizes that fingerprint register includes;When sending registered fingerprint order, the information such as operating system corresponding account ID are sent together Give fingerprint logger, system drive and fingerprint logger consult session key;Wherein, the session key and operating system account ID It is related to fingerprint logger ID (or hardware sequence number);Last fingerprint logger returns to result (success or the mistake of fingerprint register It loses).
Referring to FIG. 3, Fig. 3 is that system fingerprint matching flow diagram can be tested in system login in the embodiment of the present invention Card fingerprint logger in sensor acquisition fingerprint whether match, at this time if it does, fingerprint logger can by the ID of system with The other information of fingerprint by session key encrypted result issue PC machine (in order to prevent can Replay Attack, return the result and add Random number), correspondence system account information and finger print information are transmitted to system, are by system drive decrypted result if successful match Unlocking account login system of uniting directly returns to error result if matching is unsuccessful.
The private informations such as the fingerprint of user can be stored in internal security chip by the fingerprint logger.Fingerprint logger with Data communication between PC is carried out by the way of data encryption, the session encryption key and operating system account information of use It is related to logger internal control chip hardware ID.The driving of fingerprint logger can be verified after fingerprint matching inside operating system Whether the account information of system matches with the hardware ID of fingerprint logger, it is ensured that and system account and fingerprint logger correspond, Guarantee user account information privacy.That is, the PC operating system using auth method provided by the embodiment of the present invention is stepped on Record process not only can avoid leakage user fingerprints data, also can further improve the reliability and safety of login process.
Embodiment three:
Corresponding to above method embodiment, the embodiment of the invention also provides a kind of subscriber authentication devices, hereafter The subscriber authentication device of description can correspond to each other reference with above-described user ID authentication method.
Shown in Figure 4, which comprises the following modules:
Finger print characteristic abstract module 101 for the fingerprint image using fingerprint sensor acquisition target user, and is extracted and is referred to The fingerprint characteristic of print image;
Matching result obtains module 102, for fingerprint characteristic to be compared with legal fingerprint characteristic, obtains matching knot Fruit;
Object matching result obtains module 103, for encrypting to matching result, obtains object matching result;
Object matching result sending module 104, for object matching result to be sent to target terminal, so as to target terminal Authentication is carried out to target user based on object matching result.
Using device provided by the embodiment of the present invention, using the fingerprint image of fingerprint sensor acquisition target user, and Take the fingerprint the fingerprint characteristic of image;Fingerprint characteristic is compared with legal fingerprint characteristic, obtains matching result;Matching is tied Fruit is encrypted, and object matching result is obtained;Object matching result is sent to target terminal, so that target terminal is based on target Matching result carries out authentication to target user.
When carrying out authentication, using the fingerprint image of fingerprint sensor acquisition target user, finger is then extracted The fingerprint characteristic of print image.Fingerprint characteristic is compared with legal fingerprint characteristic, obtains matching result.Then to matching result It is encrypted, obtains the object matching result of ciphertext form.Object matching result is sent to target terminal, in this way, target is whole End can carry out authentication to target user based on object matching result.As it can be seen that in entire authentication process itself, without that will use The finger print data at family is passed to target terminal, can carry out authentication by this unique biological characteristic based on fingerprint, be transferred to The comparison result for simply meaning to line feature Yu legal fingerprint characteristic of target terminal, not finger print data, even if object matching result Intercepted and decoding, is also unable to get the finger print data of target user.Refer to relative to currently with fingerprint sensor acquisition user User fingerprints data are simultaneously passed to the identity verification mode that target terminal is carried out by line data, and the present invention is without passing user fingerprints Enter target terminal, can ensure the safety of user fingerprints data.
In addition, incoming target terminal is only object matching as a result, data volume is few relative to finger print data, transmission speed is more Fastly, authentication efficiency also can be improved.
In a kind of specific embodiment of the invention, object matching result obtains module 103, is specifically used for obtaining random Number, encrypts matching result using random number as encryption parameter, obtains targeted contrast result.
