CN107517217A - A kind of multiple-factor wireless key fill system based on fingerprint recognition - Google Patents
A kind of multiple-factor wireless key fill system based on fingerprint recognition Download PDFInfo
- Publication number
- CN107517217A CN107517217A CN201710824115.6A CN201710824115A CN107517217A CN 107517217 A CN107517217 A CN 107517217A CN 201710824115 A CN201710824115 A CN 201710824115A CN 107517217 A CN107517217 A CN 107517217A
- Authority
- CN
- China
- Prior art keywords
- user
- login
- wireless key
- fingerprint
- fill system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of multiple-factor wireless key fill system based on fingerprint recognition, belong to information security field.Including:User logs in PC end systems software when receiving login instruction, obtains the ID values for logging in application software;Mobile hardware terminal determines subscriber identity information according to login user finger print information;Mobile hardware terminal obtains user login code according to the subscriber identity information, and according to the ID values for logging in application software simultaneously;End user logs in PC end system softwares and user login code is decrypted and realizes the automatic filling of user login code and the automated log on of the user account.The wireless key fill system of the present invention can fill the account password of login user automatically;And, in login process, wireless key fill system can be by identifying the finger print information of user, and user account password is encrypted by using strong encryption keys mechanism, efficiently avoid login user in the security filled using account password in wireless key fill system login process.
Description
Technical field
The present invention relates to a kind of multiple-factor wireless key fill system based on fingerprint recognition.From the angle of application scenarios
Say, belong to information security field;From the perspective of technology realization, secret communication field is also belonged to.
Background technology
The attention degree of oneself privacy is deepened along with modern day user, the security intensity of user account number has also obtained more next
Higher concern.When the user account password gradually increased undoubtedly brings the waste and login of memory time to user
Between waste, once and usersaccount information be cracked, the leakage of privacy of user will also result in immeasurable consequence.For
This, furthers investigate key management algorithm, carries out security protection using multiple-factor authentication means to key, helps avoid user's account
Number login time it is long and log in when security intensity it is inadequate the problem of occur.It is anti-that safety is carried out using multiple-factor authentication means
Shield can not only improve the security intensity of user account number, and the security protection for country and society is also significant.
Fingerprint identification technology was proposed by Britain phytomorph scholar Grew in 1684 earliest;By fingerprint identification technology application
It is to carry out criminal case by FBI and Paris, FRA police office employing fingerprint identification technology the 1960s to detect to daily life
Examine;In the 1990s, the Automated Fingerprint Identification System for personal identification identification is able to development and application.
Fingerprint identification technology includes four fingerprint pattern acquisition, fingerprint classification, Finger print characteristic abstract and fingerprint matching passes
Key technology.Fingerprint pattern obtain include fingerprint pattern compression with processing two processes, fingerprint pattern compress main method have JPEG,
WSQ, EZW etc., the main process of fingerprint pattern processing include finger-print region detection, picture quality judgement, directional diagram and frequency and estimated
Meter, image enhaucament, Fingerprint Image Binarization and refinement etc..Fingerprint classification is divided with the grown form of core and triangle
, fingerprint is divided into three major types type, nine kinds of forms by the fingerprint analysis method of China ten.Fingerprint is divided into by general automatic system of fingerprint recognition
Arch pattern (plain arch, tented arch), loop (left dustpan, right dustpan), whorl and miscellaneous shape line etc..Finger print characteristic abstract is for above
The fingerprint obtained extracts to characteristics such as its end points, bifurcation, isolated point, short bifurcated, rings, due to streakline end points
The chance occurred with bifurcation in fingerprint is most, most stable, and easily obtains, therefore can be to referring to by this two category features point
Line characteristic matching.Fingerprint matching is to be matched by the fingerprint characteristic obtained with the finger print information in fingerprint base, is matched
Mode includes one-to-one and one-to-many two ways.
