CN107438076A - A kind of network verifying system and its verification method based on fingerprint - Google Patents
A kind of network verifying system and its verification method based on fingerprint Download PDFInfo
- Publication number
- CN107438076A CN107438076A CN201710680669.3A CN201710680669A CN107438076A CN 107438076 A CN107438076 A CN 107438076A CN 201710680669 A CN201710680669 A CN 201710680669A CN 107438076 A CN107438076 A CN 107438076A
- Authority
- CN
- China
- Prior art keywords
- fingerprint
- client
- finger print
- print information
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012795 verification Methods 0.000 title claims abstract description 26
- 238000000034 method Methods 0.000 title claims abstract description 22
- 230000005055 memory storage Effects 0.000 claims abstract description 3
- 238000004891 communication Methods 0.000 abstract description 2
- 210000003811 finger Anatomy 0.000 description 17
- 238000005516 engineering process Methods 0.000 description 7
- 230000008569 process Effects 0.000 description 4
- 238000000060 site-specific infrared dichroism spectroscopy Methods 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 238000011161 development Methods 0.000 description 3
- 238000000605 extraction Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 238000003780 insertion Methods 0.000 description 2
- 230000037431 insertion Effects 0.000 description 2
- 210000003813 thumb Anatomy 0.000 description 2
- 206010054949 Metaplasia Diseases 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004140 cleaning Methods 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 210000002615 epidermis Anatomy 0.000 description 1
- 210000005224 forefinger Anatomy 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000015689 metaplastic ossification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 210000003491 skin Anatomy 0.000 description 1
- 230000009885 systemic effect Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Life Sciences & Earth Sciences (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Collating Specific Patterns (AREA)
Abstract
The present invention relates to communication authentication field, and in particular to a kind of network verifying system and its verification method based on fingerprint.A kind of network verifying system based on fingerprint, includes client, equipment end and certificate server, it is characterised in that:The client includes fingerprint input module, and the fingerprint input module, which includes, obtains finger print information;The certificate server includes information-storing device, and described information memory storage has and allows the client-side information by checking and corresponding finger print information;Described information memory also includes matching module, and the matching module is used to the finger print information that the fingerprint input module obtains carrying out lookup matching with the finger print information recorded in described information memory.It is an object of the invention to provide a kind of network verifying system and its verification method based on fingerprint, the encrypted message of smart machine is obtained by fingerprint identification module, the physical address for matching smart machine verifies to realize that the access of identity is registered, and realizes the high efficiency of network verification.
Description
Technical field
The present invention relates to communication authentication field, and in particular to a kind of network verifying system and its authentication based on fingerprint
Method.
Background technology
IEEE 802.1X are the Valuation Standards on user access network formulated by IEEE, and full name is " based on port
Network access control ".It is formal in 2001 to promulgate, is initially for wired networks design, afterwards in order to coordinate wireless network
Access carries out revision correcting, and is completed in 2004.
802.1x agreements are a kind of Network access control agreements based on port, so specific 802.1x authentication functions must
It must be configured on device port, the access to Internet resources is controlled by certification to the user equipment accessed on port.
802.1x Verification Systems use network application system typical Client/Server (C/S) structure, including three parts:Client
Hold (Client), equipment end (Device) and certificate server (Server).
Wherein, client:LAN subscriber terminal device, but must support EAPOL (Extensible
Authentication Protocol over LAN, LAN Extensible Authentication Protocol) equipment (such as PC), can be by opening
The 802.1x client softwares installed on dynamic client device initiate 802.1x certifications.
Equipment end:The network equipment (such as interchanger) of 802.1x agreements is supported, the client connected is authenticated.It
The port of access to LAN is provided for client, can be physical port or logic port (such as Eth-Trunk mouths).
In addition, certificate server:The equipment for providing authentication service for equipment end 802.1x agreements, is really authenticated
Equipment, realize and user is authenticated, authorized and charging, usually radius server.
In this checking system mentioned above, applied as tradition, possess network insertion under certificate server storage
The username and password information of authority, and on the client, client is to input username and password by prompting client, pair
The information stored in certificate server carries out matching check and correction, if by checking, allows the client to access network.
As the network insertion of equipment is stepped in the development of wireless Internet and the popularization of intelligent and portable equipment, such as smart mobile phone
Also it is more and more frequent.But in this process, smart mobile phone uses touch-screen, nine grids input method, capital and small letter switching, English number
Word switches, and many factors make it that the input process of user name password is comparatively laborious, and user experience is bad.
The content of the invention
It is an object of the invention to provide a kind of network verifying system and its verification method based on fingerprint, pass through fingerprint recognition
Module obtains the encrypted message of smart machine, and the physical address for matching smart machine verifies to realize that the access of identity is registered, real
The high efficiency of existing network verification.
