CN101166083B - Method for utilizing fingerprint to improve information transmission security - Google Patents

Method for utilizing fingerprint to improve information transmission security Download PDF

Info

Publication number
CN101166083B
CN101166083B CN2006101047814A CN200610104781A CN101166083B CN 101166083 B CN101166083 B CN 101166083B CN 2006101047814 A CN2006101047814 A CN 2006101047814A CN 200610104781 A CN200610104781 A CN 200610104781A CN 101166083 B CN101166083 B CN 101166083B
Authority
CN
China
Prior art keywords
fingerprint
data
details
characteristic value
data packets
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2006101047814A
Other languages
Chinese (zh)
Other versions
CN101166083A (en
Inventor
杨若冰
杨若松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Ziniu Technology Of Information Co ltd
Original Assignee
Xi'an Ziniu Technology Of Information Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xi'an Ziniu Technology Of Information Co ltd filed Critical Xi'an Ziniu Technology Of Information Co ltd
Priority to CN2006101047814A priority Critical patent/CN101166083B/en
Publication of CN101166083A publication Critical patent/CN101166083A/en
Application granted granted Critical
Publication of CN101166083B publication Critical patent/CN101166083B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Collating Specific Patterns (AREA)

Abstract

This invention relates to a method for increasing safety of information transmission by fingerprint identification, which utilizes personal fingerprint data and identifying technology to inosculate personal fingerprint character in trade information and bind them together including the following steps: 1, collecting fingerprint data from a fingerprint device, 2, loading its data onto data to be transmitted, 3, picking up data from transmitted data, 4, determining source and integrality of data by fingerprint verification.

