CN101166083A - Method for utilizing fingerprint to improve information transmission security - Google Patents

Method for utilizing fingerprint to improve information transmission security Download PDF

Info

Publication number
CN101166083A
CN101166083A CNA2006101047814A CN200610104781A CN101166083A CN 101166083 A CN101166083 A CN 101166083A CN A2006101047814 A CNA2006101047814 A CN A2006101047814A CN 200610104781 A CN200610104781 A CN 200610104781A CN 101166083 A CN101166083 A CN 101166083A
Authority
CN
China
Prior art keywords
fingerprint
data
characteristic value
minutiae
individual
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2006101047814A
Other languages
Chinese (zh)
Other versions
CN101166083B (en
Inventor
杨若冰
杨若松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
XI'AN ZINIU TECHNOLOGY OF INFORMATION Co Ltd
Original Assignee
XI'AN ZINIU TECHNOLOGY OF INFORMATION Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by XI'AN ZINIU TECHNOLOGY OF INFORMATION Co Ltd filed Critical XI'AN ZINIU TECHNOLOGY OF INFORMATION Co Ltd
Priority to CN2006101047814A priority Critical patent/CN101166083B/en
Publication of CN101166083A publication Critical patent/CN101166083A/en
Application granted granted Critical
Publication of CN101166083B publication Critical patent/CN101166083B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Collating Specific Patterns (AREA)

Abstract

This invention relates to a method for increasing safety of information transmission by fingerprint identification, which utilizes personal fingerprint data and identifying technology to inosculate personal fingerprint character in trade information and bind them together including the following steps: 1, collecting fingerprint data from a fingerprint device, 2, loading its data onto data to be transmitted, 3, picking up data from transmitted data, 4, determining source and integrality of data by fingerprint verification.