In a kind of specific embodiment of the invention, object matching result obtains module 103, is specifically used for using symmetrical Cipher mode encrypts matching result, obtains object matching result.
In a kind of specific embodiment of the invention, matching result obtains module 102, specifically for calculating separately fingerprint The similarity of feature and each legal fingerprint characteristic;It, will be similar to target using the maximum similarity of numerical value as target similarity Corresponding legal fingerprint characteristic is spent as the legal fingerprint characteristic of target;When target similarity is greater than preset threshold, matching result For successful match, and reading with the legal fingerprint characteristic of target there is the account information of mapping relations to be added in matching result.
In a kind of specific embodiment of the invention, further includes:
Legal fingerprint characteristic adding module carries out identity to target user for being based on object matching result in target terminal After verifying, the authentication result of target terminal feedback is received;When authentication result is to be verified, by fingerprint characteristic As in legal fingerprint characteristic deposit EFlash.
In a kind of specific embodiment of the invention, legal fingerprint characteristic adding module is specifically used for legal fingerprint Feature is encrypted, and will be in encrypted legal fingerprint characteristic deposit EFlash.
In a kind of specific embodiment of the invention, object matching result sending module 104 is specifically used for utilization and PC Object matching result is sent to target terminal by the USB communication link with communication connection.
Example IV:
It is described below the embodiment of the invention also provides a kind of fingerprint logger corresponding to above method embodiment A kind of fingerprint logger can correspond to each other reference with a kind of above-described user ID authentication method.
Shown in Figure 5, which includes:
Main control chip 301, fingerprint sensor 302 and data transmission interface 303;Wherein, fingerprint sensor is used for acquiring The fingerprint image at family;Data transmission interface, for establishing communication link with target terminal;Main control chip includes readable storage medium storing program for executing And processing component, readable storage medium storing program for executing are realized such as when processing component is for executing computer program for storing computer program The step of above-mentioned user ID authentication method.
In order to improve processing speed, also can be selected with the main control chip for accelerating device.User identity as described above Step in verification method can be realized that is, the fingerprint logger has above-mentioned subscriber authentication by the structure of fingerprint logger The technical effect of method, details are not described herein.
Wherein, USB interface design can be used in data transmission interface, promotes Portability;With common USB fingerprint logger phase Than fingerprint logger provided by the embodiment of the present invention ensures the safety of fingerprint private data: common USB fingerprint logger Collected finger print data is directly passed through into USB transmission to operating system, the private datas such as user fingerprints are easy to be cracked, this The private datas such as fingerprint are directly stored in logger safety chip by fingerprint logger provided by inventive embodiments, extraneous nothing Method cracks to obtain the data.In addition, consult session key (session key and the account between fingerprint logger and operating system Information, hardware ID are related), the mode of data encryption is transmitted to guarantee the safety of communication, prevents extraneous attack.Operating system Each account information is bound with fingerprint logger hardware ID, it is ensured that system account and fingerprint logger correspond, and guarantee to use Family account information privacy.
Embodiment five:
Corresponding to above method embodiment, the embodiment of the invention also provides a kind of readable storage medium storing program for executing, are described below A kind of readable storage medium storing program for executing can correspond to each other reference with a kind of above-described user ID authentication method.
A kind of readable storage medium storing program for executing is stored with computer program on readable storage medium storing program for executing, and computer program is held by processor The step of user ID authentication method of above method embodiment is realized when row.
The readable storage medium storing program for executing be specifically as follows USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), the various program storage generations such as random access memory (Random Access Memory, RAM), magnetic or disk The readable storage medium storing program for executing of code.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These Function is implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Profession Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered Think beyond the scope of this invention.

