[go: up one dir, main page]

CN103646202A - Fingerprint information coding encryption and application method - Google Patents

Fingerprint information coding encryption and application method Download PDF

Info

Publication number
CN103646202A
CN103646202A CN201310664447.4A CN201310664447A CN103646202A CN 103646202 A CN103646202 A CN 103646202A CN 201310664447 A CN201310664447 A CN 201310664447A CN 103646202 A CN103646202 A CN 103646202A
Authority
CN
China
Prior art keywords
authentication
password
information
finger
finger print
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310664447.4A
Other languages
Chinese (zh)
Inventor
张继中
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southeast University
Original Assignee
Southeast University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southeast University filed Critical Southeast University
Priority to CN201310664447.4A priority Critical patent/CN103646202A/en
Publication of CN103646202A publication Critical patent/CN103646202A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Collating Specific Patterns (AREA)

Abstract

一种指纹信息的编码加密及应用方法涉及信息安全系统,特别是将人指纹的固定生物特征信息与十个人手指纹以十进制编码构建的密码信息结合不但能够发挥人体生物特征识别的相对高的安全性、可靠性、方便性而且能够发挥密码的动态特征而避免因生物特征信息被盗所引发的安全问题,同时由于密码的复杂度可以下降因此也可以减轻身份验证者密码记忆的负担从而有助于提高信息安全并推动身份验证技术的进一步推广应用。

An encoding encryption and application method of fingerprint information relates to an information security system, in particular, the combination of the fixed biological feature information of human fingerprints and the password information constructed by ten human fingerprints in decimal code can not only exert the relatively high security of human biological feature identification Security, reliability, convenience, and the dynamic characteristics of the password can be used to avoid security problems caused by the theft of biometric information. At the same time, because the complexity of the password can be reduced, it can also reduce the burden of the authenticator’s password memory, which is helpful. It is used to improve information security and promote the further promotion and application of identity verification technology.

Description

一种指纹信息的编码加密及应用方法Encoding and Encryption of Fingerprint Information and Its Application Method

技术领域technical field

本发明涉及一种指纹信息的编码加密方式及应用方法,特别是将人10个不同手指的指纹以十进制进行编码以构建密码,从而实现指纹固定的生物特征与可变密码的组合而提高基于生物特征身份识别或者验证的安全性。The present invention relates to an encoding and encryption method of fingerprint information and an application method, in particular, the fingerprints of 10 different fingers of a person are encoded in decimal to construct a password, so as to realize the combination of fixed biological characteristics of fingerprints and variable passwords and improve the quality based on biological characteristics. Security of feature identification or authentication.

背景技术Background technique

进入二十一世纪科技的进步使得类社会快速步入信息时代,高速发展的信息技术让人们的信息交流变得更加方便、快捷,工作效率获得巨大的提升,并从各个方面重塑我们的社会。然而,随之而来的信息安全问题如信息的窃取、冒用或篡改也给我们社会的发展带来了严峻的挑战。据美国联邦贸易委员会估计,近几年来,每年大约有1000万美国人的个人信息被盗窃或滥用,给消费者造成50亿美元的损失,而每年商业机构的损失则高达480亿美元。实行个人身份验证是保障信息安全的重要途径,如何快速准确地辨别出个人身份,以确保信息安全和维护社会秩序,已成为现代社会亟待解决的重要课题。Entering the 21st century, the progress of science and technology has made the society quickly enter the information age. The rapid development of information technology has made people's information exchange more convenient and faster, and the work efficiency has been greatly improved, reshaping our society from all aspects. . However, the ensuing information security issues such as information theft, fraudulent use or tampering have also brought severe challenges to the development of our society. According to the estimates of the US Federal Trade Commission, in recent years, the personal information of about 10 million Americans has been stolen or misused every year, causing losses of US$5 billion to consumers and US$48 billion to commercial organizations. The implementation of personal identity verification is an important way to ensure information security. How to quickly and accurately identify personal identities to ensure information security and maintain social order has become an important issue to be solved in modern society.

传统的身份鉴别方法主要有两种:基于知识的方法和基于信物的方法。基于知识的方法通过核对“你知道什么”来确定个人身份,即待验证者使用所掌握的知识如密码、个人识别码(PIN)或口令等来证明自己的身份。基于信物的方法则通过核对“你拥有什么”来确定个人身份,即待验证者使用所持有的信物如证件、印章或钥匙等来证明自己的身份。显然,上述两种方法都有明显的缺陷,“知识”存在容易遗忘或混淆、被他人窃取或破解等问题,“信物”则存在携带不便、会丢失或被盗、容易被仿制等问题。因此,传统身份鉴别方法的缺陷使得其越来越不适应科技的发展和社会的进步,为此人们把目光转向了具有不可复制特点人体生物特征的生物识别技术。所谓生物识别,即根据人体特征来确定个人身份。与传统技术所使用的“知识”和“信物”相比,生物识别技术所采用的人体特征具有不怕遗忘、不会丢失、难以伪造、不可替代、不需额外携带等突出优点。因此,生物识别不仅安全可靠,而且操作方便,具有显著的优越性。There are two main traditional identification methods: knowledge-based methods and token-based methods. Knowledge-based methods determine personal identity by checking "what you know", that is, the person to be verified uses the knowledge he has mastered, such as passwords, personal identification numbers (PINs) or passwords, to prove his identity. The token-based method determines personal identity by checking "what do you have", that is, the person to be verified uses tokens such as certificates, seals or keys to prove his identity. Obviously, the above two methods have obvious defects. "Knowledge" has problems such as being easily forgotten or confused, and being stolen or cracked by others. Therefore, the defects of the traditional identification method make it less and less suitable for the development of science and technology and the progress of society, so people turn their attention to the biometric technology with non-reproducible characteristics of human biological characteristics. The so-called biometrics, that is, according to the characteristics of the human body to determine personal identity. Compared with the "knowledge" and "token" used in traditional technology, the human body characteristics used in biometric technology have outstanding advantages such as not afraid of forgetting, not being lost, difficult to forge, irreplaceable, and no need to carry additionally. Therefore, biometric identification is not only safe and reliable, but also easy to operate, which has significant advantages.

