CN101166083A - Method for utilizing fingerprint to improve information transmission security - Google Patents
Method for utilizing fingerprint to improve information transmission security Download PDFInfo
- Publication number
- CN101166083A CN101166083A CNA2006101047814A CN200610104781A CN101166083A CN 101166083 A CN101166083 A CN 101166083A CN A2006101047814 A CNA2006101047814 A CN A2006101047814A CN 200610104781 A CN200610104781 A CN 200610104781A CN 101166083 A CN101166083 A CN 101166083A
- Authority
- CN
- China
- Prior art keywords
- fingerprint
- data
- characteristic value
- minutiae
- individual
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Collating Specific Patterns (AREA)
Abstract
This invention relates to a method for increasing safety of information transmission by fingerprint identification, which utilizes personal fingerprint data and identifying technology to inosculate personal fingerprint character in trade information and bind them together including the following steps: 1, collecting fingerprint data from a fingerprint device, 2, loading its data onto data to be transmitted, 3, picking up data from transmitted data, 4, determining source and integrality of data by fingerprint verification.
Description
One, technical field:
The present invention relates to a kind of application process of fingerprint identification technology, especially relate to a kind of method of utilizing fingerprint recognition to improve information transmission safety.
Two, background technology:
In most of e-commerce transaction processes, issue account information, the business transaction information of service end by user's (client), all needs to be keep secret prevent to distort, and need to confirm Data Source.In traditional pattern of passing through " the checking identity is carried out transaction more earlier ", " authentication " is two processes of separating with " Transaction Information transmission ", and " identity " separates with " Transaction Information ", like this, just exists transaction security hidden danger.
Three, summary of the invention:
The present invention is in order to solve the weak point in the above-mentioned background technology, a kind of method of utilizing fingerprint recognition to improve information transmission safety is provided, it utilizes individual finger print data and fingerprint identification technology, realize the integrality and the non repudiation of data transmission procedure, individual fingerprint characteristic is fused in the Transaction Information, bind together with Transaction Information, realized the simultaneity of checking behavior and trading activity and integrated.
For achieving the above object, the technical solution used in the present invention is:
A kind of method of utilizing fingerprint recognition to improve information transmission safety, its special character is may further comprise the steps:
(1) gathers finger print data from fingerprint equipment, i.e. fingerprint characteristic value or title fingerprint minutiae;
(2) split the data to be transmitted bag, and details in fingerprint point data one by one is loaded in the small data packets after the partition by rule;
(3) data that from the packet of receiving, take the fingerprint;
(4) carry out fingerprint authentication and come specified data source and data integrity.
May further comprise the steps:
Gather finger print data from fingerprint equipment, i.e. fingerprint characteristic value or title fingerprint minutiae:
(1) by fingerprint collecting equipment, obtains individual fingerprint image;
(2) extract individual fingerprint characteristic value from fingerprint image, as the fingerprint signature data, the identity of the sender of expression data, fingerprint characteristic value (minutiae point) is no less than 7;
Split the data to be transmitted bag, and details in fingerprint point data one by one be loaded in the small data packets after the partition by rule:
(1) data to be transmitted is divided into several packets, the small data packets number equates with the fingerprint minutiae number or becomes multiple to concern+1;
(2) the details in fingerprint point data is loaded into respectively in the individual data bag after the fractionation; Loading position begins the place for " individual data bag " M byte, and M is self-defined according to the length of small data packets by the user.When loading, to encrypt fingerprint minutiae.
Data take the fingerprint from the packet of receiving:
Receiving that the transmission data unpack, the position during loading from the individual data bag extracts the details in fingerprint point data, forms finger print data to be verified or to be identified;
Carry out fingerprint authentication and come specified data source and data integrity:
(1) if press loading method and loading position, can be all complete from the small data packets that receives, extract the details in fingerprint data, illustrate packet loss do not take place, prove the transmission data be complete;
(2), press loading method and form complete fingerprint characteristic Value Data the finger print data that from each small data packets, extracts;
(3) the fingerprint characteristic Value Data of take forming be stored in service end in advance, or claim the fingerprint template in the fingerprint base of receiving terminal to compare, if can find a fingerprint template that the match is successful, just can confirm transfer of data person's identity.
Compared with prior art, the advantage and the effect that have of the present invention is as follows:
1, the present invention utilizes individual finger print data and fingerprint identification technology, realizes the integrality and the non repudiation of data transmission procedure.It is fused to " identity information " (individual fingerprint characteristic) in " Transaction Information ", binds together symbiotic co-existence with Transaction Information.Realized the simultaneity of " checking " behavior and " transaction " behavior and integrated;
2, the present invention individual finger print data can be used as the digital signature use;
3, the present invention individual finger print data can be used as a method judging integrity of data transmission;
4, the present invention " authentication " carries out synchronously with " Transaction Information transmission ";
5, the present invention is equivalent to increase an authentication in the whole service system.
