Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for double verification of fingerprint feature and key

A fingerprint feature and key technology, applied in the field of data processing, can solve the problems of leakage and insecurity of the authentication method, and achieve the effect of authentication

Active Publication Date: 2020-01-31
TERMINUSBEIJING TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The main purpose of the present invention is to provide a fingerprint feature and key double verification method and device, aiming to solve the technical problem of insecurity caused by the leakage of identity verification methods in the existing network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for double verification of fingerprint feature and key
  • Method and device for double verification of fingerprint feature and key
  • Method and device for double verification of fingerprint feature and key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0022] figure 1 It is a fingerprint feature and key double verification method provided in Embodiment 1 of this application. Such as figure 1 As shown, the method includes:

[0023] Registration steps: In environment 1, the user enters the user name ID-A and the static password PW-A on the local terminal, and then collects the fingerprint sampling sample FP through the fingerprint collector; the terminal uses the random key generation function Gen-A of fuzzy extraction technology (), process the input fingerprint feature FP, and use the Gen-A() algorithm to process the fingerprint feature FP to output a random password R-k and a public information P-A, and perform a hash operation on the user's static password PW-A to obtain the result y-a, y-a=H(R-k||PW-A), then delete the fingerprint feature FP and the static password PW-A, and the user terminal hashes the user name ID-A, the random key R-k and the static password to obtain the result y-a is sent to the authentication ser...

Embodiment 2

[0039] figure 2 It is a structural diagram of a fingerprint feature and key dual verification device provided in Embodiment 2 of the present application. Such as figure 2 As shown, the device includes:

[0040] Registration module: In environment 1, the user enters the user name ID-A and the static password PW-A on the local terminal, and then collects the fingerprint sampling sample FP through the fingerprint collector; the terminal uses the random key generation function Gen-A of fuzzy extraction technology (), process the input fingerprint feature FP, and use the Gen-A() algorithm to process the fingerprint feature FP to output a random password R-k and a public information P-A, and perform a hash operation on the user's static password PW-A to obtain the result y-a, y-a=H(R-k||PW-A), then delete the fingerprint feature FP and the static password PW-A, and the user terminal hashes the user name ID-A, the random key R-k and the static password to obtain the result y-a i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a fingerprint feature and key dual-verification method and device. The method comprises a registration step, an authentication step and a verification step. According to the method, operation is carried out through the user name, the static password and the fingerprint information, so that potential safety hazards in authentication among different environments are solved.

Description

technical field [0001] The invention relates to the technical field of data processing, in particular to a fingerprint feature and key double verification method and device. Background technique [0002] As people rely more and more on cyberspace, information exchanges and interactions in cyberspace are increasing, the network has become an important tool to promote social development, and network physical resources have become strategic resources in cyberspace. In a distributed environment, in order to facilitate the management of users, each region, industry, and department sets up a corresponding resource access control system to form a relatively independent environment. However, a single independent environment cannot provide complete application services. When users access resources in other environments, authentication between different environments is required. Usually, traditional authentication is mainly based on symmetric key system and public key cryptosystem. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/0869H04L9/3231H04L9/3236H04L63/0435H04L63/0861H04L63/0876
Inventor 刘丰
Owner TERMINUSBEIJING TECH CO LTD