[go: up one dir, main page]

WO2018032969A1 - 一种指纹排列组合密码 - Google Patents

一种指纹排列组合密码 Download PDF

Info

Publication number
WO2018032969A1
WO2018032969A1 PCT/CN2017/095596 CN2017095596W WO2018032969A1 WO 2018032969 A1 WO2018032969 A1 WO 2018032969A1 CN 2017095596 W CN2017095596 W CN 2017095596W WO 2018032969 A1 WO2018032969 A1 WO 2018032969A1
Authority
WO
WIPO (PCT)
Prior art keywords
fingerprint
password
combination
fingerprints
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2017/095596
Other languages
English (en)
French (fr)
Inventor
朱寅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of WO2018032969A1 publication Critical patent/WO2018032969A1/zh
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Definitions

  • the invention relates to a fingerprint password, in particular to a fingerprint arrangement combined password.
  • Fingerprint passwords are a widely used password. It has been widely used in laptops, mobile phones, automobiles, ID cards, bank payments, various door locks, time and attendance systems, and (criminal) identification. However, fingerprints can be stolen due to traces left or through photos. Each person's fingerprint is unique and unchangeable. Once the fingerprint is smashed, all the passwords are lost. Therefore, most fingerprint passwords cannot be used alone, but with other passwords (such as digital passwords).
  • the present invention provides a fingerprint arrangement combined password, so that the fingerprint password can be used alone.
  • the technical solution adopted by the present invention to solve the technical problem is that the fingerprint of the left finger is marked as 1, 2, 3, 4, 5 from the thumb to the little finger, and the right hand is marked as 6, 7, 8, 9, 0. These fingerprints are arranged in different combinations, such as 1, 3, 6, and 9 arrays indicating that the thumb of the left hand, the fingerprint of the middle finger, and the thumb of the right hand and the fingerprint of the ring finger constitute a password. According to the same method, different orders of different fingerprints can form different passwords. In this case, even if the fingerprint is stolen, if the order of the fingerprints is not known, the password cannot be cracked.
  • the fingerprint combination combination password can be used like a normal password, or can be placed in a chip, and integrated into an ID card, a bank card, a mobile phone, a computer, a door lock, and the like.
  • the above fingerprint arrangement combination password is used for software (program) identification of computers, mobile phones and other products.
  • program program identification of computers, mobile phones and other products.
  • fingerprint password authorization Only authorized programs will function properly. Unauthorized programs cannot run and can be removed for anti-virus software.
  • the above fingerprint arrangement combination password can set a complex password composed of multiple fingerprints on one device, or can be set as a simple password composed of one or two fingerprints.
  • Complex passwords are used to reset passwords and objects that are needed for high security (such as large funds and confidential documents).
  • the above fingerprint arrangement combination password can be used in combination with face recognition and eye pattern recognition.
  • the fingerprints can be rearranged into a new fingerprint password, and the fingerprint fingerprint combination password can be used alone.
  • the fingerprint arrangement combination password is not easy to be cracked.
  • the fingerprint of the left finger is marked as 1, 2, 3, 4, 5 from the thumb to the little finger, and the right hand is marked as 6, 7, 8, 9, 0.
  • These fingerprints are arranged in different combinations, such as 1, 3, 6, and 9 arrays indicating that the thumb of the left hand, the fingerprint of the middle finger, and the thumb of the right hand and the fingerprint of the ring finger constitute a password.
  • a complex password composed of a plurality of fingerprints can be set on one device, or can be set as a simple password composed of one or two fingerprints.
  • Complex passwords are used to reset passwords and objects that are needed for high security (such as large funds and confidential documents).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

一种指纹排列组合密码,包括指纹排列组合方法,指纹排列组合密码置入芯片集成入计算机、手机、身份证、银行卡、各种门锁等,并进行计算机(手机)的程序授权和识别,其方法是:将左手指的指纹由大拇指到小指分别标记为1,2,3,4,5,右手的则标记为6,7,8,9,0,将这些指纹排列成不同组合形成指纹排列组合密码。根据该方法,指纹可重新排列组合成新的指纹密码,不怕指纹被窃取,指纹排列组合密码可以单独使用。在指纹、指纹组合和软件需要指纹组合密码授权的三重保护下,指纹排列组合密码不容易破解。