Four, description of drawings:
Fig. 1 is a flow chart of the present invention.
Fig. 2 is fingerprint characteristic value (fingerprint minutiae) data composition diagrams;
Fig. 3 splits schematic diagram for the data to be transmitted bag;
Fig. 4 is a finger print data loading method schematic diagram;
Fig. 5 is a finger print data loading position schematic diagram.
Five, embodiment:
Referring to Fig. 1, operating procedure of the present invention is as follows:
1, gathers finger print data from fingerprint equipment;
2, data to be transmitted package loads finger print data;
3, the transmission data unpack, and data take the fingerprint;
4, data integrity and source-verify.
Embodiment:
1, gather finger print data from fingerprint equipment:
(1) by fingerprint collecting equipment, obtains individual fingerprint image;
(2) extract individual fingerprint characteristic value from fingerprint image, as the fingerprint signature data, the identity of the sender of expression data, fingerprint characteristic value (minutiae point) is no less than 7.Fingerprint characteristic value (fingerprint minutiae) data are formed as Fig. 2.
2, in the data to be transmitted bag, load finger print data:
(1), the data to be transmitted bag is divided into several small data packets referring to Fig. 3.The small data packets number equates with the fingerprint minutiae number or becomes multiple to concern+1; The packet disassembly principle can five equilibrium, also can be self-defined, but be necessary for the multiple relation+1 of fingerprint minutiae.
(2) the fingerprint characteristic Value Data, be divided into several parts in order from front to back, fingerprint central point data and details in fingerprint point data are an independent sector, other each fingerprint minutiae is for being divided into independent sector one by one.These finger print datas after separately are loaded into respectively in the single small data packets after the fractionation in order.
Loading method as shown in Figure 4.
Loading position begins the place for " individual data bag " M byte, and M is self-defined according to the length of small data packets by the user, will encrypt when fingerprint minutiae loads.
Loading position as shown in Figure 5.
3, the data that from the small data packets of receiving, take the fingerprint:
In the data of receiving unpacked, the position when the individual data bag loads read out finger print data, and finger print data to be verified or to be identified is formed in the deciphering back.
4, data integrity and source-verify:
(1) if press loading method and loading position, can be all complete from the small data packets that receives, extract the details in fingerprint data, illustrate packet loss do not take place, prove the transmission data be complete;
(2), press loading method and form complete fingerprint characteristic Value Data the finger print data that from each small data packets, extracts;
(3) take fingerprint characteristic Value Data of forming and the fingerprint template that is stored in advance in the service end fingerprint base of (or claiming receiving terminal) to compare,, just can confirm transfer of data person's identity if can find a fingerprint template that the match is successful.
Claims (2)
1. method of utilizing fingerprint recognition to improve information transmission safety is characterized in that may further comprise the steps:
(1) gathers finger print data from fingerprint equipment, i.e. fingerprint characteristic value or title fingerprint minutiae;
(2) split the data to be transmitted bag, and details in fingerprint point data one by one is loaded in the small data packets after the partition by rule;
(3) data that from the packet of receiving, take the fingerprint;
(4) carry out fingerprint authentication and come specified data source and data integrity.
2. the method for utilizing fingerprint recognition to improve information transmission safety according to claim 1 is characterized in that may further comprise the steps:
Gather finger print data from fingerprint equipment, i.e. fingerprint characteristic value or title fingerprint minutiae:
(1) by fingerprint collecting equipment, obtains individual fingerprint image;
(2) extract individual fingerprint characteristic value from fingerprint image, as the fingerprint signature data, the identity of the sender of expression data, the fingerprint characteristic value minutiae point is no less than 7;
Split the data to be transmitted bag, and details in fingerprint point data one by one be loaded in the small data packets after the partition by rule:
(1) data to be transmitted is divided into several packets, the small data packets number equates with the fingerprint minutiae number or becomes multiple to concern+1;
(2) the details in fingerprint point data is loaded into respectively in the individual data bag after the fractionation; Loading position is that M byte of individual data bag begins the place, and M is self-defined according to the length of small data packets by the user, will encrypt when fingerprint minutiae loads;
Data take the fingerprint from the packet of receiving:
Receiving that the transmission data unpack, the position during loading from the individual data bag extracts the details in fingerprint point data, forms finger print data to be verified or to be identified;
Carry out fingerprint authentication and come specified data source and data integrity:
(1) if press loading method and loading position, can be all complete from the small data packets that receives, extract the details in fingerprint point data, illustrate packet loss do not take place, prove the transmission data be complete;
