Method for realizing fingerprint card and fingerprint card

A fingerprint card and fingerprint technology, which is applied in the field of fingerprint cards and fingerprint cards, can solve the problems of easy peeping of PIN codes, cardholder information security risks, leakage, etc.

Active Publication Date: 2021-03-16
FEITIAN TECHNOLOGIES
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the PIN code is entered by the cardholder, it is easy to be peeped or leaked by the terminal hijacking, which leads to the security risk of the cardholder's information
In addition, when the cardholder has multiple IC cards, the PIN codes of each card may be different, and the memory may be confused or the password may be forgotten, and the card cannot be used normally.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing fingerprint card and fingerprint card
  • Method for realizing fingerprint card and fingerprint card
  • Method for realizing fingerprint card and fingerprint card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] This embodiment provides a method for implementing a fingerprint card, such as figure 1 As shown, the method specifically includes:

[0038] Step 101, the card receives the instruction sent by the terminal, and judges the type of the instruction, and when the instruction is the third instruction including processing option data object list data, execute step 102;

[0039] Step 102, the card judges the value of its own application controller attribute,

[0040] When the value of the application controller attribute is the first preset value, the card verifies the user's fingerprint, obtains the fingerprint verification result, and judges whether the fingerprint verification result is a fingerprint verification success, if yes, execute step 103, if not, then the card setting Service rejection flag, go to step 104;

[0041] When the value of the application controller attribute is the second preset value, the card verifies the user's fingerprint, obtains the fingerprint ...

Embodiment 2

[0061] This embodiment provides a method for implementing a fingerprint card, such as figure 2 As shown, it specifically includes the following steps:

[0062] In step 200, the card receives the instruction sent by the terminal, and judges the type of the instruction. When the type of the instruction is the first instruction containing the application identifier of a specific application, perform step 201; when the type of the instruction is the application identifier containing the selected application when the type of the instruction is the third instruction containing the processing option data object list data, execute step 203; when the type of the instruction is the fourth instruction containing the specified read record, execute Step 204; when the type of the instruction is the fifth instruction including the type of application ciphertext request, execute step 205;

[0063] Step 201, the card generates a specific application list according to the identifier of the ap...

Embodiment 3

[0174] This embodiment provides a fingerprint card 300, such as image 3 shown, including:

[0175] A receiving module 31, configured to receive an instruction sent by the terminal;

[0176] The first judging module 32 is used to judge the type of instruction received by the receiving module 31;

[0177] The second judging module 33 is used for judging the value of the application controller property of the fingerprint card itself when the type of the first judging module 32 judging instruction is the third instruction including processing option data object list data;

[0178] Verification and acquisition judgment module 34, used for when the second judgment module 33 judges that the value of the application controller attribute of the fingerprint card itself is the first preset value, verify the user's fingerprint, obtain the fingerprint verification result, and judge whether the fingerprint verification result is Fingerprint verification is successful;

[0179] It is als...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the communication field, in particular to a method for realizing a fingerprint card and the fingerprint card. The implementation method of the fingerprint card includes: the card receives the instruction sent by the terminal and judges the type of the instruction. When the instruction is the third instruction containing the processing option data object list data, the card returns the default type according to the value of its own application attribute and the fingerprint verification result. The response to the third instruction of the type or the response to the third instruction of the fingerprint type. The present invention increases fingerprint verification in the process of using the card, and no password or signature needs to be input after the fingerprint verification is passed, which solves the problem that the card cannot be used because the password is forgotten.

Description

technical field [0001] The invention relates to the communication field, in particular to a method for realizing a fingerprint card and the fingerprint card. Background technique [0002] At present, when IC cards are used for business communication, the cardholder identity verification should be done according to the application controller returned by the IC card, usually the verification of the personal identification number (PIN). When the PIN code is entered by the cardholder, it is easy to be leaked by peeping or being hijacked by the terminal, resulting in a security risk of the cardholder's information. In addition, when the cardholder has multiple IC cards, he may not be able to use the cards normally due to confusion in memory or forgotten passwords due to the different PIN codes of each card. Contents of the invention [0003] The invention provides a method for realizing a fingerprint card and the fingerprint card, which solve the above-mentioned technical prob...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K9/00G06F21/32
CPCG06F21/32G06V40/1365G06F21/74
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products