Description

一种指纹排列组合密码 技术领域
本发明涉及一种指纹密码,尤其涉及一种指纹排列组合密码。
背景技术
指纹密码是一种广泛应用的密码。在笔记本电脑、手机、汽车、身份证、银行支付、各种门锁、考勤系统、(罪犯)身份识别等方面已经广泛应用。但是,指纹会因为留下的痕迹或通过照象而被窃取。而每个人的指纹都是唯一的,并且是不可改变的。一旦指纹被窍,所有的密码就失去了作用。因此,现在指纹密码大多不能单独使用,而是与其他密码(如数字密码)配合使用。
发明内容
为了解决指纹密码不能单独使用的问题,本发明提供一种指纹排列组合密码,使得指纹密码能够单独使用。
本发明解决技术问题所采用的技术方案是:将左手指的指纹由大拇指到小指分别标记为1,2,3,4,5,右手的则标记为6,7,8,9,0。将这些指纹排列成不同组合,如1,3,6,9排列表示左手的大拇指、中指指纹和右手的大拇指和无名指指纹组成一个密码。按照相同的方法,不同的指纹的不同排列顺序可组成不同的密码。在这种情况下,即使指纹被窃取,如果不知道指纹排列顺序,仍然无法破解密码。
上述指纹排列组合密码可以象普通的密码一样使用,也可以置入芯片中,集成到身份证、银行卡、手机、电脑、门锁等多种产品中。
上述指纹排列组合密码用于计算机、手机和其他产品的软件(程序)识别。在安装程序时,首先经过指纹密码授权。只有经过授权的程序才能正常运行。没有授权的程序不能运行,并且能够为杀毒软件删除。
上述指纹排列组合密码可在一台设备上设置多个指纹组成的复杂密码,也可设置为由一个或两个指纹组成的简单密码。复杂密码用于重置密码和高保密需要的对象(如大额资金和机密文件)。
上述指纹排列组合密码可与人脸识别、眼纹识别配合使用。
本发明的效果:指纹可重新排列顺序组合成新的指纹密码,不怕指纹被窃取,指纹排列组合密码可以单独使用。在指纹、指纹组合和软件需要指纹组合密码授权的三重保护下,指纹排列组合密码不容易被破解。
具体实施方式
【实施例1】
将左手指的指纹由大拇指到小指分别标记为1,2,3,4,5,右手的则标记为6,7,8,9,0。将这些指纹排列成不同组合,如1,3,6,9排列表示左手的大拇指、中指指纹和右手的大拇指和无名指指纹组成一个密码。
【实施例2】
将一个指纹排列组合密码置入芯片中,集成到身份证、银行卡、手机、电脑、门锁等多种产品中
【实施例3】
在安装计算机程序时,首先经过指纹排列密码授权。只有经过授权的程序才能正常运行。没有授权的程序不能运行,且能够为杀毒软件删除。
【实施例4】可在一台设备上设置多个指纹组成的复杂密码,也可设置为由一个或两个指纹组成的简单密码。复杂密码用于重置密码和高保密需要的对象(如大额资金和机密文件)。

Claims (6)

  1. 一种指纹排列组合密码,包括指纹排列组合方法,指纹排列组合密码可象普通密码一样使用,也可置入芯片,集成入计算机、手机、身份证、银行卡、各种门锁等,并进行计算机(手机)的程序授权和识别,其特征在于:将左手指的指纹由大拇指到小指分别标记为1,2,3,4,5,右手的则标记为6,7,8,9,0,将这些指纹排列成不同组合形成指纹组合密码,指纹组合密码置入芯片集成到身份证、银行卡、手机、电脑、门锁等多种产品中使用,用指纹组合密码进行计算机(手机)的程序授权和识别。可设置由多个指纹组成的复杂密码,也可设置为由一个或两个指纹组成的简单密码。复杂密码用于重置密码和高保密需要的对象(如大额资金和机密文件)。
  2. 根据权利要求1所述的指纹排列组合密码,其特征在于,将双手的多个指纹经过不同的排列组合成不同顺序的指纹排列组合密码。
  3. 根据权利要求1所述的指纹排列组合密码,其特征在于,编制好的指纹排列组合密码可以象一般的密码那样使用,也可以置入芯片中,集成到身份证、银行卡、手机、电脑、门锁等多种产品中。
  4. 根据权利要求1所述的指纹排列组合密码,其特征在于,在安装计算机程序时,首先经过指纹密码授权。只有经过授权的程序才能正常运行。没有授权的程序不能运行,并且能够为杀毒软件删除。
  5. 根据权利要求1所述的指纹排列组合密码,其特征在于,可设置由多个指纹组成的复杂密码,也可设置为由一个或两个指纹组成的简单密码。复杂密码用于重置密码和高保密需要的对象(如大额资金和机密文件)。
  6. 根据权利要求1所述的指纹排列组合密码,其特征在于,指纹排列组合密码可以与人脸识别、眼纹识别配合使用。
PCT/CN2017/095596 2016-08-16 2017-08-02 一种指纹排列组合密码 Ceased WO2018032969A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610712682.8A CN106372481A (zh) 2016-08-16 2016-08-16 一种指纹排列组合密码
CN201610712682.8 2016-08-16

Publications (1)

Publication Number Publication Date
WO2018032969A1 true WO2018032969A1 (zh) 2018-02-22

Family

ID=57878738

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/095596 Ceased WO2018032969A1 (zh) 2016-08-16 2017-08-02 一种指纹排列组合密码

Country Status (2)