(2), press loading method and form complete fingerprint characteristic Value Data the finger print data that from each small data packets, extracts;
(3) the fingerprint characteristic Value Data of take forming be stored in service end in advance, or claim the fingerprint template in the fingerprint base of receiving terminal to compare, if can find a fingerprint template that the match is successful, just can confirm transfer of data person's identity.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2006101047814A CN101166083B (en) | 2006-10-20 | 2006-10-20 | Method for utilizing fingerprint to improve information transmission security |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2006101047814A CN101166083B (en) | 2006-10-20 | 2006-10-20 | Method for utilizing fingerprint to improve information transmission security |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101166083A true CN101166083A (en) | 2008-04-23 |
CN101166083B CN101166083B (en) | 2012-01-04 |
Family
ID=39334592
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2006101047814A Expired - Fee Related CN101166083B (en) | 2006-10-20 | 2006-10-20 | Method for utilizing fingerprint to improve information transmission security |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101166083B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103069848A (en) * | 2010-08-13 | 2013-04-24 | 诺基亚公司 | Method and apparatus for maintaining and verifying a transaction record |
CN104573661A (en) * | 2015-01-13 | 2015-04-29 | 北京天诚盛业科技有限公司 | Fingerprint data processing method and device |
CN105160315A (en) * | 2015-08-31 | 2015-12-16 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint verification method and device and terminal |
CN110688638A (en) * | 2018-07-04 | 2020-01-14 | ***通信有限公司研究院 | Service authentication method, device, medium and equipment |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB0004287D0 (en) * | 2000-02-23 | 2000-04-12 | Leeper Kim | System and method for authenticating electronic documents |
US7382905B2 (en) * | 2004-02-11 | 2008-06-03 | Microsoft Corporation | Desynchronized fingerprinting method and system for digital multimedia data |
US20060107056A1 (en) * | 2004-11-17 | 2006-05-18 | Dhiraj Bhatt | Techniques to manage digital media |
-
2006
- 2006-10-20 CN CN2006101047814A patent/CN101166083B/en not_active Expired - Fee Related
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103069848A (en) * | 2010-08-13 | 2013-04-24 | 诺基亚公司 | Method and apparatus for maintaining and verifying a transaction record |
CN104573661A (en) * | 2015-01-13 | 2015-04-29 | 北京天诚盛业科技有限公司 | Fingerprint data processing method and device |
CN105160315A (en) * | 2015-08-31 | 2015-12-16 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint verification method and device and terminal |
CN110688638A (en) * | 2018-07-04 | 2020-01-14 | ***通信有限公司研究院 | Service authentication method, device, medium and equipment |
Also Published As
Publication number | Publication date |
---|---|
CN101166083B (en) | 2012-01-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103679457B (en) | Method of payment, the paying server and payment system for performing the method for payment | |
Halevi et al. | Secure proximity detection for NFC devices based on ambient sensor data | |
US9965756B2 (en) | Methods and arrangements for smartphone payments | |
CN103873244B (en) | Identity authentication method and system in mobile payment based on fingerprint identification | |
CN106788972B (en) | Train ticket self-service ticket buying and taking system based on block chain identity authentication | |
US20140244495A1 (en) | Methods and arrangements for smartphone payments | |
CN105190659A (en) | Methods and arrangements for smartphone payments and transactions | |
WO2012058639A8 (en) | Method and system for processing transactions using a token | |
WO2014085478A3 (en) | Systems and methods for processing electronic transactions based on consumer characteristics | |
EP2098985A3 (en) | Secure financial reader architecture | |
CN106056196A (en) | Modular fingerprint U disk and communication method thereof | |
GB2480581A (en) | Dynamic remote peripheral binding | |
WO2006092393A3 (en) | Multiple use secure transaction card | |
CN101166083B (en) | Method for utilizing fingerprint to improve information transmission security | |
CN104463647A (en) | Electronic invoice-based electronic posting method and system and electronic invoice client | |
CN109242663A (en) | A kind of bookkeeping methods and system based on block chain technology | |
CN105975855B (en) | A kind of malicious code detecting method and system based on apk certificate similitude | |
CN102307188A (en) | Subscriber identity module (SIM)-based universal serial bus (USB) key encryption/decryption system and encryption/decryption method | |
CN110362719A (en) | Data processing method, device, electric terminal and storage medium | |
CN105989259B (en) | User ID authentication method, apparatus and system | |
CN109711516A (en) | A kind of fake certification system and method based on NFC chip | |
CN103368736B (en) | Business information encryption, decryption method and device | |
CN102571341A (en) | Authentication system and method based on dynamic image | |
EP3576034A1 (en) | Merchant transaction mirroring for personal point of sale (ppos) for card present e-commerce and in vehicle transaction | |
CN106131044A (en) | A kind of identity identifying method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20120104 Termination date: 20121020 |