Claims (10)

1. a kind of user ID authentication method characterized by comprising
Using the fingerprint image of fingerprint sensor acquisition target user, and extract the fingerprint characteristic of the fingerprint image;
The fingerprint characteristic is compared with legal fingerprint characteristic, obtains matching result;
The matching result is encrypted, object matching result is obtained;
The object matching result is sent to target terminal, so that the target terminal is based on the object matching result to institute It states target user and carries out authentication.
2. user ID authentication method according to claim 1, which is characterized in that the matching result is encrypted, Obtain object matching result, comprising:
Random number is obtained, the matching result is encrypted using the random number as encryption parameter, obtains targeted contrast knot Fruit.
3. user ID authentication method according to claim 1, which is characterized in that the matching result is encrypted, Obtain object matching result, comprising:
The matching result is encrypted in the way of symmetric cryptography, obtains the object matching result.
4. user ID authentication method according to claim 1, which is characterized in that by the fingerprint characteristic and legal fingerprint Feature is compared, and obtains matching result, comprising:
Calculate separately the similarity of the fingerprint characteristic Yu each legal fingerprint characteristic;
It, will the legal fingerprint corresponding with the target similarity using the maximum similarity of numerical value as target similarity Feature is as the legal fingerprint characteristic of target;
When the target similarity is greater than preset threshold, the matching result is successful match, and reads and close with the target There is method fingerprint characteristic the account information of mapping relations to be added in the matching result.
5. user ID authentication method according to claim 1, which is characterized in that be based on the mesh in the target terminal After matching result is marked to target user progress authentication, further includes:
Receive the authentication result of the target terminal feedback;
When the authentication result is to be verified, it is stored in the fingerprint characteristic as the legal fingerprint characteristic In EFlash.
6. user ID authentication method according to claim 5, which is characterized in that using the fingerprint characteristic as the conjunction Method fingerprint characteristic is stored in EFlash, comprising:
The legal fingerprint characteristic is encrypted, and the encrypted legal fingerprint characteristic is stored in the EFlash.
7. user ID authentication method according to any one of claims 1 to 6, which is characterized in that by the object matching As a result it is sent to target terminal, comprising:
Using with PC there is the USB communication link of communication connection the object matching result is sent to the target terminal.
8. a kind of subscriber authentication device characterized by comprising
Finger print characteristic abstract module for the fingerprint image using fingerprint sensor acquisition target user, and extracts the fingerprint The fingerprint characteristic of image;
Matching result obtains module, for the fingerprint characteristic to be compared with legal fingerprint characteristic, obtains matching result;
Object matching result obtains module, for encrypting to the matching result, obtains object matching result;
Object matching result sending module, for the object matching result to be sent to target terminal, so that the target is whole End group carries out authentication to the target user in the object matching result.
9. a kind of fingerprint logger characterized by comprising
Main control chip, fingerprint sensor and data transmission interface;Wherein, fingerprint sensor, for acquiring the fingerprint image of user; The data transmission interface, for establishing communication link with target terminal;The main control chip includes readable storage medium storing program for executing and place Component is managed, the readable storage medium storing program for executing is for storing computer program, and the processing component is for executing the computer program Shi Shixian is as described in any one of claim 1 to 7 the step of user ID authentication method.
10. a kind of readable storage medium storing program for executing, which is characterized in that be stored with computer program, the meter on the readable storage medium storing program for executing It is realized when calculation machine program is executed by processor as described in any one of claim 1 to 7 the step of user ID authentication method.
CN201910027663.5A 2019-01-11 2019-01-11 User ID authentication method, device, fingerprint logger and readable storage medium storing program for executing Pending CN109766681A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910027663.5A CN109766681A (en) 2019-01-11 2019-01-11 User ID authentication method, device, fingerprint logger and readable storage medium storing program for executing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910027663.5A CN109766681A (en) 2019-01-11 2019-01-11 User ID authentication method, device, fingerprint logger and readable storage medium storing program for executing

Publications (1)

Publication Number Publication Date
CN109766681A true CN109766681A (en) 2019-05-17

Family

ID=66453828

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910027663.5A Pending CN109766681A (en) 2019-01-11 2019-01-11 User ID authentication method, device, fingerprint logger and readable storage medium storing program for executing

Country Status (1)

Country Link
CN (1) CN109766681A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110726210A (en) * 2019-10-17 2020-01-24 珠海格力电器股份有限公司 Air conditioner control method and device, air conditioner and air conditioning system
CN111090844A (en) * 2019-11-11 2020-05-01 北京握奇智能科技有限公司 Windows local login method and system based on biological recognition
CN112356327A (en) * 2020-10-30 2021-02-12 重庆工程职业技术学院 Processing table for jewelry processing

