Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for fingerprint decryption

A fingerprint, to-be-decrypted technology, applied in character and pattern recognition, instruments, computing, etc., can solve problems such as reducing data security, verifying fingerprint tampering, etc., to achieve the effect of improving data security

Active Publication Date: 2019-04-12
COOLPAD SOFTWARE TECH (SHENZHEN) CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, in the existing encryption and decryption system, the application processor performs the decryption process after the fingerprint identification is passed, and the application processor needs to obtain the user fingerprint and the pre-stored verification fingerprint from other different modules respectively when performing fingerprint identification. In the process of obtaining verification fingerprints from other modules, verification fingerprints are often at risk of being tampered with, reducing data security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for fingerprint decryption
  • Method and system for fingerprint decryption
  • Method and system for fingerprint decryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0029] It should be noted that the terms used in the embodiments of the present invention are only for the purpose of describing specific embodiments, and are not intended to limit the present invention. As used in the embodiments of the present invention and the appended claims, the singular forms "a", "said" and "the" are also intended to include the plural forms unless the context clearly indicates otherwise. It should also be understood that the term "and / or" a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a fingerprint decryption method, which includes: obtaining a user fingerprint through a fingerprint recognition module; sending the user fingerprint to a security module; verifying the user fingerprint through the security module according to a preset verification fingerprint, and storing the verification fingerprint In the security module; when the verification is passed, the data to be decrypted is decrypted. With the present invention, the verification fingerprint preset in the safety module is compared and verified with the user fingerprint sent by the fingerprint identification module through the safety module. Risk of tampering and increased data security.

Description

technical field [0001] The invention relates to the field of data encryption, in particular to a fingerprint decryption method and system. Background technique [0002] With the development of science and technology, a large amount of data needs to be transmitted and stored. In order to ensure that the data is prevented from being stolen by others during the process of transmission or storage, resulting in the leakage of confidentiality, it is often necessary to encrypt the data. At present, data encryption methods are becoming more and more diverse, for example, fingerprint recognition, palmprint recognition, iris recognition, facial recognition and so on. [0003] Fingerprints are the uneven lines on the skin at the end of a person's fingers. The lines are arranged regularly to form different grain types. The starting point, ending point, joint point and bifurcation point of the ridge line are called the detail feature points of the fingerprint. Fingerprints are someth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06K9/00
CPCG06F18/00
Inventor 吴炽强
Owner COOLPAD SOFTWARE TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products