Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for binding/recovering key using fingerprint details

A technology of detailed feature points and keys, which is applied in the fields of information security and computer identification, and can solve problems that cannot be reflected and are unreasonable

Inactive Publication Date: 2007-08-08
BEIJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this method, the polynomial order (that is, the number of detailed feature points that need to be matched in the verification process) is determined by the key length, which is unreasonable
Because the more matching fingerprint details, the more reliable the authentication result, which cannot be reflected in the existing methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for binding/recovering key using fingerprint details
  • Method for binding/recovering key using fingerprint details
  • Method for binding/recovering key using fingerprint details

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018]We bind / recover keys through fingerprint detail feature points. The detailed feature points of fingerprints are usually represented by ridge endings and ridge bifurcations, as shown in Figure 5. The general detail feature points are represented by (x, y, θ), where x and y represent the horizontal and vertical coordinates of the point respectively, and θ represents the tangent direction of the point line (we call it the direction of the detail point). The minutiae points mentioned in the present invention only use their planar coordinates (x, y). While unlocking with minutiae directions can be done better, it compromises security. Because the directions of the minutiae points in each part of the fingerprint image are basically regular, as shown in Figure 6, after the two fingerprint images are aligned, the direction distribution of the minutiae points on the upper, lower, left and right sides of the fingerprint has certain rules. If the direction of the minutiae point i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides one method to bind and restore key by use of print details, which adopts multiple formula to bind one set of random bit and finger print detail property and needing match detail number to determinate random number; using several parameters of random number to generate one key to protect keys S to realize print detail property points and key binding. Due to key S indirectly and multiple formula binding, its design has no protection of length limits.

Description

technical field [0001] The invention belongs to the fields of information security and computer identification, and relates to biological feature identification, information security, etc., and more specifically relates to binding protection based on biological features and traditional keys. The present invention proposes a binding protection method based on fingerprint detail feature point data and keys, which is used to protect the security of biometric data itself, and also provides a reliable protection for the safe use of keys, and improves the security of the system. security strength. Background technique [0002] With the development and application of information technology, the connotation of information security is constantly extending. The purpose of establishing an information security system is to ensure that data in the system can only be accessed by authorized "persons". If there is no effective means of identity authentication, the identity of the visitor ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32G06K9/00
Inventor 苏菲冯全蔡安妮
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products