Method and device for double verification of fingerprint feature and key
A fingerprint feature and key technology, applied in the field of data processing, can solve the problems of leakage and insecurity of the authentication method, and achieve the effect of authentication
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0022] figure 1 It is a fingerprint feature and key double verification method provided in Embodiment 1 of this application. Such as figure 1 As shown, the method includes:
[0023] Registration steps: In environment 1, the user enters the user name ID-A and the static password PW-A on the local terminal, and then collects the fingerprint sampling sample FP through the fingerprint collector; the terminal uses the random key generation function Gen-A of fuzzy extraction technology (), process the input fingerprint feature FP, and use the Gen-A() algorithm to process the fingerprint feature FP to output a random password R-k and a public information P-A, and perform a hash operation on the user's static password PW-A to obtain the result y-a, y-a=H(R-k||PW-A), then delete the fingerprint feature FP and the static password PW-A, and the user terminal hashes the user name ID-A, the random key R-k and the static password to obtain the result y-a is sent to the authentication ser...
Embodiment 2
[0039] figure 2 It is a structural diagram of a fingerprint feature and key dual verification device provided in Embodiment 2 of the present application. Such as figure 2 As shown, the device includes:
[0040] Registration module: In environment 1, the user enters the user name ID-A and the static password PW-A on the local terminal, and then collects the fingerprint sampling sample FP through the fingerprint collector; the terminal uses the random key generation function Gen-A of fuzzy extraction technology (), process the input fingerprint feature FP, and use the Gen-A() algorithm to process the fingerprint feature FP to output a random password R-k and a public information P-A, and perform a hash operation on the user's static password PW-A to obtain the result y-a, y-a=H(R-k||PW-A), then delete the fingerprint feature FP and the static password PW-A, and the user terminal hashes the user name ID-A, the random key R-k and the static password to obtain the result y-a i...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