Authentication is the key to ensure information safety, certification skill of the development experience of identity identifying technology based on password
The stages such as art, the authentication techniques based on smart card, the authentication techniques based on password and the authentication techniques based on biological characteristic.It is based on
The certification of password is a kind of authentication techniques for being easiest to realize, it is advantageous that certification is easy, cost is low, speed is fast, but password is recognized
The security of card is poor.Usual people are in order to simplify memory, tend to select weak passwurd, but weak passwurd is difficult to resist malice to attack
Hit.In particular with the raising of computer techno-stress distribution computing capability, the unsafe factor of weak passwurd is also constantly increasing.By
Possess independent processor in smart card, can be by program safety processing data, therefore the authentication mode based on smart card improves
The deficiency of password authentication, strengthen the security performance of authentication.Authentication mode based on living things feature recognition is given birth to human body
Thing is characterized as foundation, and certification is realized using Computer Image Processing and mode identification technology.Biometrics identification technology has it
The incomparable reliability of its authentication techniques, fingerprint recognition are one kind more perfect in current biometrics identification technology.
Safety certification of the multiple-factor including steric factor, the behavior factor, transmission encryption factor etc..Steric factor refers to
System described by the algorithm has device IP identification and physical positioning function, can prevent cipher stealing;The behavior factor refers to this
System described by algorithm can be based on user operation habits, identify abnormal operation;Transmission encryption factor refers to described by the algorithm
System is to log in communication loop between end and external hardware equipment in real time based on asymmetric key mechanisms algorithms such as RSA to make user
The safety in border.
Key is a kind of parameter, and it is to be converted to ciphertext in plain text or converting ciphertext into the algorithm of plaintext the ginseng that inputs
Number.Key management is then the behavior being managed to key, including the content such as encrypts, decrypts, cracking.Key management is embodied in close
The generation of key is to the various aspects in the destruction of key.The main generation for finding expression in management system, management agreement and key, divide
Match somebody with somebody, change and inject.Multiple-factor certification is then the password authentification of communication apparatus possessed, the fingerprint knowledge by system in itself
Not, the function such as Bluetooth pairing, it is possible to achieve including static password checking, living things feature recognition, hardware equipment information certification etc.
Multiple-factor authentication.So user, which only needs to hold mobile device, can complete authentication, both the safety of guaranteed service scene
Property demand, can also meet user account log in convenience demand.
Summary, identity identifying technology has his own strong points at present, and there is also shortcoming.Such as in the side using biological characteristic authentication
Face, the reliability of collection result can be directly influenced by gathering the quality of port;In the certification based on physics password, password be present
The problems such as management and algorithm security.In theoretical and technical research aspect, existing authentication mode needs further to send out
Exhibition.Meanwhile fingerprint identification technology is more and more being applied to information security field, but these cryptographic systems are used for yard
Institute, common people also is arrived without widely available, family oriented, personalized key management method are still left to be desired.With science and technology
Development, the fingerprint recognition system of intelligent facilitation substitute traditional physics cipher authentication system to be extremely urgent.
The content of the invention
The purpose of the present invention is:The complexity of password remembers difficulty into just with it when carrying out Account Logon for active user
Than the problem of, propose that a kind of user account logs in the key management algorithm for the high safety for exempting from keyboard typing.Reach portability management
User account, automatic identification, the purpose of auto login user account.
The present invention design principle be:Key management is carried out in movable termination for current research selection, in user's account
Family logs in end and carries out the identification that user logs in application.Use a kind of key mechanism based on RSA Algorithm based on this, to
Family account password is encrypted.The storage that matching hardware terminal carries out user account password is designed based on this, with
And the communication of end terminal is logged in user account.Fingerprint bio information identification module is set with to the close of hardware end in hardware terminal
Code data management carries out the limitation of authority.The present invention can be filled automatically for user account password, fully realize key
The purpose exempted from Memorability, reach safe and convenient login user account.
