[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN107517217A - A kind of multiple-factor wireless key fill system based on fingerprint recognition - Google Patents

A kind of multiple-factor wireless key fill system based on fingerprint recognition Download PDF

Info

Publication number
CN107517217A
CN107517217A CN201710824115.6A CN201710824115A CN107517217A CN 107517217 A CN107517217 A CN 107517217A CN 201710824115 A CN201710824115 A CN 201710824115A CN 107517217 A CN107517217 A CN 107517217A
Authority
CN
China
Prior art keywords
user
login
wireless key
fingerprint
fill system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710824115.6A
Other languages
Chinese (zh)
Inventor
罗森林
韩飞
蔺星宇
王煜
陈郁
张晶心
赵琪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Technology BIT
Original Assignee
Beijing Institute of Technology BIT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Technology BIT filed Critical Beijing Institute of Technology BIT
Priority to CN201710824115.6A priority Critical patent/CN107517217A/en
Publication of CN107517217A publication Critical patent/CN107517217A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of multiple-factor wireless key fill system based on fingerprint recognition, belong to information security field.Including:User logs in PC end systems software when receiving login instruction, obtains the ID values for logging in application software;Mobile hardware terminal determines subscriber identity information according to login user finger print information;Mobile hardware terminal obtains user login code according to the subscriber identity information, and according to the ID values for logging in application software simultaneously;End user logs in PC end system softwares and user login code is decrypted and realizes the automatic filling of user login code and the automated log on of the user account.The wireless key fill system of the present invention can fill the account password of login user automatically;And, in login process, wireless key fill system can be by identifying the finger print information of user, and user account password is encrypted by using strong encryption keys mechanism, efficiently avoid login user in the security filled using account password in wireless key fill system login process.

