Method and equipment for generating business code from fingerprint image

A fingerprint image and business password technology, which is applied in the field of generating business passwords from fingerprint images and in the security field, can solve problems such as failure to generate business passwords, small collections, and high probability of fingerprints generating the same number

Active Publication Date: 2013-01-23
CHINA MOBILE COMM GRP CO LTD
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The existing methods for generating authentication information from fingerprints have the following defects: the number of feature points distributed in each screen of the fingerprint is combined into a number, and the dynamic password generation elements are used to generate a business password. It is relatively small, and the probability of different fingerprints generating the same number is high, so the characteristic information of fingerprints cannot be effectively used to generate business passwords, and dynamic password generation elements need to be added to ensure the quality of business passwords
In addition, it is also necessary for the business platform to process the fingerprint image to obtain a number as the seed for generating the business password. If the existing business platform wants to use this method, it needs to be modified.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and equipment for generating business code from fingerprint image
  • Method and equipment for generating business code from fingerprint image
  • Method and equipment for generating business code from fingerprint image

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Specific embodiments of the present application will be described below with reference to the accompanying drawings.

[0019] figure 1 A method 1000 of generating a business password from a fingerprint image according to an embodiment of the present application is shown. like figure 1 As shown, in step S101, a plurality of fingerprint feature points are extracted from the collected fingerprint image. Fingerprint feature points can be extracted by, for example, techniques known to those skilled in the art, and fingerprint feature points include, but are not limited to, intersections and endpoints of ridges. The fingerprint image may, for example, be entered by a user on a fingerprint entry device of a terminal device, where the terminal device includes but is not limited to a USB handset.

[0020] In step S102, the point distance value between the two feature points is calculated according to the extracted fingerprint feature points. In an example, a coordinate syste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for generating a business code from a fingerprint image, and the method comprises the following steps of: collecting a plurality of fingerprint features from gathered fingerprinted images; calculating a dot spacing value of every two features according to the collected fingerprint features; selecting a plurality of the dot spacing values according to preset mathematic model so as to form a digital sequence; and carrying out Hash operation on the formed digital sequence so as to obtain a digest value thereof to be taken as the business code. The invention also provides equipment for generating the business code from the fingerprint image.

Description

technical field [0001] The present invention relates to the field of security, in particular to the field of generating business passwords from fingerprint images. Background technique [0002] In the prior art, the user needs to manually input the service password to complete the authentication, or directly send the locally stored user authentication information to complete the authentication. In the scenario where the user manually enters the password, too many passwords that are too long are easy to be forgotten, and short passwords are easy to be cracked, so there is a problem that the password is forgotten or cracked; in addition, the user needs to enter the password to complete the authentication, not only the operation steps are many , affecting the user experience, and the password is easily leaked, posing a security risk. In the scenario of directly sending user authentication information, although the user does not need to enter a password, the user experience is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06K9/00
Inventor 张艳黄海
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products