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104143219A (en) * 2014-07-18 2014-11-12 浙江工业大学 Checking-in method and system based on Wi-Fi fingerprints
CN104778393A (en) * 2015-04-16 2015-07-15 电子科技大学 Security fingerprint identification method for intelligent terminal
CN105096430A (en) * 2015-08-31 2015-11-25 宇龙计算机通信科技(深圳)有限公司 Car door open control method, device and system
CN105959287A (en) * 2016-05-20 2016-09-21 中国银联股份有限公司 Biological feature based safety certification method and device
CN107105415A (en) * 2017-06-07 2017-08-29 四川长虹电器股份有限公司 A kind of mobile unit user registration and the System and method for of apparatus bound

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104143219A (en) * 2014-07-18 2014-11-12 浙江工业大学 Checking-in method and system based on Wi-Fi fingerprints
CN104778393A (en) * 2015-04-16 2015-07-15 电子科技大学 Security fingerprint identification method for intelligent terminal
CN105096430A (en) * 2015-08-31 2015-11-25 宇龙计算机通信科技(深圳)有限公司 Car door open control method, device and system
CN105959287A (en) * 2016-05-20 2016-09-21 中国银联股份有限公司 Biological feature based safety certification method and device
CN107105415A (en) * 2017-06-07 2017-08-29 四川长虹电器股份有限公司 A kind of mobile unit user registration and the System and method for of apparatus bound

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110726210A (en) * 2019-10-17 2020-01-24 珠海格力电器股份有限公司 Air conditioner control method and device, air conditioner and air conditioning system
CN111090844A (en) * 2019-11-11 2020-05-01 北京握奇智能科技有限公司 Windows local login method and system based on biological recognition
CN112356327A (en) * 2020-10-30 2021-02-12 重庆工程职业技术学院 Processing table for jewelry processing

Similar Documents

Publication Publication Date Title
CN103201998B (en) For the protection of the data processing of the local resource in mobile device
CN107079034B (en) Identity authentication method, terminal equipment, authentication server and electronic equipment
ES2818199T3 (en) Security verification method based on a biometric characteristic, a client terminal and a server
CN103279411B (en) Enter the method and system of application program based on fingerprint recognition
US20140093144A1 (en) More-Secure Hardware Token
US20160323272A1 (en) Method using a single authentication device to authenticate a user to a service provider among a plurality of service providers and device for performing such a method
CN105591744B (en) A kind of genuine cyber identification authentication method and system
CN104618117B (en) The identification authentication system and method for smart card device based on Quick Response Code
CN103546289B (en) USB (universal serial bus) Key based secure data transmission method and system
CN105933280A (en) Identity authentication method and system
CN106612180A (en) Method and device for realizing session identifier synchronization
CN109766681A (en) User ID authentication method, device, fingerprint logger and readable storage medium storing program for executing
US9065806B2 (en) Internet based security information interaction apparatus and method
CN107426723A (en) Terminal document encryption method, terminal document decryption method and terminal
CN106534171B (en) Security authentication method, device and terminal
CN101140605A (en) Data safety reading method and safety storage apparatus thereof
RU2015114703A (en) TELECOMMUNICATION CHIP CARD
CN106789024A (en) A kind of remote de-locking method, device and system
CN109214221B (en) Authentication method of identity card reader, upper computer and identity card reader
CN113761488A (en) Content network copyright tracing encryption system and encryption method
CN103368736B (en) Business information encryption, decryption method and device
CN103347248B (en) A kind of based on identity identifying method trans-regional on handheld terminal
CN109831782B (en) Safety transmission verification method for electronic card information
CN105072136B (en) A kind of equipment room safety certifying method and system based on virtual drive
JP6167667B2 (en) Authentication system, authentication method, authentication program, and authentication apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
CB02 Change of applicant information

Address after: 215011 23rd Floor, Building 3, Suzhou Pioneer Park, 209 Zhuyuan Road, Suzhou High-tech Zone, Jiangsu Province

Applicant after: SUZHOU C*CORE TECHNOLOGY Co.,Ltd.

Address before: 215011 23rd Floor, Building 3, Suzhou Pioneer Park, 209 Zhuyuan Road, Suzhou High-tech Zone, Jiangsu Province

Applicant before: C*CORE TECHNOLOGY (SUZHOU) Co.,Ltd.

CB02 Change of applicant information
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190517

RJ01 Rejection of invention patent application after publication