人体用于生物识别的特征可以分为两类:生理特征和行为特征。生理特征主要有:指纹、掌形、虹膜、视网膜、人脸、面部热像等;行为特征主要有:签名、语音、步态、击键等。研究和实验表明,人体的上述特征都在不同程度上满足普遍性、唯一性、稳定性和可采集性等四个基本性质的要求。基于这些特征,人们发展了多种生物识别技术,其中应用较广或研究较深的有:指纹识别、掌形识别、虹膜识别、视网膜识别、人脸识别、面部热像识别、签名识别、语音识别等。在各种生物识别技术中,指纹识别和掌形识别的应用最为广泛,其中指纹识别更是占据了绝对的优势,国内外市场上的主要生物识别产品基本上都是基于指纹识别技术的。The characteristics of the human body for biometric identification can be divided into two categories: physiological characteristics and behavioral characteristics. Physiological characteristics mainly include: fingerprint, palm shape, iris, retina, face, facial thermal image, etc.; behavioral characteristics mainly include: signature, voice, gait, keystroke, etc. Research and experiments have shown that the above-mentioned characteristics of the human body meet the requirements of the four basic properties of universality, uniqueness, stability and collectability to varying degrees. Based on these characteristics, people have developed a variety of biometric technologies, among which are widely used or deeply researched: fingerprint recognition, palm recognition, iris recognition, retina recognition, face recognition, facial thermal image recognition, signature recognition, voice identification etc. Among various biometric technologies, fingerprint recognition and palm shape recognition are the most widely used, among which fingerprint recognition occupies an absolute advantage. The main biometric products in the domestic and foreign markets are basically based on fingerprint recognition technology.

事实上指纹是一种比较理想的生物识别特征。指纹是分布在人体手指皮肤上的纹路图像,由多种脊状纹路构成。研究已经表明,胎儿在母体内发育七个月左右,其指纹就已完全形成,并且终身不会发生变化,除非手指发生意外的物理损伤。一般地,生物组织包括体表可观察特征都是由基因和环境共同决定和影响的,指纹就是体表可观察特征的一种。对于指纹来说,基因决定了它的总体模式特征,当指尖上的皮肤细胞开始分化时,指纹的总体特征开始逐渐形成。在细胞分化的过程中,胎儿在子宫中的位置会不断地改变,其周围的羊膜液体也会有不同的流动情况。这样,不同手指所处的微环境都不相同。指纹的精细结构就是由所处的微环境所决定的,环境的轻微改变都会使得细胞的分化过程极不相同。人类的基因是如此的丰富,形成指纹的环境又是如此的变化多样,以至于没有任何两个手指的指纹是相同的。即便是具有相同DNA(目前尚无法区分)的同卵双胞胎,也不会有相同的指纹,他们的指纹完全可以根据细节特征进行区分。In fact, fingerprints are an ideal biometric feature. Fingerprints are texture images distributed on the skin of human fingers, consisting of a variety of ridges. Studies have shown that the fingerprints of the fetus are fully formed after about seven months of development in the mother's body, and will not change throughout life, unless accidental physical damage occurs to the fingers. Generally, biological tissues, including observable features on the body surface, are determined and influenced by both genes and the environment. Fingerprints are one of the observable features on the body surface. For fingerprints, genes determine its overall pattern characteristics. When the skin cells on the fingertips begin to differentiate, the overall characteristics of fingerprints begin to form gradually. During the process of cell differentiation, the position of the fetus in the uterus will constantly change, and the amniotic fluid around it will also have different flow conditions. In this way, the microenvironment of different fingers is different. The fine structure of fingerprints is determined by the microenvironment in which they live, and slight changes in the environment will make the differentiation process of cells very different. Humans are so rich in genes and the environments in which fingerprints are formed are so diverse that no two fingerprints are the same. Even identical twins with the same DNA (which is currently indistinguishable) will not have the same fingerprints, and their fingerprints can be distinguished based on detailed features.

此外,在各种生物识别系统中,指纹识别系统在安全性、易用性和费用代价等主要方面的综合性能最为突出,因此其在一出现就得到了刑侦司法领域的广泛使用。随着计算机技术的进步,个人计算机以及其它一些微处理器如DSP、ARM等已经有足够的能力独立完成指纹识别运算。同时,随着传感器技术的进步,指纹采集设备的体积、功耗和价格都有了大幅度的减少。这使自动指纹识别系统得以向民用领域发展,可以广泛用于政府、银行、医疗、社保、学校和公司等部门机构的信息访问、电子交易、门禁控制、考勤管理和证卡管理等各类需要个人身份认证的场合。而自动指纹识别系统的广泛应用也必将有助于减少舞弊行为、遏制犯罪、避免不必要的社会经济或个人财产损失,同时还有助于人们方便快捷地完成身份认证,提高工作效率。从市场的情况来看,生物识别技术的市场规模每年都以极快的速度在增长,而指纹识别所占的比例一直保持着绝对的优势。据国际生物识别集团(IBG)估计,指纹识别在2006年所占的市场份额超过整个生物识别技术市场的40%。由此可见,自动指纹识别系统具有广阔的应用及市场前景,所能带来的社会效益和经济效益不容忽视。In addition, among various biometric systems, the fingerprint recognition system has the most outstanding comprehensive performance in terms of security, ease of use and cost, so it has been widely used in the field of criminal investigation and justice as soon as it appeared. With the advancement of computer technology, personal computers and other microprocessors such as DSP, ARM, etc. have sufficient ability to independently complete fingerprint recognition operations. At the same time, with the advancement of sensor technology, the volume, power consumption and price of fingerprint collection equipment have been greatly reduced. This enables the automatic fingerprint identification system to develop into the civilian field, and can be widely used in various needs such as information access, electronic transactions, access control, attendance management, and card management in government, banks, medical care, social security, schools, and companies. In case of personal authentication. The wide application of automatic fingerprint identification system will also help to reduce fraud, curb crime, avoid unnecessary social economy or personal property loss, and also help people to complete identity authentication conveniently and quickly, and improve work efficiency. Judging from the market situation, the market size of biometric technology is growing at an extremely fast rate every year, and the proportion of fingerprint recognition has always maintained an absolute advantage. According to the International Biometrics Group (IBG) estimates, fingerprint recognition in 2006 accounted for more than 40% of the entire biometric technology market. It can be seen that the automatic fingerprint identification system has broad application and market prospects, and the social and economic benefits it can bring cannot be ignored.