The technical scheme is that be achieved by the steps of:
Step 1, application software application ID, user account and login password are obtained, and it is whole to hardware by encrypted transmission
End is preserved;
Step 1.1, the user is logged in into PC ends and carries out Bluetooth pairing with mobile hardware terminal, logged in user under PC ends
System software corresponding with mobile hardware terminal is carried, is carried out by bluetooth serial ports logical between system software and mobile hardware terminal
News;
Step 1.2, it is wireless by inputting user name and login password completion multiple-factor when user is carried out using logging in
After the authentication of key fill system software, application software ID, user account and login password are obtained;
Step 1.3, after the multiple-factor wireless key fill system uses RSA key encryption mechanism to login password, even
Together transmitted to mobile hardware terminal by bluetooth serial ports with application software application ID and user account;
Step 2, hardware terminal collection user fingerprints information, is preserved to mobile terminal;
Step 2.1, after hardware terminal obtains application software application ID, user account and login password, user is prompted to enter
Row finger print information certification;
Step 2.2, hardware terminal gathers user fingerprints information by fingerprint sensor, the use obtained according to fingerprint sensor
Family finger print information, texture feature extraction is carried out, obtain the end points and branch point of fingerprint image;
Step 2.3, hardware terminal stores to user fingerprints information, while stores the application software application ID, uses
Family account and login password, and the access path established between three with guarantee carry out user profile matching;
Step 3, when application software logs in, obtain it and apply ID, and send to hardware terminal;
Step 4, hardware terminal collection user fingerprints information, verifies fingerprint;
Step 4.1, hardware terminal carries out the user fingerprints information collected and saved user fingerprints information
Match somebody with somebody, if user fingerprints information is not present in user fingerprints information storehouse, authentication failure message is sent in multiple-factor by hardware terminal
Wireless key fill system software;
Step 5, finger print identifying is by the way that the same application ID of pitching pile mobile terminal account number cipher, encrypted transmission is extremely applied;
Step 6, system software fills user login code automatically;
Step 6.1, the multiple-factor wireless key fill system obtains user login code, and the login password is used
RSA key mechanism is decrypted;
Step 6.2, multiple-factor wireless key fill system identification application software Password Input frame, while by decryption
User login code is filled and completes the automated log on of application automatically.
Beneficial effect
Compared to conventional cipher management software, the method proposed by the present invention that user account password is stored in hardware terminal
The security of user account password management is improved, by the way that user account password is stored in into hardware terminal, user can be avoided
Account password by Brute Force and user account password it is online under be compromised the problem of occur, while hardware terminal of the present invention
Also there is the function of anti-" fishing website ", reached the high reliability of user account password management, high security and exempted to remember
Property.
The present invention expands fingerprint identity validation to PC and other users Account Logon place from mobile phone terminal, it is only necessary to logical
Cross bluetooth by user account log in platform be connected with user account password management terminal can realize user account password oneself
Dynamic filling, user account password is reached and has managed pervasive effect.
Brief description of the drawings
Fig. 1 is the multiple-factor wireless key fill system embodiment schematic flow sheet of the invention based on fingerprint recognition
Fig. 2 is the multiple-factor wireless key fill system embodiment high-level schematic functional block diagram of the invention based on fingerprint recognition;
Fig. 3 is the multiple-factor wireless key fill system structural representation of the invention based on fingerprint recognition;
Embodiment
In order to better illustrate objects and advantages of the present invention, with reference to the accompanying drawings and examples to the reality of the inventive method
The mode of applying is described in further details.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, not
For limiting the present invention.
The present invention provides a kind of multiple-factor wireless key fill system based on fingerprint recognition.The wireless key fill system
Such as it can be filled for the hardware terminal with password storage and user's physiologic information identification function and with key
And the software end composition of procedure identification function.Reference picture 1, Fig. 1 are the multiple-factor wireless key of the invention based on fingerprint recognition
The schematic flow sheet of fill system constructive embodiment, the multiple-factor wireless key filling system proposed by the present invention based on fingerprint recognition
System comprises the following steps:
Step 1, application software application ID, user account and login password are obtained, and it is whole to hardware by encrypted transmission
End is preserved;
In the present embodiment, PC ends can be logged in user and downloads multiple-factor wireless key fill system software, complete body
Start the system software after part certification, and the user is logged in into PC ends and completes Bluetooth pairing with mobile hardware terminal.Institute
State user to log in application process, cursor of mouse is stopped at into Password Input frame, multiple-factor wireless key fill system software will
Identify that the user logs in application, and recognition result, i.e. user's login are sent whole to mobile hardware using ID values by serial ports
End.
