Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security implementation method of fingerprint module in alarm controller

An implementation method and controller technology, applied in the direction of acquiring/arranging fingerprints/palmprints, instruments, characters and pattern recognition, etc., can solve the problems that the host is vulnerable to attacks and the security of the alarm system is reduced, and achieve high usability and Practicality, avoiding less secure, preventing replacement effects

Inactive Publication Date: 2018-11-16
南京英安特科技实业有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

During fingerprint comparison, the fingerprint module completes fingerprint collection and fingerprint comparison, and then returns the fingerprint comparison result to the host, which makes the host more vulnerable to attacks, for example, replace the fingerprint module with an illegal module, and then the illegal module feeds back the fingerprint comparison If the passed message is sent to the alarm host, the alarm host can be operated directly without fingerprint authentication, resulting in a decrease in the security of the entire alarm system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security implementation method of fingerprint module in alarm controller
  • Security implementation method of fingerprint module in alarm controller

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The present invention will be further described below in conjunction with the accompanying drawings.

[0017] A method for implementing security of a fingerprint module in an alarm controller, characterized in that: comprising: the fingerprint module collects fingerprint information and extracts a fingerprint ID generated by a fingerprint feature code in the fingerprint information, and combines the extracted fingerprint ID with an associated alarm host ID information is sent to the alarm host at the same time. After receiving the fingerprint ID information and the alarm host ID information, the alarm host judges whether the received fingerprint ID matches the pre-stored fingerprint information, and if so, determines that the fingerprint verification is successful.

[0018] Further, the alarm host is associated with at least one fingerprint module; the associated fingerprint module ID is stored in the alarm host.

[0019] Further, it also includes registering the user ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention particularly relates to a security implementation method of a fingerprint module in an alarm controller. The fingerprint module collects fingerprint information, extracts a fingerprint ID generated by a fingerprint feature code in the fingerprint information, and sends the extracted fingerprint ID and associated alarm host ID information to the alarm host at the same time. The alarmhost receives the fingerprint ID information and the alarm host ID information, judges whether the received fingerprint ID is matched with pre-stored fingerprint information or not, and if yes, determines that the fingerprint verification is successful. According to the method, the security level is improved through the method for fingerprint identification and host ID simultaneous identification,so that the problem that the problem of relatively low security due to the fact that fingerprint storage and fingerprint authentication are processed by the fingerprint module is avoided, and the security of the fingerprint identification is improved; and the method has relatively high usability and practicability. Due to the uniqueness of fingerprints of persons, only the designated persons canperform operation.

Description

technical field [0001] The invention relates to the field of security arming, in particular to a security implementation method of a fingerprint module in an alarm controller. Background technique [0002] At present, the arming and disarming of the alarm host on the market adopts a digital password, which can be changed through programming settings, and the alarm host is armed and disarmed by entering the password when in use. For banks with increasingly high security requirements, the security level of the fixed password mode is not high, and the password is easily forgotten, leaked, guessed, etc. Therefore, a more secure way is needed to change the security system using traditional password arming and disarming solutions, such as fingerprint recognition. However, the applicant found through research that, in the existing fingerprint authentication technology, both fingerprint storage and fingerprint authentication are handled by the fingerprint module. During fingerprin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/32G06F21/45G06K9/00
CPCG06F21/32G06F21/45G06V40/1365
Inventor 刘爱国赵明吴永东杨敬元万琦俊戴敏
Owner 南京英安特科技实业有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products