然而在实际应用过程中固定生物特征被盗引发的安全问题限制了生物特征识别技术的大规模推广应用。例如一方面在互联网上通过木马病毒盗用他人包括指纹、人脸信息而作案的报道时有发生,甚至发生了监狱犯人将狱警杀害后用狱警的指纹开启监狱大门而溜之大吉的恶性案件。这些问题的发生使得人们对生物特征识别技术的可靠性及安全性提出了质疑。因此现在急需发展能够有效克服生物特征识别技术中存在问题的新的方法、系统以更好地促进社会经济的发展和人民生活水平的提高。However, in the actual application process, the security problems caused by the theft of fixed biometrics limit the large-scale promotion and application of biometric technology. For example, on the one hand, there are frequent reports on the Internet of committing crimes by stealing other people’s fingerprints and face information through Trojan horse viruses, and there are even vicious cases where prison inmates kill prison guards and then use the prison guard’s fingerprints to open the prison gate and escape. The occurrence of these problems makes people question the reliability and security of biometric identification technology. Therefore, there is an urgent need to develop new methods and systems that can effectively overcome the problems in biometric identification technology to better promote the development of social economy and the improvement of people's living standards.

为此,本申请在国际上首次提出将人10个不同手指的指纹通过十进制进行编码以构建密码,从而实现指纹固定的生物特征与可变密码的组合而提高基于生物特征身份识别或者验证的安全性,以期为信息安全及社会文明的进一步发展做贡献。For this reason, this application proposes for the first time in the world that the fingerprints of 10 different fingers of a person are coded in decimal to construct a password, so as to realize the combination of fixed biometrics and variable passwords to improve the security of identification or verification based on biometrics In order to contribute to the further development of information security and social civilization.

发明内容Contents of the invention

技术问题:本发明的目的是提供一种指纹信息的编码加密及应用方法,将人10个不同手指的指纹通过十进制进行编码以构建密码,从而实现指纹固定的生物特征与可变密码的组合以发挥生物特征信息在身份验证中的方便、有效等优点及编码加密的动态优点,以保证身份验证的安全、方便与可靠。Technical problem: The object of the present invention is to provide a method for encoding and encrypting fingerprint information and its application. The fingerprints of 10 different fingers of a person are encoded in decimal to construct a password, so as to realize the combination of fixed biometric features and variable passwords. Take advantage of the convenience and effectiveness of biometric information in identity verification and the dynamic advantages of encoding and encryption to ensure the safety, convenience and reliability of identity verification.

技术方案:本发明在国际上首次将人10个不同手指的指纹通过十进制进行编码以构建密码,从而实现指纹固定的生物特征与可变密码的组合而将固定的指纹生物特征信息与可变的不同手指指纹编码构建的密码信息结合用于身份验证,从而发挥生物特征信息识别与编码信息识别的优势,以推进身份验证技术的进一步发展和应用。Technical solution: This invention is the first in the world to encode the fingerprints of 10 different fingers in decimal to construct a password, so as to realize the combination of fixed fingerprint biometrics and variable passwords and combine fixed fingerprint biometric information with variable The password information constructed by different fingerprint codes is combined for identity verification, so as to give full play to the advantages of biometric information recognition and coded information recognition, so as to promote the further development and application of identity verification technology.

本发明的一种指纹信息的编码加密方法,首先设定人十个手指的排列顺序并依照0-9进行编码,然后伸指以获取指纹编码为基础的密码片断,重复伸指过程可以构建由各次伸指形成的密码片断构建的十进制密码。In the encoding and encryption method of fingerprint information of the present invention, firstly, the arrangement sequence of ten fingers of a person is set and encoded according to 0-9, and then the finger is stretched to obtain the password fragment based on the fingerprint code. Repeating the finger stretching process can construct the The decimal cipher constructed from the cipher fragments formed by each extension.

所述伸指是指伸出选定手指并通过指纹采集设备采集伸指指纹图像以获取相关指纹信息、编码信息并进一步提取基于编码信息的密码片断;而重复伸指是指在一次伸指完成后,将另外一次伸指选定的手指伸出并通过指纹采集设备采集伸指指纹图像以获取相关指纹信息、编码信息并进一步提取基于编码信息的密码片断。The finger stretching refers to stretching out the selected finger and collecting the fingerprint image of the stretching finger through the fingerprint collection device to obtain relevant fingerprint information, coded information and further extracting code fragments based on the coded information; Afterwards, extend the selected finger for another stretch and collect the stretched fingerprint image through the fingerprint collection device to obtain relevant fingerprint information, coded information, and further extract password fragments based on the coded information.

所述指纹图像由摄像设备、电容传感器、电感传感器、超声波传感器在内的指纹获取设备获得。The fingerprint image is obtained by a fingerprint acquisition device including an imaging device, a capacitive sensor, an inductive sensor, and an ultrasonic sensor.

所述指纹图像通过特征提取及模板提取而获得可以用于信息比对的指纹信息;The fingerprint image obtains fingerprint information that can be used for information comparison through feature extraction and template extraction;

本发明的一种指纹信息的应用方法为:所述密码用于身份验证系统;所述身份验证系统包括客户端与服务器端,客户端除了能够让身份验证者登陆外还拥有能够获取身份验证者基于指纹图像的指纹信息及进一步通过特征提取及模板提取而获得指纹信息的信息提取系统;服务器端包括应用服务器及数据库,数据库中存有身份验证者的可以进行信息比对的十个手指的指纹信息,十个手指指纹的排序和编码信息及密码,而应用服务器则承担连接客户端与数据库及进行运算服务的功能,应用服务器与客户端通过密文通讯实现身份验证者用户登陆、身份验证;应用服务器的运算服务功能是指运算服务器将伸指获得的指纹信息与数据库中的指纹信息通过搜索、信息比对以初步确定身份验证者,成功后应用服务器从数据库中调用身份验证者的十个手指指纹编码信息并进一步结合超过一次伸指的指纹信息及编码信息提取基于编码信息的密码片断组合形成的身份验证者输入身份验证密码,随后应用服务器将身份验证者输入的身份验证密码与数据库中的身份验证密码通过搜索进行信息比对以确定身份验证者身份;当客户端不能进行所获取指纹图像的特征提取及模板提取时,服务器端的应用服务器承担所获取指纹图像的特征提取及模板提取。An application method of fingerprint information in the present invention is as follows: the password is used in an identity verification system; The fingerprint information based on the fingerprint image and the information extraction system that further obtains the fingerprint information through feature extraction and template extraction; the server side includes an application server and a database, and the database stores the fingerprints of ten fingers of the authenticator that can be compared for information Information, sorting and encoding information and passwords of ten fingerprints, and the application server is responsible for connecting the client and the database and performing calculation services. The application server and the client realize the user login and identity verification of the authenticator through ciphertext communication; The operation service function of the application server means that the operation server searches and compares the fingerprint information obtained by finger extension with the fingerprint information in the database to preliminarily determine the authenticator. Fingerprint coded information and further combined with more than one finger stretched fingerprint information and coded information to extract the password fragments based on the coded information The authenticator enters the authentication password, and then the application server combines the identity verification password entered by the authenticator with the database The identity verification password is searched for information comparison to determine the identity of the authenticator; when the client cannot perform feature extraction and template extraction of the acquired fingerprint image, the application server on the server side undertakes feature extraction and template extraction of the acquired fingerprint image.