Meanwhile request user is also inputted user account and logged in close by the multiple-factor wireless key fill system software
Code, is then sent the user account and login password to mobile hardware terminal by serial ports.
Wherein, in the authentication of the system software, to user login code use MD5 algorithm for encryption after together with
Name in an account book is stored in user and logs in PC ends jointly.
Further, in the present embodiment, transmission is encrypted using RSA key mechanism to user login code.It is described
System software has public key IDJ, and mobile hardware terminal has private key ITG, and IDJ and ITG is reciprocal.User logs in end collection user
Name and user account login password m after, system software is transmitted after being encrypted using public key IDJ to it to mobile hardware terminal.Move
Dynamic hardware terminal decrypts the user name and user account login password using private key ITG, and encrypts to obtain using private key ITG
User name and user account password ciphertext m ', are stored in log-on message database.Public key IDJ and private key described herein
ITG is preserved can be with the contrary, hold public key IDJ by mobile terminal.
Step 2, hardware terminal collection user fingerprints information, is preserved to mobile terminal;
In the present embodiment, hardware terminal receive the user log in apply ID values and user account when, will carry
The user that wakes up carries out identity information typing;The user can carry out fingerprint typing by external fingerprint sensor, whole in hardware
After end obtains the user fingerprints information, the subscriber identity information word bank is created in hardware terminal user fingerprints information database.
Wherein, user fingerprints information collection detailed process is that user fingerprints information is gathered according to fingerprint sensor, gone forward side by side
Row texture feature extraction, obtain the end points and branch point of fingerprint image;Finger print characteristic abstract has obtained for described previously
Fingerprint the characteristics such as its end points, bifurcation, isolated point, short bifurcated, ring are extracted, according to the fingerprint characteristic value that extracts i.e.
The typing of user fingerprints information can be completed;And fingerprint characteristic can be divided into arch pattern (plain arch, tented arch), loop (left dustpan,
Right dustpan), whorl and miscellaneous shape line etc..
Step 3, when application software logs in, obtain it and apply ID, and send to hardware terminal;
In the present embodiment, when user, which logs in, to apply, the multiple-factor wireless key fill system software refers to identification
It is fixed to log in application and log in application by obtaining focus active process to obtain apply ID values, while pass through bluetooth connection user
End and hardware terminal are logged in, the application of acquisition is applied ID by multiple-factor wireless key fill system software by serial ports
Value is transmitted to hardware terminal.
Step 4, hardware terminal collection user fingerprints information, verifies fingerprint;
Step 4.1, hardware terminal carries out the user fingerprints information collected and saved user fingerprints information
Match somebody with somebody, if user fingerprints information is not present in user fingerprints information storehouse, authentication failure message is sent in multiple-factor by hardware terminal
Wireless key fill system software;
In the present embodiment, hardware terminal obtains login user finger print information by fingerprint sensor, by the way that user is referred to
Line information is matched with the finger print information storehouse in hardware terminal, you can completes the identification to subscriber identity information.If fingerprint is believed
The user fingerprints information is not present in storehouse in breath, then user is by finger print information certification, and hardware terminal is by user fingerprints identity
Authentication failure message is sent in the multiple-factor wireless key fill system software by serial ports.
