Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for utilizing fingerprint to improve information transmission security

A technology of information transmission and fingerprint identification, which is applied in transmission systems, digital transmission systems, secure communication devices, etc., and can solve problems such as transaction security risks

Inactive Publication Date: 2008-04-23
XIAN ZINIU TECH OF INFORMATION
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the traditional mode of "identity verification first, then transaction execution", "identity verification" and "transaction information transmission" are two separate processes, and "identity" and "transaction information" are separated. In this way, there is Transaction security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for utilizing fingerprint to improve information transmission security
  • Method for utilizing fingerprint to improve information transmission security
  • Method for utilizing fingerprint to improve information transmission security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0040] 1. Collect fingerprint data from the fingerprint device:

[0041] (1) Obtain personal fingerprint images through fingerprint collection equipment;

[0042] (2) Extract personal fingerprint feature values ​​from the fingerprint image as fingerprint signature data, indicating the identity of the sender of the data, and there are no less than 7 fingerprint feature values ​​(detail points). The fingerprint feature value (fingerprint minutiae) data composition is as follows: figure 2 .

[0043] 2. Load fingerprint data in the data packet to be transmitted:

[0044] (1) see image 3 , Divide the data packet to be transmitted into several small data packets. The number of small data packets is equal to or multiplied by the number of fingerprint detail points +1; the principle of data packet splitting can be divided into equal parts or customized, but it must be the multiple relationship of fingerprint detail points +1.

[0045] (2) The fingerprint feature value data is d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention relates to a method for increasing safety of information transmission by fingerprint identification, which utilizes personal fingerprint data and identifying technology to inosculate personal fingerprint character in trade information and bind them together including the following steps: 1, collecting fingerprint data from a fingerprint device, 2, loading its data onto data to be transmitted, 3, picking up data from transmitted data, 4, determining source and integrality of data by fingerprint verification.

Description

1. Technical field: [0001] The invention relates to an application method of fingerprint identification technology, in particular to a method for improving information transmission security by using fingerprint identification. 2. Background technology: [0002] In the process of most e-commerce transactions, the account information and business transaction information sent by the user (client) to the server need to be kept confidential to prevent tampering, and the source of the data needs to be confirmed. In the traditional mode of "identity verification first, then transaction execution", "identity verification" and "transaction information transmission" are two separate processes, and "identity" and "transaction information" are separated. In this way, there is Transaction security risks. 3. Contents of the invention: [0003] In order to solve the deficiencies in the above-mentioned background technology, the present invention provides a method for improving the secur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00G06K9/32
Inventor 杨若冰杨若松
Owner XIAN ZINIU TECH OF INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products