身份验证系统的身份验证流程包括身份验证者通过客户端向应用服务器提出身份验证请求后,身份验证系统启动,应用服务器向客户端身份验证者发出获取验证信息要求,然后身份验证者通过客户端信息提取系统依次提取超过一次伸指获得的指纹信息并传递至应用服务器,应用服务器将指纹信息与数据库中的指纹信息通过搜索进行比对以初步确定身份验证者身份,成功后应用服务器从数据库中调用身份验证者的十个手指指纹的编码信息并进一步结合超过一次伸指的指纹信息及编码信息提取基于编码信息的密码片断组合形成的身份验证者输入身份验证密码,随后应用服务器将身份验证者输入的身份验证密码与数据库中的身份验证密码通过搜索进行信息比对以确定身份验证者身份,当信息比对确认吻合时,应用服务器回馈客户端身份验证者身份验证成功,而当信息比对连续三次失败时则由应用服务器回馈客户端身份验证者身份验证失败。The identity verification process of the identity verification system includes that after the authenticator submits an identity verification request to the application server through the client, the identity verification system starts, and the application server sends a request for obtaining verification information to the client authenticator, and then the identity verifier passes the client information. The extraction system sequentially extracts the fingerprint information obtained by more than one finger stretching and transmits it to the application server. The application server compares the fingerprint information with the fingerprint information in the database to initially determine the identity of the authenticator. After success, the application server calls from the database. The coded information of ten fingerprints of the authenticator is further combined with the fingerprint information and coded information of more than one finger extension to extract the coded information. The authenticator enters the authentication password, and then the application server enters the password of the authenticator. The authentication password in the database is compared with the authentication password in the database to determine the identity of the authenticator. When the information is compared and confirmed to be consistent, the application server will report back to the client that the authentication of the authenticator is successful, and when the information comparison is continuous After three failures, the application server will report the authentication failure of the client authenticator.

所述密码在身份验证者身份验证成功后,从客户端与应用服务器联系进行更改;所述密码对同一个身份验证者可以设置多个,包括身份验证密码、警报密码、备份密码;所述身份验证密码用于身份验证;所述警报密码用于身份验证者受到他人胁迫时的身份验证,此时应用服务器可以藉由告知系统故障而终止身份验证并联系警方寻求协助;所述备份密码用于防止身份验证者忘记身份验证密码时能够重新找回或者重新设置身份验证密码。After the identity verification of the authenticator is successful, the password is changed from the client to the application server; the password can be set multiple for the same identity authenticator, including identity verification password, alarm password, backup password; the identity The verification password is used for identity verification; the alarm password is used for identity verification when the identity verifier is threatened by others, and at this time the application server can terminate the identity verification and contact the police for assistance by notifying the system failure; the backup password is used for Prevent the authenticator from being able to retrieve or reset the authentication password when the authenticator forgets the authentication password.

所述身份验证系统服务器的数据库在确定身份验证者身份情况下收集包括十个手指的指纹信息,十个手指指纹的编码信息及身份验证者设定的密码。The database of the identity verification system server collects the fingerprint information of ten fingers, the coded information of the ten finger prints and the password set by the identity verifier when the identity of the identity verifier is determined.

所述身份验证系统进行的信息比对是指将收集的指纹图像进行特征提取及模板提取后与数据库中指纹信息通过搜索进行信息核查以判决信息比对结果,核查初步确定身份验证者后调用其设定的十个手指的指纹编码信息并结合身份验证者的超过一次伸指的指纹信息及编码信息提取基于编码信息的密码片断组合形成的身份验证者输入身份验证密码并再次与数据库中身份验证者的身份验证密码通过搜索以判决信息比对结果。The information comparison performed by the identity verification system refers to the feature extraction and template extraction of the collected fingerprint images and the fingerprint information in the database to conduct information verification through searching to determine the information comparison results, and call its The fingerprint code information of the set ten fingers is combined with the fingerprint information and code information of the authenticator who stretched more than one finger to extract the password fragments based on the code information. The authenticator enters the authentication password and authenticates with the database again. The user's identity verification password is searched to determine the information comparison result.

身份验证系统的客户端与应用服务器通过密文通讯;所述的密文通过加密算法实现,加密算法包括对称算法和非对称算法;The client of the identity verification system communicates with the application server through cipher text; the cipher text is realized through an encryption algorithm, and the encryption algorithm includes a symmetric algorithm and an asymmetric algorithm;

所述客户端与服务器端可以合并在一起;The client and the server can be combined together;

有益效果:传统身份验证的ID卡及密码技术和现有的人体生物特征识别技术在身份验证要求的安全、准确、方便、快捷和廉价等方面还存在很多问题,为此本申请将人指纹的固定生物特征信息与人手指纹编码构建的密码信息结合不但能够发挥人体生物特征识别的相对高的安全性、可靠性、方便性而且能够发挥密码的动态特征而减少甚至避免因生物特征信息被盗所引发的安全问题,同时由于密码的复杂度可以下降因此也可以减轻身份验证者密码记忆的负担从而有助于提高信息安全并推动身份验证应用领域的进一步扩大。Beneficial effects: There are still many problems in the security, accuracy, convenience, quickness and cheapness of identity verification requirements in the ID card and password technology of traditional identity verification and the existing human body biometric identification technology. The combination of fixed biometric information and password information constructed by human fingerprint coding can not only give full play to the relatively high security, reliability, and convenience of human biometric identification, but also can take advantage of the dynamic characteristics of passwords to reduce or even avoid damage caused by theft of biometric information. At the same time, because the complexity of the password can be reduced, it can also reduce the burden of the authenticator's password memory, which helps to improve information security and promote the further expansion of the application field of identity verification.

