Fingerprint sequential composition password authentification system

A combined password and fingerprint verification technology, which is applied in the field of fingerprint sequence combined password verification system, can solve the problems of not being able to fully guarantee the security of capital accounts, spying on transaction passwords, monitoring and stealing by Trojan horse programs on the Internet, and unable to guarantee verification security. Improve the effect of verification security, guarantee the effect of account and property security

Inactive Publication Date: 2016-01-27
谭荣兵
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these verification technologies still cannot fully guarantee the absolute safety of people’s property, because the transaction password is easy to be stolen by other people’s peeping, monitoring and network hacking Trojan horse program; However, it is sometimes inconvenient if you don’t carry it with you. Therefore, some companies have introduced fingerprint verification, which is a convenient verification technology that includes personal specific biometrics. This technology is even planned to be applied to the field of mobile payment. This technology has increased the security of verification, but as we all know, fingerprints, a unique biological feature of human beings, also have the risk of being easily stolen by criminals using fingerprint developer and other illegal means. Therefore, the current verification technology for capital payment using fingerprints People's comments are mixed, so in today's rapid development of information technology, these existing verification technologies can no longer guarantee the security of verification, and cannot fully guarantee the safety of people's capital accounts. It is necessary to combine existing technologies to invent a more advanced verification technology. , convenience, and higher security technology, and even in the future, it can adapt to high-tech network security verification systems such as mobile payment to protect people's funds, property, and account security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fingerprint sequential composition password authentification system
  • Fingerprint sequential composition password authentification system
  • Fingerprint sequential composition password authentification system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] figure 1 In order to facilitate the example description, in this embodiment, the ten fingers of the authorizer are numbered from 0 to 9 respectively, figure 2 In the process, the authorizer enters the terminal A through the fingerprint at the bank counter or the bank self-service terminal, and within the set time, such as 100 seconds, presses and enters the fingerprints of his own 3 fingers, No. 8, No. 6, No. 2, according to the order of the finger number 862268. For fingerprint information, the fingerprint verification system B respectively records multiple fingerprint texture information entered by the authorizer and the sequence of each fingerprint information is 862268. image 3 Among them, when the authorizer conducts a transaction, the authorizer needs to input the fingerprint information of the terminal A through the fingerprint, and enter the fingerprint information of his own 3 fingers, No. 8, No. 6, No. 2, according to the pre-set sequence 862268 within the s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a fingerprint sequential composition password authentification system. The system comprises a fingerprint input terminal and a fingerprint authentification system, and is technically characterized in that the fingerprint authentification system is provided with fingerprint information and sequence authentification procedures for recording information and an input sequence of over two fingerprints within a set period of time so as to carry out sequence authentification, and the sequence authentification procedure forms a group of specific fingerprint sequential composition password by using the input sequence of information of more than two fingerprints of a person. When applying for an account, a person can organize and combine the input sequence of several random fingers among the ten fingers through the fingerprint input terminal, the sequential composition password authentification system not only records information of every fingerprint input by the authorizer, but also records the input sequence of the fingerprint information, thereby forming a group of specific fingerprint sequential composition password, and when being required for authentification, the authorizer shall input the password on the fingerprint input terminal according to the preset input sequence of the fingerprints, thus to pass the system authentification. The system provided by the present invention is a novel authentification system which combines biological characteristics and mathematics probability at the same time.

Description

Technical field [0001] The invention relates to a combined cipher verification technology, in particular to a fingerprint sequential combination cipher verification system capable of performing sequence combination verification in combination with a specific sequence of human fingerprint identification. Background technique [0002] At present, combined password verification technology has been widely used in finance, network and military fields, especially in the fields of finance and network payment. Since combined password payment technology has always been a relatively convenient and safe verification method for people, it has been widely used, but it is currently widely used. The combined password verification technology used is to use the arrangement of Arabic numerals or the combination of numbers and letters. With the development of network technology, the bank card information and payment passwords of other people will be stolen through card readers or online. And o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00G06Q20/40
Inventor 谭荣兵
Owner 谭荣兵
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products