Wherein, fingerprint collecting and the detailed process of matching are that user fingerprints information is gathered according to fingerprint sensor, and
Texture feature extraction is carried out, obtains the end points and branch point of fingerprint image;Finger print characteristic abstract has obtained for described previously
The fingerprint taken extracts to characteristics such as its end points, bifurcation, isolated point, short bifurcated, rings, because streakline end points and bifurcation exist
The chance occurred in fingerprint is most, most stable, and easily obtains, therefore can be to fingerprint characteristic by this two category features point
Match somebody with somebody.Fingerprint matching is to be matched by the fingerprint characteristic obtained with the finger print information in fingerprint base, and matching way includes
One-to-one and one-to-many two ways.And fingerprint characteristic can be divided into arch pattern (plain arch, tented arch), loop (left dustpan,
Right dustpan), whorl and miscellaneous shape line etc..
Step 5, finger print identifying is by, the same application ID of pitching pile mobile terminal account number cipher, and user is logged in close
Code is transmitted to application;
In the present embodiment, after hardware terminal is by user fingerprints information certification, by the same application of pitching pile mobile terminal
ID account number cipher.I.e. in subscriber identity information word bank, user account corresponding with presently described application ID values can be obtained
Password, mobile terminal will be transmitted to multiple-factor wireless key with the private key ITG user account password m ' encrypted and filled out by serial ports
Charging system software.
Step 6, system software fills user login code automatically.
Step 6.1, the multiple-factor wireless key fill system software obtains close with user's login of private key encryption
Code, the login password is obtained in plain text using public key decryptions;
In the present embodiment, the user account password is used public key IDJ by multiple-factor wireless key fill system software
Processing, system software are decrypted to user login code m ' using public key IDJ and can obtain user login code plaintext m.
Step 6.2, multiple-factor wireless key fill system identification application software Password Input frame, while by decryption
User login code is filled and completes the automated log on of application automatically.
In the present embodiment, application end cursor of mouse is logged in user to be still located on the user account to log in end password defeated
Enter frame, the user account password after decryption will be filled in the user account automatically and log in end Password Input frame.Decrypt it
The user account password afterwards will inject the carriage return character in tail row, to realize the automated log on of the user account.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row
His property includes, so that process, method, article or device including a series of elements not only include those key elements, and
And also include the other element being not expressly set out, or also include for this process, method, article or device institute inherently
Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this
Other identical element also be present in the process of key element, method, article or device.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words
Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal equipment (can be mobile phone, computer, clothes
Be engaged in device, air conditioner, or network equipment etc.) perform method described in each embodiment of the present invention.
The preferred embodiments of the present invention are these are only, are not intended to limit the scope of the invention, it is every to utilize this hair
The equivalent structure or equivalent flow conversion that bright specification and accompanying drawing content are made, or directly or indirectly it is used in other related skills
Art field, is included within the scope of the present invention.
Claims (7)
1. a kind of multiple-factor wireless key fill system based on fingerprint recognition, it is characterised in that methods described includes following step
Suddenly:
Step 1, application software application ID, user account and login password are obtained, and is entered by encrypted transmission to hardware terminal
Row preserves;
Step 2, hardware terminal collection user fingerprints information, is preserved to mobile terminal;
Step 3, when application software logs in, obtain it and apply ID, and send to hardware terminal;
Step 4, hardware terminal collection user fingerprints information, verifies fingerprint;
Step 5, finger print identifying is by the way that the same application ID of pitching pile mobile terminal account number cipher, encrypted transmission is extremely applied;
Step 6, system software fills user login code automatically.
2. the multiple-factor wireless key fill system according to claim 1 based on fingerprint recognition, it is characterised in that key
Store method is:
When user inputs login password, described multiple-factor wireless key fill system is transmitted to shifting after login password is encrypted
Dynamic terminal;
Mobile terminal preserves user login code, and establishes the user account matched with login password and link road using ID
Footpath.
3. the multiple-factor wireless key fill system according to claim 1 based on fingerprint recognition, it is characterised in that described
The method of user account and cipher key delivery is:
Carried out being logged in by the successful user of Bluetooth pairing between PC ends and the system mobile hardware terminal by serial ports
The transmission of user account and login password;
In cipher key transmitting process, user name and user login code are encrypted and decrypted using RSA key mechanism.