Description

Utilize fingerprint recognition to improve the method for information transmission safety
One, technical field:
The present invention relates to a kind of application process of fingerprint identification technology, especially relate to a kind of method of utilizing fingerprint recognition to improve information transmission safety.
Two, background technology:
In most of e-commerce transaction processes, issue account information, the business transaction information of service end by user's (client), all needs to be keep secret prevent to distort, and need to confirm Data Source.In the pattern of traditional passing through " the checking identity is carried out transaction more earlier ", " authentication " with " the Transaction Information transmission,, be two processes of separating, " identity " separates with " Transaction Information ", like this, just exists transaction security hidden danger.
Three, summary of the invention:
The present invention is in order to solve the weak point in the above-mentioned background technology; A kind of method of utilizing fingerprint recognition to improve information transmission safety is provided; It utilizes individual finger print data and fingerprint identification technology, realizes the integrality and the non repudiation of data transmission procedure, is fused to individual fingerprint characteristic in the Transaction Information; Bind together with Transaction Information, realized the simultaneity of checking behavior and trading activity and integrated.
For realizing above-mentioned purpose, the technical scheme that the present invention adopts is:
A kind of method of utilizing fingerprint recognition to improve information transmission safety, its special character is may further comprise the steps:
(1) gathers finger print data from fingerprint equipment, i.e. fingerprint characteristic value or title fingerprint minutiae;
(2) split the data to be transmitted bag, and be loaded into details in fingerprint point data one by one in the small data packets after the partition by rule;
(3) data that from the packet of receiving, take the fingerprint;
(4) carry out fingerprint authentication and come specified data source and data integrity.
May further comprise the steps:
Gather finger print data from fingerprint equipment, i.e. fingerprint characteristic value or title fingerprint minutiae:
(1) through fingerprint collecting equipment, obtains individual fingerprint image;
(2) extract individual fingerprint characteristic value from fingerprint image, as the fingerprint signature data, the identity of the sender of expression data, fingerprint characteristic value (minutiae point) is no less than 7;
Split the data to be transmitted bag, and be loaded into details in fingerprint point data one by one in the small data packets after the partition by rule:
(1) be divided into several packets to data to be transmitted, the small data packets number equates with the fingerprint minutiae number or becomes multiple to concern+1;
(2) be loaded into the details in fingerprint point data respectively in the individual data bag after the fractionation; Loading position begins the place for " individual data bag " M byte, and M is self-defined according to the length of small data packets by the user.When loading, to encrypt fingerprint minutiae.
Data take the fingerprint from the packet of receiving:
Receiving that the transmission data unpack, the fetched during loading from the individual data bag goes out the details in fingerprint point data, forms finger print data to be verified or to be identified;
Carry out fingerprint authentication and come specified data source and data integrity:
(1) if press loading method and loading position, can be all complete from the small data packets that receives, extract the details in fingerprint data, explain packet loss do not take place, prove the transmission data be complete;
(2), press loading method and form complete fingerprint characteristic Value Data the finger print data that from each small data packets, extracts;
(3) the fingerprint characteristic Value Data of take forming be stored in service end in advance, or claim that the fingerprint template in the fingerprint base of receiving terminal compares, if can find a fingerprint template that coupling is successful, just can confirm transfer of data person's identity.
Compared with prior art, the advantage and the effect that have of the present invention is following:
1, the present invention utilizes individual finger print data and fingerprint identification technology, realizes the integrality and the non repudiation of data transmission procedure.It is fused to " identity information " (individual fingerprint characteristic) in " Transaction Information ", binds together symbiotic co-existence with Transaction Information.Realized the simultaneity of " checking " behavior and " transaction " behavior and integrated;
2, the present invention individual finger print data can be used as the digital signature use;
3, the present invention individual finger print data can be used as a method judging integrity of data transmission;
4, the present invention " authentication " carries out with " Transaction Information transmission " synchronously;
5, the present invention is equivalent to increase an authentication in the whole service system.
Four, description of drawings:
Fig. 1 is a flow chart of the present invention.
Fig. 2 is fingerprint characteristic value (fingerprint minutiae) data composition diagrams;
Fig. 3 splits sketch map for the data to be transmitted bag;
Fig. 4 is a finger print data loading method sketch map;
Fig. 5 is a finger print data loading position sketch map.
Five, embodiment:
Referring to Fig. 1, operating procedure of the present invention is following:
1, gathers finger print data from fingerprint equipment;
2, data to be transmitted package loads finger print data;
3, the transmission data unpack, and data take the fingerprint;
4, data integrity and source-verify.
Embodiment:
1, gather finger print data from fingerprint equipment:
(1) through fingerprint collecting equipment, obtains individual fingerprint image;
(2) extract individual fingerprint characteristic value from fingerprint image, as the fingerprint signature data, the identity of the sender of expression data, fingerprint characteristic value (minutiae point) is no less than 7.Fingerprint characteristic value (fingerprint minutiae) data are formed like Fig. 2.
2, in the data to be transmitted bag, load finger print data:
(1), is divided into several small data packets to the data to be transmitted bag referring to Fig. 3.The small data packets number equates with the fingerprint minutiae number or becomes multiple to concern+1; The packet disassembly principle can five equilibrium, also customized justice, but be necessary for the multiple relation+1 of fingerprint minutiae.
(2) the fingerprint characteristic Value Data, be divided into several parts in order from front to back, fingerprint central point data and details in fingerprint point data are an independent sector, other each fingerprint minutiae is for being divided into independent sector one by one.Be loaded into these finger print datas after separately in order respectively in the single small data packets after the fractionation.
Loading method is as shown in Figure 4.
Loading position begins the place for " individual data bag " M byte, and M is self-defined according to the length of small data packets by the user, will encrypt when fingerprint minutiae loads.
Loading position is as shown in Figure 5.
3, the data that from the small data packets of receiving, take the fingerprint:
In the data of receiving unpacked, the position when the individual data bag loads read out finger print data, and finger print data to be verified or to be identified is formed in the deciphering back.
4, data integrity and source-verify:
(1) if press loading method and loading position, can be all complete from the small data packets that receives, extract the details in fingerprint data, explain packet loss do not take place, prove the transmission data be complete;
(2), press loading method and form complete fingerprint characteristic Value Data the finger print data that from each small data packets, extracts;
(3) take fingerprint characteristic Value Data of forming and the fingerprint template that is stored in advance in the service end fingerprint base of (or claiming receiving terminal) to compare,, just can confirm transfer of data person's identity if can find a fingerprint template that coupling is successful.

Claims (2)

1. a method of utilizing fingerprint recognition to improve information transmission safety is characterized in that comprising following
Step:
(1) gather finger print data from fingerprint equipment, i.e. fingerprint characteristic Value Data, it comprises fingerprint central point data, details in fingerprint is counted out and the details in fingerprint point data;
(2) be divided into several small data packets to data to be transmitted, the small data packets number count out with details in fingerprint equate+1 or with the details in fingerprint number relation+1 of counting out at double;
It is an independent sector that fingerprint central point data and details in fingerprint are counted out; Each details in fingerprint point data is divided into independent sector one by one, and said fingerprint central point data, details in fingerprint is counted out and the details in fingerprint point data is loaded in the single small data packets after the fractionation in order; Loading position is that M byte of single small data packets begins the place, and M is self-defined according to the length of small data packets by the user, will encrypt during the fingerprint characteristic value data load;
(3) data that from the packet of receiving, take the fingerprint;
(4) carry out fingerprint authentication and come specified data source and data integrity:
If a presses loading method and loading position, can be all complete from the small data packets that receives,
Extract the details in fingerprint point data, explain packet loss does not take place, prove that the data of transmission are complete;
B, the finger print data that from each small data packets, extracts, press loading method and form complete fingerprint
Characteristic value data;
C, fingerprint characteristic Value Data that take to form and be stored in service end in advance, or claim the fingerprint base of receiving terminal
In fingerprint template compare, if can find a successful fingerprint template of coupling, just can confirm
Transfer of data person's identity.
2. according to the described method of utilizing fingerprint recognition to improve information transmission safety of claim l, it is characterized in that may further comprise the steps:
Gather finger print data from fingerprint equipment, i.e. fingerprint characteristic Value Data, it comprises fingerprint central point data, details in fingerprint is counted out and the details in fingerprint point data:
(1) through fingerprint collecting equipment, obtains individual fingerprint image;
(2) from the fingerprint image characteristic value data that takes the fingerprint, as the fingerprint signature data, the sending out of expression data
The person's of sending identity ,Details in fingerprint is counted out and is no less than 7;
Data take the fingerprint from the packet of receiving;
Receiving that transmits data packets unpacks, the fetched during loading from single small data packets goes out the details in fingerprint point data, forms finger print data to be verified or to be identified.
CN2006101047814A 2006-10-20 2006-10-20 Method for utilizing fingerprint to improve information transmission security Expired - Fee Related CN101166083B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2006101047814A CN101166083B (en) 2006-10-20 2006-10-20 Method for utilizing fingerprint to improve information transmission security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2006101047814A CN101166083B (en) 2006-10-20 2006-10-20 Method for utilizing fingerprint to improve information transmission security