Description

A kind of multiple-factor wireless key fill system based on fingerprint recognition
Technical field
The present invention relates to a kind of multiple-factor wireless key fill system based on fingerprint recognition.From the angle of application scenarios Say, belong to information security field;From the perspective of technology realization, secret communication field is also belonged to.
Background technology
The attention degree of oneself privacy is deepened along with modern day user, the security intensity of user account number has also obtained more next Higher concern.When the user account password gradually increased undoubtedly brings the waste and login of memory time to user Between waste, once and usersaccount information be cracked, the leakage of privacy of user will also result in immeasurable consequence.For This, furthers investigate key management algorithm, carries out security protection using multiple-factor authentication means to key, helps avoid user's account Number login time it is long and log in when security intensity it is inadequate the problem of occur.It is anti-that safety is carried out using multiple-factor authentication means Shield can not only improve the security intensity of user account number, and the security protection for country and society is also significant.
Fingerprint identification technology was proposed by Britain phytomorph scholar Grew in 1684 earliest;By fingerprint identification technology application It is to carry out criminal case by FBI and Paris, FRA police office employing fingerprint identification technology the 1960s to detect to daily life Examine;In the 1990s, the Automated Fingerprint Identification System for personal identification identification is able to development and application.
Fingerprint identification technology includes four fingerprint pattern acquisition, fingerprint classification, Finger print characteristic abstract and fingerprint matching passes Key technology.Fingerprint pattern obtain include fingerprint pattern compression with processing two processes, fingerprint pattern compress main method have JPEG, WSQ, EZW etc., the main process of fingerprint pattern processing include finger-print region detection, picture quality judgement, directional diagram and frequency and estimated Meter, image enhaucament, Fingerprint Image Binarization and refinement etc..Fingerprint classification is divided with the grown form of core and triangle , fingerprint is divided into three major types type, nine kinds of forms by the fingerprint analysis method of China ten.Fingerprint is divided into by general automatic system of fingerprint recognition Arch pattern (plain arch, tented arch), loop (left dustpan, right dustpan), whorl and miscellaneous shape line etc..Finger print characteristic abstract is for above The fingerprint obtained extracts to characteristics such as its end points, bifurcation, isolated point, short bifurcated, rings, due to streakline end points The chance occurred with bifurcation in fingerprint is most, most stable, and easily obtains, therefore can be to referring to by this two category features point Line characteristic matching.Fingerprint matching is to be matched by the fingerprint characteristic obtained with the finger print information in fingerprint base, is matched Mode includes one-to-one and one-to-many two ways.
Authentication is the key to ensure information safety, certification skill of the development experience of identity identifying technology based on password The stages such as art, the authentication techniques based on smart card, the authentication techniques based on password and the authentication techniques based on biological characteristic.It is based on The certification of password is a kind of authentication techniques for being easiest to realize, it is advantageous that certification is easy, cost is low, speed is fast, but password is recognized The security of card is poor.Usual people are in order to simplify memory, tend to select weak passwurd, but weak passwurd is difficult to resist malice to attack Hit.In particular with the raising of computer techno-stress distribution computing capability, the unsafe factor of weak passwurd is also constantly increasing.By Possess independent processor in smart card, can be by program safety processing data, therefore the authentication mode based on smart card improves The deficiency of password authentication, strengthen the security performance of authentication.Authentication mode based on living things feature recognition is given birth to human body Thing is characterized as foundation, and certification is realized using Computer Image Processing and mode identification technology.Biometrics identification technology has it The incomparable reliability of its authentication techniques, fingerprint recognition are one kind more perfect in current biometrics identification technology.
Safety certification of the multiple-factor including steric factor, the behavior factor, transmission encryption factor etc..Steric factor refers to System described by the algorithm has device IP identification and physical positioning function, can prevent cipher stealing;The behavior factor refers to this System described by algorithm can be based on user operation habits, identify abnormal operation;Transmission encryption factor refers to described by the algorithm System is to log in communication loop between end and external hardware equipment in real time based on asymmetric key mechanisms algorithms such as RSA to make user The safety in border.
Key is a kind of parameter, and it is to be converted to ciphertext in plain text or converting ciphertext into the algorithm of plaintext the ginseng that inputs Number.Key management is then the behavior being managed to key, including the content such as encrypts, decrypts, cracking.Key management is embodied in close The generation of key is to the various aspects in the destruction of key.The main generation for finding expression in management system, management agreement and key, divide Match somebody with somebody, change and inject.Multiple-factor certification is then the password authentification of communication apparatus possessed, the fingerprint knowledge by system in itself Not, the function such as Bluetooth pairing, it is possible to achieve including static password checking, living things feature recognition, hardware equipment information certification etc. Multiple-factor authentication.So user, which only needs to hold mobile device, can complete authentication, both the safety of guaranteed service scene Property demand, can also meet user account log in convenience demand.
Summary, identity identifying technology has his own strong points at present, and there is also shortcoming.Such as in the side using biological characteristic authentication Face, the reliability of collection result can be directly influenced by gathering the quality of port;In the certification based on physics password, password be present The problems such as management and algorithm security.In theoretical and technical research aspect, existing authentication mode needs further to send out Exhibition.Meanwhile fingerprint identification technology is more and more being applied to information security field, but these cryptographic systems are used for yard Institute, common people also is arrived without widely available, family oriented, personalized key management method are still left to be desired.With science and technology Development, the fingerprint recognition system of intelligent facilitation substitute traditional physics cipher authentication system to be extremely urgent.
The content of the invention
