Fingerprint permutation and combination password

A technology of permutation and combination and fingerprint combination, which is applied in the field of fingerprint passwords, can solve the problems that fingerprint passwords cannot be used alone, and achieve the effect that it is not easy to crack

Inactive Publication Date: 2017-02-01
朱寅
View PDF6 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to solve the problem that the fingerprint password cannot be used alone, the present invention provides a fingerprint arrangement combination password, so that the fingerprint password can be used alone

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0011] Mark the fingerprints of the left finger from thumb to little finger as 1, 2, 3, 4, 5, and the fingerprints of the right hand as 6, 7, 8, 9, 0. Arrange these fingerprints into different combinations, such as 1, 3, 6, 9 arrangement means that the thumb and middle finger fingerprints of the left hand and the thumb and ring finger fingerprints of the right hand form a password.

Embodiment 2

[0013] Put a fingerprint arrangement and combination password into the chip, and integrate it into various products such as ID cards, bank cards, mobile phones, computers, and door locks

Embodiment 3

[0015] When installing a computer program, first pass the fingerprint array password authorization. Only authorized programs can run properly. Unauthorized programs cannot run and can be deleted by antivirus software.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a fingerprint permutation and combination password, which comprises a fingerprint permutation and combination method. The fingerprint permutation and combination password is put into a chip to be integrated into a computer, a mobile phone, an identity card, a bank card, various door locks and the like, and the program authentication and identification of the computer (mobile phone) is carried out. The method comprises the following steps of: independently marking the fingerprints of left fingers as 1,2,3,4 and 5 from a thumb to a little finger, independently marking the fingerprints of right fingers as 6,7,8,9 and 0 from a thumb to a little finger, and carrying out permutation and combination on the fingerprints to obtain the fingerprint permutation and combination password. According to the method, the fingerprints can be subjected to permutation and combination again to obtain a new fingerprint password, a user does not need to worry about that the fingerprints are stolen, and the fingerprint permutation and combination password can be used alone. Under triple protection that fingerprints, fingerprint combination and software need to be authorized by a fingerprint combination password, the fingerprint combination password fingerprint permutation and combination password can not be easily cracked.

Description

technical field [0001] The invention relates to a fingerprint cipher, in particular to a fingerprint arrangement and combination cipher. Background technique [0002] Fingerprint password is a widely used password. It has been widely used in notebook computers, mobile phones, cars, ID cards, bank payments, various door locks, attendance systems, (criminal) identification, etc. However, fingerprints can be stolen by leaving traces or by taking pictures. Each person's fingerprint is unique and cannot be changed. Once the fingerprint is hacked, all passwords are useless. Therefore, most of the current fingerprint passwords cannot be used alone, but are used in conjunction with other passwords (such as digital passwords). Contents of the invention [0003] In order to solve the problem that the fingerprint password cannot be used alone, the present invention provides a fingerprint arrangement combination password, so that the fingerprint password can be used alone. [000...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32
CPCG06F21/32G06F21/31G06F18/00
Inventor 朱寅
Owner 朱寅
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products