Description

Utilize fingerprint recognition to improve the method for information transmission safety
One, technical field:
The present invention relates to a kind of application process of fingerprint identification technology, especially relate to a kind of method of utilizing fingerprint recognition to improve information transmission safety.
Two, background technology:
In most of e-commerce transaction processes, issue account information, the business transaction information of service end by user's (client), all needs to be keep secret prevent to distort, and need to confirm Data Source.In traditional pattern of passing through " the checking identity is carried out transaction more earlier ", " authentication " is two processes of separating with " Transaction Information transmission ", and " identity " separates with " Transaction Information ", like this, just exists transaction security hidden danger.
Three, summary of the invention:
The present invention is in order to solve the weak point in the above-mentioned background technology, a kind of method of utilizing fingerprint recognition to improve information transmission safety is provided, it utilizes individual finger print data and fingerprint identification technology, realize the integrality and the non repudiation of data transmission procedure, individual fingerprint characteristic is fused in the Transaction Information, bind together with Transaction Information, realized the simultaneity of checking behavior and trading activity and integrated.
For achieving the above object, the technical solution used in the present invention is:
A kind of method of utilizing fingerprint recognition to improve information transmission safety, its special character is may further comprise the steps:
(1) gathers finger print data from fingerprint equipment, i.e. fingerprint characteristic value or title fingerprint minutiae;
(2) split the data to be transmitted bag, and details in fingerprint point data one by one is loaded in the small data packets after the partition by rule;
(3) data that from the packet of receiving, take the fingerprint;
(4) carry out fingerprint authentication and come specified data source and data integrity.
May further comprise the steps:
Gather finger print data from fingerprint equipment, i.e. fingerprint characteristic value or title fingerprint minutiae:
(1) by fingerprint collecting equipment, obtains individual fingerprint image;
(2) extract individual fingerprint characteristic value from fingerprint image, as the fingerprint signature data, the identity of the sender of expression data, fingerprint characteristic value (minutiae point) is no less than 7;
Split the data to be transmitted bag, and details in fingerprint point data one by one be loaded in the small data packets after the partition by rule:
(1) data to be transmitted is divided into several packets, the small data packets number equates with the fingerprint minutiae number or becomes multiple to concern+1;
(2) the details in fingerprint point data is loaded into respectively in the individual data bag after the fractionation; Loading position begins the place for " individual data bag " M byte, and M is self-defined according to the length of small data packets by the user.When loading, to encrypt fingerprint minutiae.
Data take the fingerprint from the packet of receiving:
Receiving that the transmission data unpack, the position during loading from the individual data bag extracts the details in fingerprint point data, forms finger print data to be verified or to be identified;
Carry out fingerprint authentication and come specified data source and data integrity:
(1) if press loading method and loading position, can be all complete from the small data packets that receives, extract the details in fingerprint data, illustrate packet loss do not take place, prove the transmission data be complete;
(2), press loading method and form complete fingerprint characteristic Value Data the finger print data that from each small data packets, extracts;
(3) the fingerprint characteristic Value Data of take forming be stored in service end in advance, or claim the fingerprint template in the fingerprint base of receiving terminal to compare, if can find a fingerprint template that the match is successful, just can confirm transfer of data person's identity.
Compared with prior art, the advantage and the effect that have of the present invention is as follows:
1, the present invention utilizes individual finger print data and fingerprint identification technology, realizes the integrality and the non repudiation of data transmission procedure.It is fused to " identity information " (individual fingerprint characteristic) in " Transaction Information ", binds together symbiotic co-existence with Transaction Information.Realized the simultaneity of " checking " behavior and " transaction " behavior and integrated;
2, the present invention individual finger print data can be used as the digital signature use;
3, the present invention individual finger print data can be used as a method judging integrity of data transmission;
4, the present invention " authentication " carries out synchronously with " Transaction Information transmission ";
5, the present invention is equivalent to increase an authentication in the whole service system.
Four, description of drawings:
Fig. 1 is a flow chart of the present invention.
Fig. 2 is fingerprint characteristic value (fingerprint minutiae) data composition diagrams;
Fig. 3 splits schematic diagram for the data to be transmitted bag;
Fig. 4 is a finger print data loading method schematic diagram;
Fig. 5 is a finger print data loading position schematic diagram.
Five, embodiment:
Referring to Fig. 1, operating procedure of the present invention is as follows:
1, gathers finger print data from fingerprint equipment;
2, data to be transmitted package loads finger print data;
3, the transmission data unpack, and data take the fingerprint;
4, data integrity and source-verify.
Embodiment:
1, gather finger print data from fingerprint equipment:
(1) by fingerprint collecting equipment, obtains individual fingerprint image;
(2) extract individual fingerprint characteristic value from fingerprint image, as the fingerprint signature data, the identity of the sender of expression data, fingerprint characteristic value (minutiae point) is no less than 7.Fingerprint characteristic value (fingerprint minutiae) data are formed as Fig. 2.
2, in the data to be transmitted bag, load finger print data:
(1), the data to be transmitted bag is divided into several small data packets referring to Fig. 3.The small data packets number equates with the fingerprint minutiae number or becomes multiple to concern+1; The packet disassembly principle can five equilibrium, also can be self-defined, but be necessary for the multiple relation+1 of fingerprint minutiae.
(2) the fingerprint characteristic Value Data, be divided into several parts in order from front to back, fingerprint central point data and details in fingerprint point data are an independent sector, other each fingerprint minutiae is for being divided into independent sector one by one.These finger print datas after separately are loaded into respectively in the single small data packets after the fractionation in order.
Loading method as shown in Figure 4.
Loading position begins the place for " individual data bag " M byte, and M is self-defined according to the length of small data packets by the user, will encrypt when fingerprint minutiae loads.
Loading position as shown in Figure 5.
3, the data that from the small data packets of receiving, take the fingerprint:
In the data of receiving unpacked, the position when the individual data bag loads read out finger print data, and finger print data to be verified or to be identified is formed in the deciphering back.
4, data integrity and source-verify:
(1) if press loading method and loading position, can be all complete from the small data packets that receives, extract the details in fingerprint data, illustrate packet loss do not take place, prove the transmission data be complete;
(2), press loading method and form complete fingerprint characteristic Value Data the finger print data that from each small data packets, extracts;
(3) take fingerprint characteristic Value Data of forming and the fingerprint template that is stored in advance in the service end fingerprint base of (or claiming receiving terminal) to compare,, just can confirm transfer of data person's identity if can find a fingerprint template that the match is successful.

Claims (2)

1. method of utilizing fingerprint recognition to improve information transmission safety is characterized in that may further comprise the steps:
(1) gathers finger print data from fingerprint equipment, i.e. fingerprint characteristic value or title fingerprint minutiae;
(2) split the data to be transmitted bag, and details in fingerprint point data one by one is loaded in the small data packets after the partition by rule;
(3) data that from the packet of receiving, take the fingerprint;
(4) carry out fingerprint authentication and come specified data source and data integrity.
2. the method for utilizing fingerprint recognition to improve information transmission safety according to claim 1 is characterized in that may further comprise the steps:
Gather finger print data from fingerprint equipment, i.e. fingerprint characteristic value or title fingerprint minutiae:
(1) by fingerprint collecting equipment, obtains individual fingerprint image;
(2) extract individual fingerprint characteristic value from fingerprint image, as the fingerprint signature data, the identity of the sender of expression data, the fingerprint characteristic value minutiae point is no less than 7;
Split the data to be transmitted bag, and details in fingerprint point data one by one be loaded in the small data packets after the partition by rule:
(1) data to be transmitted is divided into several packets, the small data packets number equates with the fingerprint minutiae number or becomes multiple to concern+1;
(2) the details in fingerprint point data is loaded into respectively in the individual data bag after the fractionation; Loading position is that M byte of individual data bag begins the place, and M is self-defined according to the length of small data packets by the user, will encrypt when fingerprint minutiae loads;
Data take the fingerprint from the packet of receiving:
Receiving that the transmission data unpack, the position during loading from the individual data bag extracts the details in fingerprint point data, forms finger print data to be verified or to be identified;
Carry out fingerprint authentication and come specified data source and data integrity:
(1) if press loading method and loading position, can be all complete from the small data packets that receives, extract the details in fingerprint point data, illustrate packet loss do not take place, prove the transmission data be complete;
(2), press loading method and form complete fingerprint characteristic Value Data the finger print data that from each small data packets, extracts;
(3) the fingerprint characteristic Value Data of take forming be stored in service end in advance, or claim the fingerprint template in the fingerprint base of receiving terminal to compare, if can find a fingerprint template that the match is successful, just can confirm transfer of data person's identity.
CN2006101047814A 2006-10-20 2006-10-20 Method for utilizing fingerprint to improve information transmission security Expired - Fee Related CN101166083B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2006101047814A CN101166083B (en) 2006-10-20 2006-10-20 Method for utilizing fingerprint to improve information transmission security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2006101047814A CN101166083B (en) 2006-10-20 2006-10-20 Method for utilizing fingerprint to improve information transmission security