The purpose of the present invention is:The complexity of password remembers difficulty into just with it when carrying out Account Logon for active user Than the problem of, propose that a kind of user account logs in the key management algorithm for the high safety for exempting from keyboard typing.Reach portability management User account, automatic identification, the purpose of auto login user account.
The present invention design principle be:Key management is carried out in movable termination for current research selection, in user's account Family logs in end and carries out the identification that user logs in application.Use a kind of key mechanism based on RSA Algorithm based on this, to Family account password is encrypted.The storage that matching hardware terminal carries out user account password is designed based on this, with And the communication of end terminal is logged in user account.Fingerprint bio information identification module is set with to the close of hardware end in hardware terminal Code data management carries out the limitation of authority.The present invention can be filled automatically for user account password, fully realize key The purpose exempted from Memorability, reach safe and convenient login user account.
The technical scheme is that be achieved by the steps of:
Step 1, application software application ID, user account and login password are obtained, and it is whole to hardware by encrypted transmission End is preserved;
Step 1.1, the user is logged in into PC ends and carries out Bluetooth pairing with mobile hardware terminal, logged in user under PC ends System software corresponding with mobile hardware terminal is carried, is carried out by bluetooth serial ports logical between system software and mobile hardware terminal News;
Step 1.2, it is wireless by inputting user name and login password completion multiple-factor when user is carried out using logging in After the authentication of key fill system software, application software ID, user account and login password are obtained;
Step 1.3, after the multiple-factor wireless key fill system uses RSA key encryption mechanism to login password, even Together transmitted to mobile hardware terminal by bluetooth serial ports with application software application ID and user account;
Step 2, hardware terminal collection user fingerprints information, is preserved to mobile terminal;
Step 2.1, after hardware terminal obtains application software application ID, user account and login password, user is prompted to enter Row finger print information certification;
Step 2.2, hardware terminal gathers user fingerprints information by fingerprint sensor, the use obtained according to fingerprint sensor Family finger print information, texture feature extraction is carried out, obtain the end points and branch point of fingerprint image;
Step 2.3, hardware terminal stores to user fingerprints information, while stores the application software application ID, uses Family account and login password, and the access path established between three with guarantee carry out user profile matching;
Step 3, when application software logs in, obtain it and apply ID, and send to hardware terminal;
Step 4, hardware terminal collection user fingerprints information, verifies fingerprint;
Step 4.1, hardware terminal carries out the user fingerprints information collected and saved user fingerprints information Match somebody with somebody, if user fingerprints information is not present in user fingerprints information storehouse, authentication failure message is sent in multiple-factor by hardware terminal Wireless key fill system software;
Step 5, finger print identifying is by the way that the same application ID of pitching pile mobile terminal account number cipher, encrypted transmission is extremely applied;
Step 6, system software fills user login code automatically;
Step 6.1, the multiple-factor wireless key fill system obtains user login code, and the login password is used RSA key mechanism is decrypted;
Step 6.2, multiple-factor wireless key fill system identification application software Password Input frame, while by decryption User login code is filled and completes the automated log on of application automatically.
Beneficial effect
Compared to conventional cipher management software, the method proposed by the present invention that user account password is stored in hardware terminal The security of user account password management is improved, by the way that user account password is stored in into hardware terminal, user can be avoided Account password by Brute Force and user account password it is online under be compromised the problem of occur, while hardware terminal of the present invention Also there is the function of anti-" fishing website ", reached the high reliability of user account password management, high security and exempted to remember Property.
The present invention expands fingerprint identity validation to PC and other users Account Logon place from mobile phone terminal, it is only necessary to logical Cross bluetooth by user account log in platform be connected with user account password management terminal can realize user account password oneself Dynamic filling, user account password is reached and has managed pervasive effect.
Brief description of the drawings
Fig. 1 is the multiple-factor wireless key fill system embodiment schematic flow sheet of the invention based on fingerprint recognition
Fig. 2 is the multiple-factor wireless key fill system embodiment high-level schematic functional block diagram of the invention based on fingerprint recognition;
Fig. 3 is the multiple-factor wireless key fill system structural representation of the invention based on fingerprint recognition;
Embodiment
In order to better illustrate objects and advantages of the present invention, with reference to the accompanying drawings and examples to the reality of the inventive method The mode of applying is described in further details.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, not For limiting the present invention.
The present invention provides a kind of multiple-factor wireless key fill system based on fingerprint recognition.The wireless key fill system Such as it can be filled for the hardware terminal with password storage and user's physiologic information identification function and with key And the software end composition of procedure identification function.Reference picture 1, Fig. 1 are the multiple-factor wireless key of the invention based on fingerprint recognition The schematic flow sheet of fill system constructive embodiment, the multiple-factor wireless key filling system proposed by the present invention based on fingerprint recognition System comprises the following steps:
Step 1, application software application ID, user account and login password are obtained, and it is whole to hardware by encrypted transmission End is preserved;
In the present embodiment, PC ends can be logged in user and downloads multiple-factor wireless key fill system software, complete body Start the system software after part certification, and the user is logged in into PC ends and completes Bluetooth pairing with mobile hardware terminal.Institute State user to log in application process, cursor of mouse is stopped at into Password Input frame, multiple-factor wireless key fill system software will Identify that the user logs in application, and recognition result, i.e. user's login are sent whole to mobile hardware using ID values by serial ports End.
Meanwhile request user is also inputted user account and logged in close by the multiple-factor wireless key fill system software Code, is then sent the user account and login password to mobile hardware terminal by serial ports.
Wherein, in the authentication of the system software, to user login code use MD5 algorithm for encryption after together with Name in an account book is stored in user and logs in PC ends jointly.