附图说明Description of drawings

图1是人手指纹信息编码加密组合身份验证系统结构。Fig. 1 is the structure of the authentication system of human fingerprint information encoding and encryption combination.

图2是人手指纹信息编码加密组合身份验证系统身份验证流程。Figure 2 is the identity verification process of the human fingerprint information encoding and encryption combination identity verification system.

具体实施方式Detailed ways

下面结合实施例对本发明作进一步的说明。The present invention will be further described below in conjunction with embodiment.

实施例一:Embodiment one:

用户张三首先在银行设立账户并提交10个手指的指纹信息及自己选定的左大拇指至左小拇指至右小拇指至右大拇指的0-9排序及编码方式和由23,789,09三次伸指编码形成的身份验证密码,123,123两次伸指形成的警报密码及08,08,08,08,08,08六次伸出手指形成的备份密码以收录于银行服务器的数据库中。然后张三通过手机安装的客户端在网上购物需要支付时而登陆银行账户后首先通过手机摄像头摄取三次伸指指纹图像并通过对称加密算法获得的密文发送至银行服务器,银行服务器对其三次伸指的指纹图像通过特征提取及模板提取后获得其三次伸指的指纹信息,银行服务器数将这些指纹信息与据库中的指纹信息通过搜索进行比对以初步确定为张三,成功后银行服务器调用数据库中张三预先设定的十个手指指纹的编码信息再结合其三次伸指的指纹信息确定张三输入的身份验证密码为23,789,09,银行服务器将该身份验证密码与数据库中的身份验证密码进行比对,比对吻合后银行服务器通过密文通知张三身份验证成功,张三即可进入其账户而实现网络支付。User Zhang San first sets up an account in the bank and submits the fingerprint information of 10 fingers and the 0-9 sorting and coding method of his choice from left thumb to left little finger to right little finger to right thumb and 23,789,09 three times The identity verification password formed by finger extension code, the alarm password formed by 123, 123 finger extension twice and the backup password formed by 08, 08, 08, 08, 08, 08 six finger extensions are included in the database of the bank server. Then Zhang San needs to pay for online shopping through the client installed on the mobile phone. After logging into the bank account, he first captures the fingerprint images of three finger extensions through the camera of the mobile phone and sends the ciphertext obtained through the symmetric encryption algorithm to the bank server. The bank server stretches his fingers three times. After feature extraction and template extraction, the fingerprint image of the fingerprint image obtained the fingerprint information of its three finger extensions. The bank server compares these fingerprint information with the fingerprint information in the database to preliminarily determine that Zhang San is Zhang San. After success, the bank server calls In the database, Zhang San pre-sets the coding information of ten fingerprints combined with the fingerprint information of his three finger extensions to determine that the identity verification password entered by Zhang San is 23,789,09, and the bank server combines the identity verification password with the one in the database The identity verification passwords are compared, and after the comparison and matching, the bank server notifies Zhang San that the identity verification is successful through cipher text, and Zhang San can enter his account to realize online payment.

如果张三感觉其个人信息包括设置的密码信息出现问题,其可以通过成功身份验证而进行修改。If Zhang San feels that there is a problem with his personal information including the set password information, he can modify it through successful identity verification.

如果张三的10个手指的指纹信息被黑客通过网络木马盗取,而试图登陆张三银行账户时,由于其只能提供固定信息,不能提供指纹编码构建的密码信息,因此其盗取将不能成功。在黑客登陆失败时系统可以录取登陆人相关图像以供后面破案使用,同时系统可以通过短信息通知张三本人以规避风险。If the fingerprint information of Zhang San's 10 fingers is stolen by a hacker through a network Trojan horse, and when he tries to log in to Zhang San's bank account, since he can only provide fixed information and cannot provide password information constructed by fingerprint encoding, his theft will not be possible. success. When the hacker fails to log in, the system can record the relevant image of the registrant for later use in solving the case, and at the same time, the system can notify Zhang San himself through a short message to avoid risks.

如果张三被劫持,则张三可以通过其两次伸指而获得的指指纹信息及其形成的警报密码通过银行账户身份验证系统报警给警方如附近110,同时系统提示系统故障以保护张三。If Zhang San is hijacked, then Zhang San can use the fingerprint information obtained by stretching his fingers twice and the alarm password formed to call the police through the bank account identity verification system, such as nearby 110, and the system will prompt system failure to protect Zhang San .

实施例二:Embodiment two:

某监狱系统设立门禁系统网络后,首先收集各位狱警提交的10个手指的指纹信息及自己选定的左小拇指至左大拇指至右小拇指至右大拇指的0到9的排序和编码方式,及其选定的78,23,56789身份验证密码,5678,123两次伸指警报密码以收录于门禁系统服务器的数据库中。平时狱警A上班藉由监狱各牢门安装的有指纹电容传感器的客户端利用其选定的三次伸指的指纹信息和其形成的身份验证密码通过非对称加密算法获得的密文进行身份验证以进出监狱门禁系统,如果狱警受到犯罪分子威胁则通过两次伸指的指纹信息和其形成的警报密码提示出现警报以告知其他狱警提供支持,而门禁系统则提示系统出现故障以保护狱警。After setting up the access control system network in a prison system, first collect the fingerprint information of the 10 fingers submitted by the prison guards and the sorting and coding method of 0 to 9 from the left little finger to the left thumb to the right little finger to the right thumb selected by oneself, and Its selected 78, 23, 56789 identity verification passwords, 5678, 123 two finger extension alarm passwords are included in the database of the access control system server. Prison guard A usually goes to work by using the client terminal with fingerprint capacitive sensors installed on each prison door to use the fingerprint information selected by him for three times and the identity verification password formed by it to perform identity verification through the ciphertext obtained by the asymmetric encryption algorithm. When entering and exiting the prison access control system, if the prison guard is threatened by criminals, an alarm will be prompted through the fingerprint information of two fingers and the alarm password formed to inform other prison guards to provide support, while the access control system will prompt the system to fail to protect the prison guard.