Publications (2)

Publication Number Publication Date
CN101166083A CN101166083A (en) 2008-04-23
CN101166083B true CN101166083B (en) 2012-01-04

Family

ID=39334592

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2006101047814A Expired - Fee Related CN101166083B (en) 2006-10-20 2006-10-20 Method for utilizing fingerprint to improve information transmission security

Country Status (1)

Country Link
CN (1) CN101166083B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
BR112013003052A2 (en) * 2010-08-13 2019-09-24 Nokia Corp computer readable method, device, storage medium, and computer program product
CN104573661A (en) * 2015-01-13 2015-04-29 北京天诚盛业科技有限公司 Fingerprint data processing method and device
CN105160315A (en) * 2015-08-31 2015-12-16 宇龙计算机通信科技(深圳)有限公司 Fingerprint verification method and device and terminal
CN110688638B (en) * 2018-07-04 2021-07-06 ***通信有限公司研究院 Service authentication method, device, medium and equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1655500A (en) * 2004-02-11 2005-08-17 微软公司 Desynchronized fingerprinting method and system for digital multimedia data
CN1256633C (en) * 2000-02-23 2006-05-17 伯明翰***有限公司 A system and method for authenticating electronic documents
CN1777091A (en) * 2004-11-17 2006-05-24 英特尔公司 Techniques to manage digital media

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1256633C (en) * 2000-02-23 2006-05-17 伯明翰***有限公司 A system and method for authenticating electronic documents
CN1655500A (en) * 2004-02-11 2005-08-17 微软公司 Desynchronized fingerprinting method and system for digital multimedia data
CN1777091A (en) * 2004-11-17 2006-05-24 英特尔公司 Techniques to manage digital media

Also Published As

Publication number Publication date
CN101166083A (en) 2008-04-23

Similar Documents

Publication Publication Date Title
Halevi et al. Secure proximity detection for NFC devices based on ambient sensor data
JP6374906B2 (en) Track data encryption
EP2165452B1 (en) System and method for account identifier obfuscation
US20140244495A1 (en) Methods and arrangements for smartphone payments
CN105190659A (en) Methods and arrangements for smartphone payments and transactions
CN106056196A (en) Modular fingerprint U disk and communication method thereof
CN101166083B (en) Method for utilizing fingerprint to improve information transmission security
WO2004097597A3 (en) Systems and methods for validating identifications in financial transactions
MXPA05013422A (en) Systems and methods for conducting secure payment transactions using a formatted data structure.
WO2005045571A3 (en) Image-enabled item processing for point of presentment application
EP2098985A3 (en) Secure financial reader architecture
CN106557707A (en) A kind of method and system for processing document data
CN110362719A (en) Data processing method, device, electric terminal and storage medium
EP1251421A3 (en) Digital signature verifying method and apparatus
WO2010063154A1 (en) An automatic ticket issuing system, device and method
CN102279961A (en) Remote purchasing device and using method thereof
US20100179909A1 (en) User defined udk
CN104574119A (en) Commodity identifying and tracing method
CN103368736B (en) Business information encryption, decryption method and device
CN110009079A (en) A kind of label identification method and equipment based on two dimensional code
CN104112201B (en) The method of sending and receiving and equipment of electronic bill data
CN102571341A (en) Authentication system and method based on dynamic image
CN108460606A (en) A kind of method for anti-counterfeit based on two-dimensional code scanning and revene lookup
EP3576034A1 (en) Merchant transaction mirroring for personal point of sale (ppos) for card present e-commerce and in vehicle transaction
CN105592034B (en) Risk Identification Method and device for safety information interaction

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120104

Termination date: 20121020