Country Link
CN (1) CN106372481A (zh)
WO (1) WO2018032969A1 (zh)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106372481A (zh) * 2016-08-16 2017-02-01 朱寅 一种指纹排列组合密码
CN108694350A (zh) * 2017-04-08 2018-10-23 李川涛 一种指纹字符密码方法
CN107833338A (zh) * 2017-05-28 2018-03-23 杭州力谱科技有限公司 一种智能家居指纹密码门锁
CN106958403B (zh) * 2017-05-28 2018-05-25 江西金马金属制品有限公司 一种保险箱
CN108952354B (zh) * 2017-05-28 2020-10-16 杭州力谱科技有限公司 一种防窥探智能门锁
CN108179929B (zh) * 2017-05-28 2020-07-17 杭州力谱科技有限公司 一种智能家居门锁
CN107476671A (zh) * 2017-09-04 2017-12-15 浙江圣奥家具制造有限公司 电子密码锁具
CN109830023B (zh) * 2019-03-02 2021-07-20 浙江弘电智能科技有限公司 一种智能楼宇门禁系统

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6393139B1 (en) * 1999-02-23 2002-05-21 Xirlink, Inc. Sequence-encoded multiple biometric template security system
CN101436935A (zh) * 2008-12-10 2009-05-20 华中科技大学 一种采用指纹识别的pin码验证方法
CN103761502A (zh) * 2013-12-26 2014-04-30 福建伊时代信息科技股份有限公司 安全认证装置和方法
CN104182673A (zh) * 2014-08-12 2014-12-03 赵守中 一种基于指纹的身份识别方法、系统及设备
CN104715172A (zh) * 2015-03-13 2015-06-17 广东欧珀移动通信有限公司 一种应用程序启动方法和装置
CN105279478A (zh) * 2015-01-31 2016-01-27 谭荣兵 指纹顺序组合密码验证系统
CN106372481A (zh) * 2016-08-16 2017-02-01 朱寅 一种指纹排列组合密码

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6393139B1 (en) * 1999-02-23 2002-05-21 Xirlink, Inc. Sequence-encoded multiple biometric template security system
CN101436935A (zh) * 2008-12-10 2009-05-20 华中科技大学 一种采用指纹识别的pin码验证方法
CN103761502A (zh) * 2013-12-26 2014-04-30 福建伊时代信息科技股份有限公司 安全认证装置和方法
CN104182673A (zh) * 2014-08-12 2014-12-03 赵守中 一种基于指纹的身份识别方法、系统及设备
CN105279478A (zh) * 2015-01-31 2016-01-27 谭荣兵 指纹顺序组合密码验证系统
CN104715172A (zh) * 2015-03-13 2015-06-17 广东欧珀移动通信有限公司 一种应用程序启动方法和装置
CN106372481A (zh) * 2016-08-16 2017-02-01 朱寅 一种指纹排列组合密码

Also Published As

Publication number Publication date
CN106372481A (zh) 2017-02-01

Similar Documents

Publication Publication Date Title
WO2018032969A1 (zh) 一种指纹排列组合密码
US11803633B1 (en) Method and system for securing user access, data at rest and sensitive transactions using biometrics for mobile devices with protected, local templates
CN105335641B (zh) 一种基于指纹识别的身份验证方法及装置
US20180219680A1 (en) Methods and systems for securely storing sensitive data on smart cards
DE102013106295A1 (de) Eingebettetes sicheres Element zur Authentifizierung, Speicherung und Transaktion in einem mobilen Endgerät
CN106407756A (zh) 一种解锁方法及装置
Taralekar et al. One touch multi-banking transaction ATM system using biometric and GSM authentication
Mohamed Security of multifactor authentication model to improve authentication systems
CN102289613A (zh) 一种带指纹识别的液晶usbkey设备
Parusheva A comparative study on the application of biometric technologies for authentication in online banking.
Bala Biometrics and information security
Ashish et al. Biometric Temp
CN110175444B (zh) 虹膜编码与验证方法、系统及计算机可读存储介质
Wilkins Can biometrics secure manufacturing?
US20110264900A1 (en) Method and arrangement for configuring electronic devices
Bidgoli The introduction of biometrics security into organizations: A managerial perspective
CN105897708A (zh) 一种信息保护方法及移动终端
CN103400435A (zh) 一种指纹识别门禁管理系统
Marasco et al. FingerPIN: an authentication mechanism integrating fingerprints and personal identification numbers
Sabater Biometrics as password alternative
Hussain et al. BSC: A Novel Scheme for Providing Security using Biometric Smart Card
Narsaiah et al. Fingerprint Recognition for Future ATM Security
Yliana et al. Vulnerability of Biometric Protection
Lewis Ever had your fingerprints taken? Meeting the challenges of 21st Century access control
Omarova et al. BIOMETRICS AS A METHOD OF COMBAT WITH COVID-19

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17840944

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17840944

Country of ref document: EP

Kind code of ref document: A1