实施例三:Embodiment three:

李四在保险箱上安装有超声波指纹传感器的身份验证系统,以便在只有成功进行身份验证后才能够开启保险箱。随后李四提交其10个手指的指纹信息及自己选定的左大拇指至左小拇指至右小拇指至右大拇指的0-9排序及编码方式和三次伸指形成的23,56,79身份验证密码,一次伸指形成的678警报密码及三次伸指形成的12,58,89备份密码以收录于保险箱服务器的数据库中。此时客户端与服务器合并在一起。李四后面需要开启保险箱时可以通过其选定手指的指纹信息及其形成的密码信息进行登陆、身份验证而开启。Li Si installs an authentication system with an ultrasonic fingerprint sensor on the safe so that the safe can only be opened after successful authentication. Then Li Si submitted the fingerprint information of his 10 fingers and the 0-9 sorting and coding method he selected from the left thumb to the left little finger to the right little finger to the right thumb and the 23, 56, 79 identity verification formed by three finger extensions Password, the 678 alarm password formed by one finger stretching and the 12, 58, 89 backup passwords formed by three finger stretching are recorded in the database of the safe server. At this point the client and server are merged together. When Li Si needs to open the safe behind, he can log in and verify his identity through the fingerprint information of his selected finger and the password information formed therein.

当李四忘记其身份验证密码时,可以通过选定手指的指纹和其形成的备份密码进行登陆而找回或者重新设置身份验证密码。当李四被胁迫开启保险箱时可以通过选定手指的指纹信息及其形成的警报密码进行登陆,其时身份验证系统通过与警方联系而报警,同时提示保险箱出现机械故障而保护李四。When Li Si forgot his identity verification password, he could log in with the fingerprint of the selected finger and the backup password formed by it and retrieve or reset the identity verification password. When Li Si was coerced to open the safe, he could log in through the fingerprint information of his selected finger and the alarm password formed. At that time, the identity verification system contacted the police to call the police, and at the same time reminded that the safe had a mechanical failure to protect Li Si.

实施例四Embodiment four

王五在住宅安全门安装身份验证系统并在系统数据库中输入其家人的十个手指的指纹信息及其选定的左大拇指至左小拇指至右小拇指至右大拇指的0-9排序及编码方式和选定伸指指纹编码构成的身份验证密码,警报密码。后面其一家人就可以通过身份验证系统进出安全门,既安全又方便。Wang Wu installs an identity verification system on the security door of his residence and enters the fingerprint information of his family's ten fingers in the system database and the 0-9 sorting and coding method he selected from left thumb to left little finger to right little finger to right thumb And the identity authentication password that the selected extensor fingerprint coding constitutes, the alarm password. Later, his family can enter and exit the security door through the identity verification system, which is safe and convenient.

实施例五Embodiment five

用户张三首先在银行设立账户并提交10个手指的指纹信息及自己选定的左大拇指至左小拇指至右小拇指至右大拇指的0-9排序及编码方式和由789一次伸指编码形成的身份验证密码,123,123两次伸指形成的警报密码及08,08,08,08,08,08六次伸出手指形成的备份密码以收录于银行服务器的数据库中。然后张三通过手机安装的客户端在网上购物需要支付时而登陆银行账户后首先通过手机摄像头摄取一次伸指指纹图像并通过手机登陆账户装载的图像处理软件通过特征提取及模板提取后获得其一次伸指的指纹信息,并通过不对称加密算法获得的密文发送至银行服务器,银行服务器数将这些指纹信息与据库中的指纹信息通过搜索进行比对以初步确定为张三,成功后银行服务器调用数据库中张三预先设定的十个手指指纹的编码信息再结合其一次伸指的指纹信息确定张三输入的身份验证密码为789,银行服务器将该身份验证密码与数据库中的身份验证密码进行比对,比对吻合后银行服务器通过密文通知张三身份验证成功,张三即可进入其账户而实现网络支付。User Zhang San first sets up an account in the bank and submits the fingerprint information of 10 fingers and the 0-9 sorting and coding method of his choice from left thumb to left little finger to right little finger to right thumb, and is formed by 789 finger extension codes The identity verification password, 123, 123 the alarm password formed by stretching fingers twice, and the backup password formed by stretching fingers six times at 08, 08, 08, 08, 08 are included in the database of the bank server. Then Zhang San needs to pay for online shopping through the client installed on the mobile phone. After logging into the bank account, he first captures an image of the extended fingerprint through the camera of the mobile phone, and uses the image processing software loaded in the mobile phone to log in to the account to obtain the extended fingerprint through feature extraction and template extraction. The fingerprint information of the finger, and send the ciphertext obtained through the asymmetric encryption algorithm to the bank server, and the bank server will compare the fingerprint information with the fingerprint information in the database to preliminarily determine Zhang San. After the success, the bank server Call Zhang San’s pre-set ten fingerprint encoding information in the database and combine the fingerprint information of his first finger extension to determine that the identity verification password entered by Zhang San is 789, and the bank server compares the identity verification password with the identity verification password in the database After the comparison, the bank server notifies Zhang San through ciphertext that the identity verification is successful, and Zhang San can enter his account to realize online payment.

Claims (9)