Further, in the present embodiment, transmission is encrypted using RSA key mechanism to user login code.It is described System software has public key IDJ, and mobile hardware terminal has private key ITG, and IDJ and ITG is reciprocal.User logs in end collection user Name and user account login password m after, system software is transmitted after being encrypted using public key IDJ to it to mobile hardware terminal.Move Dynamic hardware terminal decrypts the user name and user account login password using private key ITG, and encrypts to obtain using private key ITG User name and user account password ciphertext m ', are stored in log-on message database.Public key IDJ and private key described herein ITG is preserved can be with the contrary, hold public key IDJ by mobile terminal.
Step 2, hardware terminal collection user fingerprints information, is preserved to mobile terminal;
In the present embodiment, hardware terminal receive the user log in apply ID values and user account when, will carry The user that wakes up carries out identity information typing;The user can carry out fingerprint typing by external fingerprint sensor, whole in hardware After end obtains the user fingerprints information, the subscriber identity information word bank is created in hardware terminal user fingerprints information database.
Wherein, user fingerprints information collection detailed process is that user fingerprints information is gathered according to fingerprint sensor, gone forward side by side Row texture feature extraction, obtain the end points and branch point of fingerprint image;Finger print characteristic abstract has obtained for described previously Fingerprint the characteristics such as its end points, bifurcation, isolated point, short bifurcated, ring are extracted, according to the fingerprint characteristic value that extracts i.e. The typing of user fingerprints information can be completed;And fingerprint characteristic can be divided into arch pattern (plain arch, tented arch), loop (left dustpan, Right dustpan), whorl and miscellaneous shape line etc..
Step 3, when application software logs in, obtain it and apply ID, and send to hardware terminal;
In the present embodiment, when user, which logs in, to apply, the multiple-factor wireless key fill system software refers to identification It is fixed to log in application and log in application by obtaining focus active process to obtain apply ID values, while pass through bluetooth connection user End and hardware terminal are logged in, the application of acquisition is applied ID by multiple-factor wireless key fill system software by serial ports Value is transmitted to hardware terminal.
Step 4, hardware terminal collection user fingerprints information, verifies fingerprint;
Step 4.1, hardware terminal carries out the user fingerprints information collected and saved user fingerprints information Match somebody with somebody, if user fingerprints information is not present in user fingerprints information storehouse, authentication failure message is sent in multiple-factor by hardware terminal Wireless key fill system software;
In the present embodiment, hardware terminal obtains login user finger print information by fingerprint sensor, by the way that user is referred to Line information is matched with the finger print information storehouse in hardware terminal, you can completes the identification to subscriber identity information.If fingerprint is believed The user fingerprints information is not present in storehouse in breath, then user is by finger print information certification, and hardware terminal is by user fingerprints identity Authentication failure message is sent in the multiple-factor wireless key fill system software by serial ports.
Wherein, fingerprint collecting and the detailed process of matching are that user fingerprints information is gathered according to fingerprint sensor, and Texture feature extraction is carried out, obtains the end points and branch point of fingerprint image;Finger print characteristic abstract has obtained for described previously The fingerprint taken extracts to characteristics such as its end points, bifurcation, isolated point, short bifurcated, rings, because streakline end points and bifurcation exist The chance occurred in fingerprint is most, most stable, and easily obtains, therefore can be to fingerprint characteristic by this two category features point Match somebody with somebody.Fingerprint matching is to be matched by the fingerprint characteristic obtained with the finger print information in fingerprint base, and matching way includes One-to-one and one-to-many two ways.And fingerprint characteristic can be divided into arch pattern (plain arch, tented arch), loop (left dustpan, Right dustpan), whorl and miscellaneous shape line etc..
Step 5, finger print identifying is by, the same application ID of pitching pile mobile terminal account number cipher, and user is logged in close Code is transmitted to application;
In the present embodiment, after hardware terminal is by user fingerprints information certification, by the same application of pitching pile mobile terminal ID account number cipher.I.e. in subscriber identity information word bank, user account corresponding with presently described application ID values can be obtained Password, mobile terminal will be transmitted to multiple-factor wireless key with the private key ITG user account password m ' encrypted and filled out by serial ports Charging system software.
Step 6, system software fills user login code automatically.
Step 6.1, the multiple-factor wireless key fill system software obtains close with user's login of private key encryption Code, the login password is obtained in plain text using public key decryptions;
In the present embodiment, the user account password is used public key IDJ by multiple-factor wireless key fill system software Processing, system software are decrypted to user login code m ' using public key IDJ and can obtain user login code plaintext m.
Step 6.2, multiple-factor wireless key fill system identification application software Password Input frame, while by decryption User login code is filled and completes the automated log on of application automatically.
In the present embodiment, application end cursor of mouse is logged in user to be still located on the user account to log in end password defeated Enter frame, the user account password after decryption will be filled in the user account automatically and log in end Password Input frame.Decrypt it The user account password afterwards will inject the carriage return character in tail row, to realize the automated log on of the user account.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row His property includes, so that process, method, article or device including a series of elements not only include those key elements, and And also include the other element being not expressly set out, or also include for this process, method, article or device institute inherently Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this Other identical element also be present in the process of key element, method, article or device.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal equipment (can be mobile phone, computer, clothes Be engaged in device, air conditioner, or network equipment etc.) perform method described in each embodiment of the present invention.
The preferred embodiments of the present invention are these are only, are not intended to limit the scope of the invention, it is every to utilize this hair The equivalent structure or equivalent flow conversion that bright specification and accompanying drawing content are made, or directly or indirectly it is used in other related skills Art field, is included within the scope of the present invention.