4. the multiple-factor wireless key fill system according to claim 1 based on fingerprint recognition, it is characterised in that hard
Part terminal gathers user fingerprints information, and the step of verify fingerprint in, the algorithm for carrying out fingerprint matching is:
User fingerprints information is gathered according to fingerprint sensor, and carries out texture feature extraction, obtain the end points of fingerprint image with
And branch point;
Matching image end points and branch point are grouped, dot pattern is carried out by the minutiae point of every group of point and template image
Match somebody with somebody to realize fingerprint matching.
5. the multiple-factor wireless key fill system according to claim 1 based on fingerprint recognition, it is characterised in that it is more because
Sub- wireless key fill system is taken based on the authenticating user identification mechanism of password authentication, and user need to input user name and step on
Password is recorded, user login PC ends are stored in jointly together with user name after md5 encryption is used to login password.
6. the multiple-factor wireless key fill system according to claim 1 based on fingerprint recognition, it is characterised in that described
Multiple-factor wireless key fill system mobile terminal uses a kind of method of potted circuit to protect user's logon data, in movement
When terminal meets with strength dismounting, simultaneously open circuit potential can be revealed by receiving the sulfate liquid of traction.
7. the multiple-factor wireless key fill system according to claim 1 based on fingerprint recognition, it is characterised in that when with
When logon data is changed at family, new data is stored in data storage cell corresponding to the user, wherein, logon data, which includes logging in, to be used
The finger print information of family account password and/or login user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710824115.6A CN107517217A (en) | 2017-09-13 | 2017-09-13 | A kind of multiple-factor wireless key fill system based on fingerprint recognition |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710824115.6A CN107517217A (en) | 2017-09-13 | 2017-09-13 | A kind of multiple-factor wireless key fill system based on fingerprint recognition |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107517217A true CN107517217A (en) | 2017-12-26 |
Family
ID=60725431
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710824115.6A Pending CN107517217A (en) | 2017-09-13 | 2017-09-13 | A kind of multiple-factor wireless key fill system based on fingerprint recognition |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107517217A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109522695A (en) * | 2018-11-30 | 2019-03-26 | 努比亚技术有限公司 | Application program login method, computer end, mobile terminal, system and storage medium |
CN109558718A (en) * | 2018-11-30 | 2019-04-02 | 努比亚技术有限公司 | Application program login method, computer end, mobile terminal, system and storage medium |
CN110084224A (en) * | 2019-05-08 | 2019-08-02 | 电子科技大学 | Finger print safety Verification System and method on a kind of cloud |
CN114006738A (en) * | 2021-10-25 | 2022-02-01 | 上海交通大学 | APP instance fingerprint and device fingerprint based hand-trip login verification method and system |
CN114547565A (en) * | 2021-12-29 | 2022-05-27 | 中国长江电力股份有限公司 | Double-factor authentication login method and system for hydropower station monitoring system |
CN116244684A (en) * | 2023-05-11 | 2023-06-09 | 深圳奥联信息安全技术有限公司 | Password management method, password management system, computer equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101222474A (en) * | 2007-01-12 | 2008-07-16 | 迈世亚(北京)科技有限公司 | Mobile memory device and login method for instant communication instrument client terminal |
CN101795261A (en) * | 2009-12-31 | 2010-08-04 | 暨南大学 | Information protection system and method based on mobile data safety |
CN103279411A (en) * | 2013-06-06 | 2013-09-04 | 刘洪磊 | Method and system of entering application programs based on fingerprint identification |
US20140295856A1 (en) * | 2012-11-01 | 2014-10-02 | Joey Chou | System and method of cell outage compensation in cellular systems |
CN105320946A (en) * | 2015-11-03 | 2016-02-10 | 盐城工学院 | MATLAB based fingerprint identification method |
-
2017
- 2017-09-13 CN CN201710824115.6A patent/CN107517217A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101222474A (en) * | 2007-01-12 | 2008-07-16 | 迈世亚(北京)科技有限公司 | Mobile memory device and login method for instant communication instrument client terminal |
