Check patentability & draft patents in minutes with Patsnap Eureka AI!

Fingerprint authentication method and device based on SM9 encryption and computer equipment

A fingerprint authentication and computer program technology, applied in the field of network security, can solve the problems of low data transmission security and weak data confidentiality, and achieve the effect of ensuring orderliness

Pending Publication Date: 2022-03-25
CHINA SOUTHERN POWER GRID COMPANY
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Based on this, it is necessary to provide a fingerprint authentication method, device, computer equipment, computer-readable storage medium and computer program product for the above-mentioned fingerprint authentication mechanism data confidentiality is not strong and the security of data transmission is low.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fingerprint authentication method and device based on SM9 encryption and computer equipment
  • Fingerprint authentication method and device based on SM9 encryption and computer equipment
  • Fingerprint authentication method and device based on SM9 encryption and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0062] In one embodiment, such as figure 1 As shown, a fingerprint authentication method is provided, and this embodiment is illustrated by applying the method to a terminal. It can be understood that the method can also be applied to a server, and can also be applied to a system including a terminal and a server. The interactive realization of terminal and server. In this embodiment, the method includes the following steps:

[0063] Step S110, acquiring the application scene information where the terminal is currently located.

[0064] Wherein, the application scenario...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a fingerprint authentication method and device based on SM9 encryption and computer equipment. The method comprises the following steps: acquiring information of an application scene where a terminal is located currently; determining the number of authentication fingerprints needing to be collected according to the application scene information; when an access request is received, acquiring authentication fingerprint information corresponding to the number; performing signature processing on the authentication fingerprint information to obtain authentication fingerprint signature data of the number; and when any one piece of authentication fingerprint signature data in the number of authentication fingerprint signature data is not matched with the pre-stored initial fingerprint signature data, judging that the fingerprint authentication is not passed. By adopting the method, the confidentiality of data and the security of data transmission can be ensured.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a fingerprint authentication method, device, computer equipment, computer readable storage medium and computer program product. Background technique [0002] Fingerprint authentication technology is a biometric-based identity authentication technology. With the continuous development of terminal technology, fingerprint authentication has been widely used in the field of terminal security authentication. [0003] An existing terminal is usually provided with a fingerprint authentication component. When performing fingerprint authentication, the user only needs to input a single fingerprint on the fingerprint authentication component to complete the operation. However, since the fingerprint of the human body is relatively easy to obtain, when the fingerprint information is stolen, the fingerprint leakage will bring huge losses, and it will face greater security r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/32G06F21/60G06F21/64G06V40/12
CPCG06F21/32G06F21/602G06F21/64
Inventor 吴金宇陶文伟曹扬胡荣胡海生庞晓健
Owner CHINA SOUTHERN POWER GRID COMPANY
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More