Claims (7)

1. a kind of multiple-factor wireless key fill system based on fingerprint recognition, it is characterised in that methods described includes following step Suddenly:
Step 1, application software application ID, user account and login password are obtained, and is entered by encrypted transmission to hardware terminal Row preserves;
Step 2, hardware terminal collection user fingerprints information, is preserved to mobile terminal;
Step 3, when application software logs in, obtain it and apply ID, and send to hardware terminal;
Step 4, hardware terminal collection user fingerprints information, verifies fingerprint;
Step 5, finger print identifying is by the way that the same application ID of pitching pile mobile terminal account number cipher, encrypted transmission is extremely applied;
Step 6, system software fills user login code automatically.
2. the multiple-factor wireless key fill system according to claim 1 based on fingerprint recognition, it is characterised in that key Store method is:
When user inputs login password, described multiple-factor wireless key fill system is transmitted to shifting after login password is encrypted Dynamic terminal;
Mobile terminal preserves user login code, and establishes the user account matched with login password and link road using ID Footpath.
3. the multiple-factor wireless key fill system according to claim 1 based on fingerprint recognition, it is characterised in that described The method of user account and cipher key delivery is:
Carried out being logged in by the successful user of Bluetooth pairing between PC ends and the system mobile hardware terminal by serial ports The transmission of user account and login password;
In cipher key transmitting process, user name and user login code are encrypted and decrypted using RSA key mechanism.
4. the multiple-factor wireless key fill system according to claim 1 based on fingerprint recognition, it is characterised in that hard Part terminal gathers user fingerprints information, and the step of verify fingerprint in, the algorithm for carrying out fingerprint matching is:
User fingerprints information is gathered according to fingerprint sensor, and carries out texture feature extraction, obtain the end points of fingerprint image with And branch point;
Matching image end points and branch point are grouped, dot pattern is carried out by the minutiae point of every group of point and template image Match somebody with somebody to realize fingerprint matching.
5. the multiple-factor wireless key fill system according to claim 1 based on fingerprint recognition, it is characterised in that it is more because Sub- wireless key fill system is taken based on the authenticating user identification mechanism of password authentication, and user need to input user name and step on Password is recorded, user login PC ends are stored in jointly together with user name after md5 encryption is used to login password.
6. the multiple-factor wireless key fill system according to claim 1 based on fingerprint recognition, it is characterised in that described Multiple-factor wireless key fill system mobile terminal uses a kind of method of potted circuit to protect user's logon data, in movement When terminal meets with strength dismounting, simultaneously open circuit potential can be revealed by receiving the sulfate liquid of traction.
7. the multiple-factor wireless key fill system according to claim 1 based on fingerprint recognition, it is characterised in that when with When logon data is changed at family, new data is stored in data storage cell corresponding to the user, wherein, logon data, which includes logging in, to be used The finger print information of family account password and/or login user.
CN201710824115.6A 2017-09-13 2017-09-13 A kind of multiple-factor wireless key fill system based on fingerprint recognition Pending CN107517217A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710824115.6A CN107517217A (en) 2017-09-13 2017-09-13 A kind of multiple-factor wireless key fill system based on fingerprint recognition