CN101795261A (en) * | 2009-12-31 | 2010-08-04 | 暨南大学 | Information protection system and method based on mobile data safety |
US20140295856A1 (en) * | 2012-11-01 | 2014-10-02 | Joey Chou | System and method of cell outage compensation in cellular systems |
CN103279411A (en) * | 2013-06-06 | 2013-09-04 | 刘洪磊 | Method and system of entering application programs based on fingerprint identification |
CN105320946A (en) * | 2015-11-03 | 2016-02-10 | 盐城工学院 | MATLAB based fingerprint identification method |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109522695A (en) * | 2018-11-30 | 2019-03-26 | 努比亚技术有限公司 | Application program login method, computer end, mobile terminal, system and storage medium |
CN109558718A (en) * | 2018-11-30 | 2019-04-02 | 努比亚技术有限公司 | Application program login method, computer end, mobile terminal, system and storage medium |
CN110084224A (en) * | 2019-05-08 | 2019-08-02 | 电子科技大学 | Finger print safety Verification System and method on a kind of cloud |
CN110084224B (en) * | 2019-05-08 | 2022-08-05 | 电子科技大学 | Cloud fingerprint security authentication system and method |
CN114006738A (en) * | 2021-10-25 | 2022-02-01 | 上海交通大学 | APP instance fingerprint and device fingerprint based hand-trip login verification method and system |
CN114547565A (en) * | 2021-12-29 | 2022-05-27 | 中国长江电力股份有限公司 | Double-factor authentication login method and system for hydropower station monitoring system |
CN114547565B (en) * | 2021-12-29 | 2024-02-20 | 中国长江电力股份有限公司 | Double-factor authentication login method and system for hydropower station monitoring system |
CN116244684A (en) * | 2023-05-11 | 2023-06-09 | 深圳奥联信息安全技术有限公司 | Password management method, password management system, computer equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107517217A (en) | A kind of multiple-factor wireless key fill system based on fingerprint recognition | |
CN100483994C (en) | System, portable device and method for digital authenticating, crypting and signing by generating short-lived encrypted key | |
CN105429761B (en) | A kind of key generation method and device | |
CN112217807B (en) | Cone block chain key generation method, authentication method and system | |
CN107332659B (en) | Identity authentication method, storage medium and system based on biological characteristics | |
CN100533456C (en) | Security code production method and methods of using the same, and programmable device therefor | |
CN109145540B (en) | Intelligent terminal identity authentication method and device based on block chain | |
CN107113315A (en) | Identity authentication method, terminal and server | |
CN101262349A (en) | SMS-based identity authentication method and device | |
CN107209821A (en) | Method for digitally signing an electronic document and authentication method | |
CN101794365B (en) | The method of safely inputting information and mobile terminal on mobile terminals | |
JPWO2003069489A1 (en) | Identification method | |
CN102567686A (en) | Security authentication method of application software of mobile terminal based on human body stable characteristics | |
WO2013117019A1 (en) | Method and device for system login based on dynamic password generated autonomously by user | |
CN107592308A (en) | A kind of two server multiple-factor authentication method towards mobile payment scene | |
CN106936775A (en) | A kind of authentication method and system based on fingerprint recognition | |
KR101792220B1 (en) | Method, mobile terminal, device and program for providing user authentication service of combining biometric authentication | |
CN104639528A (en) | DBA (database administrator) mobile client counterattack method and DBA mobile client counterattack device | |
CN103297237A (en) | Identity registration method, identity authentication method, identity registration system, identity authentication system, personal authentication equipment and authentication server | |
CN207251631U (en) | A kind of follow-on SIM card and mobile terminal and identification system | |
CN107104792B (en) | Portable mobile password management system and management method thereof | |
CN109684802A (en) | A kind of method and system providing a user artificial intelligence platform | |
CN108322440A (en) | It is a kind of to utilize safety equipment Card Reader login method and Security Login System | |
CN102833243A (en) | Communication system making use of fingerprint information and application of communication system | |
CN108780476A (en) | Method for verifying personnel identity |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171226 |