1. the coding encrypting method of a finger print information, it is characterized in that first setting putting in order and encoding according to 0-9 of ten fingers of people, then stretch and refer to take obtain finger-print codes as basic password segment, repeat to stretch finger process and can build the decimal system password of being stretched the password segment structure of finger-type one-tenth by each time.
2. the coding encrypting method of a kind of finger print information according to claim 1, stretches described in it is characterized in that and refers to refer to and stretch out selected finger and stretched and referred to that fingerprint image is to obtain relevant finger print information, coded message and further to extract the password segment based on coded message by the collection of fingerprint collecting equipment; And repeat to stretch, refer to refer to after once stretching and having referred to, by once stretching in addition, refer to that selected finger stretches out and stretch and refer to that fingerprint image is to obtain relevant finger print information, coded message the further password segment of extraction based on coded message by the collection of fingerprint collecting equipment.
3. the coding encrypting method of a kind of finger print information according to claim 1, is characterized in that described fingerprint image is obtained equipment at interior fingerprint and obtained by picture pick-up device, capacitive transducer, inductance sensor, ultrasonic sensor.
4. the coding encrypting method of a kind of finger print information according to claim 1, is characterized in that described fingerprint image obtains the finger print information that can compare for information by feature extraction and template extraction.
5. an application process for a kind of finger print information as claimed in claim 1, is characterized in that described password is for authentication system, described authentication system comprises client and server, and client is except allowing authentication person also have logging in can to obtain the finger print information of authentication person based on fingerprint image and further obtain the information extracting system of finger print information by feature extraction and template extraction, server end comprises application server and database, the finger print information that has ten fingers that can carry out information comparison of authentication person in database, the sequence of ten finger prints and coded message and password, application server is born the function that connects client and database and carry out computing service, and application server and client realize by ciphertext communication that authentication person user logs in, authentication, the computing service function of application server refers to that calculation server refers to that by stretching the finger print information and the finger print information in database that obtain pass through search, information comparison is with the verifier that tentatively determines one's identity, after success, application server calls ten finger print coded messages of authentication person and once stretches the finger print information of finger and coded message and extract the authentication person that the password segment based on coded message is combined to form and input authentication password further combined with surpassing from database, subsequently application server by the authentication password of authentication person input and the authentication password in database by the search information of the carrying out verifier's identity of comparing to determine one's identity, when client can not be carried out the feature extraction of obtained fingerprint image and template extraction, the application server of server end is born feature extraction and the template extraction of obtained fingerprint image.
6. the application process of a kind of finger print information according to claim 5, the authentication flow process that it is characterized in that authentication system comprises that authentication person proposes after authentication request to application server by client, authentication system starts, application server sends and obtains authorization information requirement to client identity verifier, then authentication person extracts successively to surpass once to stretch by client-side information extraction system and refers to the finger print information obtaining and be passed to application server, application server compares by search the verifier's identity that tentatively determines one's identity by the finger print information in finger print information and database, after success application server from database, call authentication person ten finger prints coded message and further combined with surpassing, once stretch the finger print information of finger and coded message and extract the authentication person that the password segment based on coded message is combined to form and input authentication password, subsequently application server by the authentication password of authentication person input and the authentication password in database by the search information of the carrying out verifier's identity of comparing to determine one's identity, when information comparison is confirmed to coincide, application server feedback client identity verifier authentication success, when information compare continuous three times when failed by application server feedback client identity verifier authentication failure.
7. the application process of a kind of finger print information according to claim 5, is characterized in that described password, after authentication person's authentication success, changes from client and application server contacts; Described password can arrange a plurality of to same authentication person, comprise authentication password, alarm password, backup password; Described authentication password is for authentication; Authentication when described alarm password is subject to other people and coerces for authentication person, now application server can stop authentication by apprizing system fault and contact the police seeking to assist; Described backup password is used for preventing when authentication person from forgetting authentication password again giving or to reset authentication password for change.
8. the application process of a kind of finger print information according to claim 5, it is characterized in that, the database that it is characterized in that described authentication system server is collected the finger print information that comprises ten fingers in verifier's identity situation that determines one's identity, the password that the coded message of ten finger prints and authentication person set.
9. the application process of a kind of finger print information according to claim 5, it is characterized in that information comparison that described authentication system carries out refer to by the fingerprint image of collection carry out after feature extraction and template extraction with database in fingerprint information exchange cross search and carry out information verification with discriminative information comparison result, verify ten fingers that call its setting after the verifier that tentatively determines one's identity finger-print codes information and in conjunction with once stretch surpassing of authentication person the finger print information of finger and coded message extract authentication person that the password segment based on coded message is combined to form input authentication password and again with database in authentication person's authentication password by search with discriminative information comparison result.
CN201310664447.4A 2013-12-09 2013-12-09 Fingerprint information coding encryption and application method Pending CN103646202A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310664447.4A CN103646202A (en) 2013-12-09 2013-12-09 Fingerprint information coding encryption and application method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310664447.4A CN103646202A (en) 2013-12-09 2013-12-09 Fingerprint information coding encryption and application method

Publications (1)

Publication Number Publication Date
CN103646202A true CN103646202A (en) 2014-03-19

Family

ID=50251415

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310664447.4A Pending CN103646202A (en) 2013-12-09 2013-12-09 Fingerprint information coding encryption and application method

Country Status (1)

Country Link
CN (1) CN103646202A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104318147A (en) * 2014-10-27 2015-01-28 联想(北京)有限公司 Information processing method and electronic device
CN104615927A (en) * 2014-12-31 2015-05-13 宇龙计算机通信科技(深圳)有限公司 Multisystem safe verification method, multisystem safe verification device and terminal
CN105162601A (en) * 2015-08-27 2015-12-16 谭荣兵 Finger vein identification sequence combined password verification system
CN105279400A (en) * 2014-12-22 2016-01-27 东莞市步步高通信软件有限公司 Mobile terminal security management method and mobile terminal
CN105635052A (en) * 2014-10-31 2016-06-01 江苏威盾网络科技有限公司 Network identity dynamic fingerprint authentication method
CN105956856A (en) * 2016-04-18 2016-09-21 宇龙计算机通信科技(深圳)有限公司 Account controlling method and account controlling system
CN106156572A (en) * 2015-02-24 2016-11-23 映智科技股份有限公司 Fingerprint coding method and fingerprint authentication method and system
WO2017063546A1 (en) * 2015-10-14 2017-04-20 中国银联股份有限公司 Fingerprint information-based user identity identification method and device
CN103955881B (en) * 2014-04-18 2017-06-16 中国科学院信息工程研究所 A kind of guard method of image biological feature and device and information recovering method
CN107005577A (en) * 2017-01-25 2017-08-01 深圳市汇顶科技股份有限公司 The processing method and processing unit of finger print data
WO2018148900A1 (en) * 2017-02-16 2018-08-23 深圳市汇顶科技股份有限公司 Fingerprint identification-based authentication method and device, and transaction system
CN109074478A (en) * 2016-03-21 2018-12-21 塞巴斯蒂安·杜邦 Adaptive device for non-disclosed biometric identification using ultrasound, infrared and contrast visible light photography via a decentralized computer network
TWI696141B (en) * 2019-04-17 2020-06-11 彰化商業銀行股份有限公司 Feature coding system and method and online banking service system and method thereof using the same
CN112417409A (en) * 2020-11-06 2021-02-26 淮阴工学院 Fingerprint encoding method, fingerprint authentication method and fingerprint encoding system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1674499A (en) * 2005-03-23 2005-09-28 西安青松科技股份有限公司 Network identification system based on fingerprint and realizing method thereof
EP1600847A1 (en) * 2004-05-17 2005-11-30 Ahmed Merrouk Universal device for secure input of confidential data
CN101232380A (en) * 2008-02-28 2008-07-30 北京飞天诚信科技有限公司 Method of intelligent cryptographic key equipment safety use and intelligent cryptographic key equipment
CN102110320A (en) * 2010-12-23 2011-06-29 汉王科技股份有限公司 Coerce alarm method and entrance guard control equipment in entrance guard system
CN103400436A (en) * 2013-08-17 2013-11-20 慈溪市科创电子科技有限公司 Access control system and control method thereof