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710824115.6A CN107517217A (en) 2017-09-13 2017-09-13 A kind of multiple-factor wireless key fill system based on fingerprint recognition

Publications (1)

Publication Number Publication Date
CN107517217A true CN107517217A (en) 2017-12-26

Family

ID=60725431

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710824115.6A Pending CN107517217A (en) 2017-09-13 2017-09-13 A kind of multiple-factor wireless key fill system based on fingerprint recognition

Country Status (1)

Country Link
CN (1) CN107517217A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109522695A (en) * 2018-11-30 2019-03-26 努比亚技术有限公司 Application program login method, computer end, mobile terminal, system and storage medium
CN109558718A (en) * 2018-11-30 2019-04-02 努比亚技术有限公司 Application program login method, computer end, mobile terminal, system and storage medium
CN110084224A (en) * 2019-05-08 2019-08-02 电子科技大学 Finger print safety Verification System and method on a kind of cloud
CN114006738A (en) * 2021-10-25 2022-02-01 上海交通大学 APP instance fingerprint and device fingerprint based hand-trip login verification method and system
CN114547565A (en) * 2021-12-29 2022-05-27 中国长江电力股份有限公司 Double-factor authentication login method and system for hydropower station monitoring system
CN116244684A (en) * 2023-05-11 2023-06-09 深圳奥联信息安全技术有限公司 Password management method, password management system, computer equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101222474A (en) * 2007-01-12 2008-07-16 迈世亚(北京)科技有限公司 Mobile memory device and login method for instant communication instrument client terminal
CN101795261A (en) * 2009-12-31 2010-08-04 暨南大学 Information protection system and method based on mobile data safety
CN103279411A (en) * 2013-06-06 2013-09-04 刘洪磊 Method and system of entering application programs based on fingerprint identification
US20140295856A1 (en) * 2012-11-01 2014-10-02 Joey Chou System and method of cell outage compensation in cellular systems
CN105320946A (en) * 2015-11-03 2016-02-10 盐城工学院 MATLAB based fingerprint identification method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101222474A (en) * 2007-01-12 2008-07-16 迈世亚(北京)科技有限公司 Mobile memory device and login method for instant communication instrument client terminal
CN101795261A (en) * 2009-12-31 2010-08-04 暨南大学 Information protection system and method based on mobile data safety
US20140295856A1 (en) * 2012-11-01 2014-10-02 Joey Chou System and method of cell outage compensation in cellular systems
CN103279411A (en) * 2013-06-06 2013-09-04 刘洪磊 Method and system of entering application programs based on fingerprint identification
CN105320946A (en) * 2015-11-03 2016-02-10 盐城工学院 MATLAB based fingerprint identification method