Publications (2)

Publication Number Publication Date
CN101166083A true CN101166083A (en) 2008-04-23
CN101166083B CN101166083B (en) 2012-01-04

Family

ID=39334592

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2006101047814A Expired - Fee Related CN101166083B (en) 2006-10-20 2006-10-20 Method for utilizing fingerprint to improve information transmission security

Country Status (1)

Country Link
CN (1) CN101166083B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103069848A (en) * 2010-08-13 2013-04-24 诺基亚公司 Method and apparatus for maintaining and verifying a transaction record
CN104573661A (en) * 2015-01-13 2015-04-29 北京天诚盛业科技有限公司 Fingerprint data processing method and device
CN105160315A (en) * 2015-08-31 2015-12-16 宇龙计算机通信科技(深圳)有限公司 Fingerprint verification method and device and terminal
CN110688638A (en) * 2018-07-04 2020-01-14 ***通信有限公司研究院 Service authentication method, device, medium and equipment

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB0004287D0 (en) * 2000-02-23 2000-04-12 Leeper Kim System and method for authenticating electronic documents
US7382905B2 (en) * 2004-02-11 2008-06-03 Microsoft Corporation Desynchronized fingerprinting method and system for digital multimedia data
US20060107056A1 (en) * 2004-11-17 2006-05-18 Dhiraj Bhatt Techniques to manage digital media

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103069848A (en) * 2010-08-13 2013-04-24 诺基亚公司 Method and apparatus for maintaining and verifying a transaction record
CN104573661A (en) * 2015-01-13 2015-04-29 北京天诚盛业科技有限公司 Fingerprint data processing method and device
CN105160315A (en) * 2015-08-31 2015-12-16 宇龙计算机通信科技(深圳)有限公司 Fingerprint verification method and device and terminal
CN110688638A (en) * 2018-07-04 2020-01-14 ***通信有限公司研究院 Service authentication method, device, medium and equipment

Also Published As

Publication number Publication date
CN101166083B (en) 2012-01-04

Similar Documents

Publication Publication Date Title
CN103679457B (en) Method of payment, the paying server and payment system for performing the method for payment
Halevi et al. Secure proximity detection for NFC devices based on ambient sensor data
US9965756B2 (en) Methods and arrangements for smartphone payments
CN103873244B (en) Identity authentication method and system in mobile payment based on fingerprint identification
CN106788972B (en) Train ticket self-service ticket buying and taking system based on block chain identity authentication
US20140244495A1 (en) Methods and arrangements for smartphone payments
CN105190659A (en) Methods and arrangements for smartphone payments and transactions
WO2012058639A8 (en) Method and system for processing transactions using a token
WO2014085478A3 (en) Systems and methods for processing electronic transactions based on consumer characteristics
EP2098985A3 (en) Secure financial reader architecture
CN106056196A (en) Modular fingerprint U disk and communication method thereof
GB2480581A (en) Dynamic remote peripheral binding
WO2006092393A3 (en) Multiple use secure transaction card
CN101166083B (en) Method for utilizing fingerprint to improve information transmission security
CN104463647A (en) Electronic invoice-based electronic posting method and system and electronic invoice client
CN109242663A (en) A kind of bookkeeping methods and system based on block chain technology
CN105975855B (en) A kind of malicious code detecting method and system based on apk certificate similitude
CN102307188A (en) Subscriber identity module (SIM)-based universal serial bus (USB) key encryption/decryption system and encryption/decryption method
CN110362719A (en) Data processing method, device, electric terminal and storage medium
CN105989259B (en) User ID authentication method, apparatus and system
CN109711516A (en) A kind of fake certification system and method based on NFC chip
CN103368736B (en) Business information encryption, decryption method and device
CN102571341A (en) Authentication system and method based on dynamic image
EP3576034A1 (en) Merchant transaction mirroring for personal point of sale (ppos) for card present e-commerce and in vehicle transaction
CN106131044A (en) A kind of identity identifying method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120104

Termination date: 20121020