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1600847A1 (en) * 2004-05-17 2005-11-30 Ahmed Merrouk Universal device for secure input of confidential data
CN1674499A (en) * 2005-03-23 2005-09-28 西安青松科技股份有限公司 Network identification system based on fingerprint and realizing method thereof
CN101232380A (en) * 2008-02-28 2008-07-30 北京飞天诚信科技有限公司 Method of intelligent cryptographic key equipment safety use and intelligent cryptographic key equipment
CN102110320A (en) * 2010-12-23 2011-06-29 汉王科技股份有限公司 Coerce alarm method and entrance guard control equipment in entrance guard system
CN103400436A (en) * 2013-08-17 2013-11-20 慈溪市科创电子科技有限公司 Access control system and control method thereof

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103955881B (en) * 2014-04-18 2017-06-16 中国科学院信息工程研究所 A kind of guard method of image biological feature and device and information recovering method
CN104318147A (en) * 2014-10-27 2015-01-28 联想(北京)有限公司 Information processing method and electronic device
CN105635052A (en) * 2014-10-31 2016-06-01 江苏威盾网络科技有限公司 Network identity dynamic fingerprint authentication method
CN105279400A (en) * 2014-12-22 2016-01-27 东莞市步步高通信软件有限公司 Mobile terminal security management method and mobile terminal
CN104615927A (en) * 2014-12-31 2015-05-13 宇龙计算机通信科技(深圳)有限公司 Multisystem safe verification method, multisystem safe verification device and terminal
WO2016106989A1 (en) * 2014-12-31 2016-07-07 宇龙计算机通信科技(深圳)有限公司 Multi-system security authentication method, multi-system security authentication apparatus and terminal
CN104615927B (en) * 2014-12-31 2018-02-13 宇龙计算机通信科技(深圳)有限公司 Multisystem safe verification method, multisystem safety verification device and terminal
CN106156572A (en) * 2015-02-24 2016-11-23 映智科技股份有限公司 Fingerprint coding method and fingerprint authentication method and system
CN105162601A (en) * 2015-08-27 2015-12-16 谭荣兵 Finger vein identification sequence combined password verification system
WO2017063546A1 (en) * 2015-10-14 2017-04-20 中国银联股份有限公司 Fingerprint information-based user identity identification method and device
CN109074478A (en) * 2016-03-21 2018-12-21 塞巴斯蒂安·杜邦 Adaptive device for non-disclosed biometric identification using ultrasound, infrared and contrast visible light photography via a decentralized computer network
CN105956856A (en) * 2016-04-18 2016-09-21 宇龙计算机通信科技(深圳)有限公司 Account controlling method and account controlling system
CN107005577A (en) * 2017-01-25 2017-08-01 深圳市汇顶科技股份有限公司 The processing method and processing unit of finger print data
CN107005577B (en) * 2017-01-25 2021-06-25 深圳市汇顶科技股份有限公司 Fingerprint data processing method and processing device
US11075759B2 (en) 2017-01-25 2021-07-27 Shenzhen GOODIX Technology Co., Ltd. Fingerprint data processing method and processing apparatus
WO2018148900A1 (en) * 2017-02-16 2018-08-23 深圳市汇顶科技股份有限公司 Fingerprint identification-based authentication method and device, and transaction system
TWI696141B (en) * 2019-04-17 2020-06-11 彰化商業銀行股份有限公司 Feature coding system and method and online banking service system and method thereof using the same
CN112417409A (en) * 2020-11-06 2021-02-26 淮阴工学院 Fingerprint encoding method, fingerprint authentication method and fingerprint encoding system

Similar Documents

Publication Publication Date Title
CN103646202A (en) Fingerprint information coding encryption and application method
CN103646201A (en) Verification method achieved by combining human faces with identities
CN103646200B (en) The coding encrypting of a kind of face information and application process
US9704051B2 (en) Method and system for verifying identities
CN103646236B (en) The coding encrypting and application process of a kind of palmprint information
WO2018094584A1 (en) Payment and identity authentication system based on biometric feature recognition
CN107124283A (en) A kind of physical characteristics collecting system and physical characteristics collecting method
CN106446867A (en) Double-factor palmprint identification method based on random projection encryption
CN103077459A (en) Method for carrying out living body authentication and payment by fusing multi-biometric features of user
Yusuf et al. A survey of biometric approaches of authentication
Pahuja et al. Biometric authentication & identification through behavioral biometrics: A survey
Anveshini et al. Pattern recognition based fingerprint authentication for ATM system
Wang et al. Towards DTW-based unlock scheme using handwritten graphics on smartphones
CN105678150A (en) User authority managing method
CN108960003A (en) Based on Gabor and the palm print characteristics of chaotic maps generate and authentication method
Yang et al. Cross-database attack of different coding-based palmprint templates
Kamble et al. Fingerprint Verification of ATM Security System by Using Biometric and Hybridization
CN103647769B (en) A kind of coding encrypting and application process of human ear information
CN102075530A (en) Palm vein authentication-based bank authorization and credit system and method
Aizi et al. Remote multimodal biometric identification based on the fusion of the iris and the fingerprint
AliBabaee et al. Biometric authentication of fingerprint for banking users, using stream cipher algorithm
Wu et al. Fusion of palmprint and iris for personal authentication
Sahana et al. Multi Biometric Recognition System
CN105701411A (en) Information secure transmission method
Ali Analyzing mobile banking security using biometric authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20140319