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109522695A (en) * 2018-11-30 2019-03-26 努比亚技术有限公司 Application program login method, computer end, mobile terminal, system and storage medium
CN109558718A (en) * 2018-11-30 2019-04-02 努比亚技术有限公司 Application program login method, computer end, mobile terminal, system and storage medium
CN110084224A (en) * 2019-05-08 2019-08-02 电子科技大学 Finger print safety Verification System and method on a kind of cloud
CN110084224B (en) * 2019-05-08 2022-08-05 电子科技大学 Cloud fingerprint security authentication system and method
CN114006738A (en) * 2021-10-25 2022-02-01 上海交通大学 APP instance fingerprint and device fingerprint based hand-trip login verification method and system
CN114547565A (en) * 2021-12-29 2022-05-27 中国长江电力股份有限公司 Double-factor authentication login method and system for hydropower station monitoring system
CN114547565B (en) * 2021-12-29 2024-02-20 中国长江电力股份有限公司 Double-factor authentication login method and system for hydropower station monitoring system
CN116244684A (en) * 2023-05-11 2023-06-09 深圳奥联信息安全技术有限公司 Password management method, password management system, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN107517217A (en) A kind of multiple-factor wireless key fill system based on fingerprint recognition
CN100483994C (en) System, portable device and method for digital authenticating, crypting and signing by generating short-lived encrypted key
CN105429761B (en) A kind of key generation method and device
CN112217807B (en) Cone block chain key generation method, authentication method and system
CN107332659B (en) Identity authentication method, storage medium and system based on biological characteristics
CN100533456C (en) Security code production method and methods of using the same, and programmable device therefor
CN109145540B (en) Intelligent terminal identity authentication method and device based on block chain
CN107113315A (en) Identity authentication method, terminal and server
CN101262349A (en) SMS-based identity authentication method and device
CN107209821A (en) Method for digitally signing an electronic document and authentication method
CN101794365B (en) The method of safely inputting information and mobile terminal on mobile terminals
JPWO2003069489A1 (en) Identification method
CN102567686A (en) Security authentication method of application software of mobile terminal based on human body stable characteristics
WO2013117019A1 (en) Method and device for system login based on dynamic password generated autonomously by user
CN107592308A (en) A kind of two server multiple-factor authentication method towards mobile payment scene
CN106936775A (en) A kind of authentication method and system based on fingerprint recognition
KR101792220B1 (en) Method, mobile terminal, device and program for providing user authentication service of combining biometric authentication
CN104639528A (en) DBA (database administrator) mobile client counterattack method and DBA mobile client counterattack device
CN103297237A (en) Identity registration method, identity authentication method, identity registration system, identity authentication system, personal authentication equipment and authentication server
CN207251631U (en) A kind of follow-on SIM card and mobile terminal and identification system
CN107104792B (en) Portable mobile password management system and management method thereof
CN109684802A (en) A kind of method and system providing a user artificial intelligence platform
CN108322440A (en) It is a kind of to utilize safety equipment Card Reader login method and Security Login System
CN102833243A (en) Communication system making use of fingerprint information and application of communication system
CN108780476A (en) Method for verifying personnel identity

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20171226