The present invention above-mentioned technical purpose technical scheme is that:A kind of network based on fingerprint is tested
Card system, comprising client, equipment end and certificate server, the client includes fingerprint input module, the fingerprint input
Module is used to obtain finger print information, and the finger print information is sent to the certificate server;
The certificate server includes information-storing device, and described information memory storage has the client allowed by checking
Information and corresponding finger print information;
The certificate server also includes matching module, and the matching module is used for obtain the fingerprint input module
Finger print information carries out lookup matching with the finger print information recorded in described information memory;
The equipment end provides the port to network for the client.
As a preference of the present invention, the client includes physical address input module, the physical address input module
For obtaining the physical address of the client as username information, the fingerprint input module is used to obtain finger print information work
For encrypted message, the username information and the encrypted message are as one group of complete user profile.
As a preference of the present invention, the fingerprint input module includes finger scan module and vectorial modular converter, it is described
Finger scan module is used to scan finger acquisition finger print information, and the vectorial modular converter is used to finger print information being converted into code
As the characteristic vector for representing this fingerprint.
As a preference of the present invention, the client also includes network sweep module.
As a preference of the present invention, the matching module includes comparison module, the comparison module sends out the client
The finger print information sent generates fingerprint characteristic coincidence rate, by the fingerprint compared with the data in described information memory
Feature coincidence rate is compared with predetermined threshold value.
A kind of verification method of the network verifying system based on fingerprint, is comprised the following steps:
Step 1:Client sends connection request to the network that needs connect;
Step 2:The client obtains the finger print information of user;
Step 3:Finger print information is sent to certificate server by the client;
Step 4:The finger recorded in finger print information and certificate server that the certificate server obtains the client
Line information carries out lookup matching;
Step 5:The finger print information that the finger print information that will match in the certificate server obtains with the client enters
Row compares, if comparing unanimously, judges that the client passes through network verification.
As a preference of the present invention, in step 3, the client using the physical address of itself as username information,
One group of user profile, which is combined into, together with the finger print information got is sent to the certificate server.
As a preference of the present invention, in step 2, after the client obtains the finger print information of user, by finger print information
Code is converted into as the characteristic vector for representing this fingerprint.
As a preference of the present invention, before step 1, the client scan network, obtain the network that needs connect
Service set.
As a preference of the present invention, in steps of 5, the finger print information that the certificate server sends the client
Compared with the data in the certificate server, fingerprint characteristic coincidence rate is generated, by the fingerprint characteristic coincidence rate and in advance
If threshold value compares, if being more than or equal to the threshold value, judge that the client passes through checking.The technical program possesses following excellent
Point:
1st, easy to verify, typing is efficient as user profile for the use MAC Address and finger print information of the system.
2nd, verification mode is identical with traditional 802.1x verification modes, and network reconstruction is easy.
3rd, certificate server includes information-storing device, is stored with delegatable user profile, and matched and searched is convenient.
Brief description of the drawings
Fig. 1 is each module diagram in embodiment one;
Fig. 2 is each module diagram in client in Fig. 1;
Fig. 3 is the flow chart in embodiment 1.
Embodiment
Specific examples below is only explanation of the invention, and it is not limitation of the present invention, art technology
Personnel can make the modification of no creative contribution to the present embodiment as needed after this specification is read, but as long as
All protected in scope of the presently claimed invention by Patent Law.
Embodiment 1, as described in this paper background technology, development and intelligent movable equipment with development of Mobile Internet technology
Hardware update, people are more and more networked using intelligent movable equipment.In order to solve the network of WLAN peace
Full problem, it is proposed that 802.1X agreements, the 802.1X agreements as lan port access control mechanism in ethernet networks by
Extensive use, it is used to solve the problems, such as certification and secure context in Ethernet;802.1X agreements are a kind of nets based on port
Network access control protocol, and the Network access control based on port refers to:In the port of LAN Gateway to being accessed
Client is authenticated and controlled, if the client being connected on port can be accessed in LAN by certification
Resource;If the resource in LAN can not can not be accessed by certification.
In the technical program, the hardware of a whole network verifying system build with traditional networking it is too not big
Change, this allows for the hardware update for not needing substantial amounts of fund to carry out big degree to network using the technical program.
Intelligent and portable equipment of today, such as mobile phone, either iPhone or other main flow Android mobile phones, often match somebody with somebody
For fingerprint sensing identification device, the technical program rests against fingerprint sensing identification device to obtain the fingerprint of user letter
Breath, also reduces fund cost caused by HardwareUpgring.
The present embodiment discloses a kind of network verifying system based on fingerprint, as shown in figure 1, the technical program is main hard
Part equipment is the structural representation of 802.1X Verification Systems, is included as the structural representation of 802.1X Verification Systems, including:Client
Hold A (Client), equipment end B (Device) and certificate server C (Server);The customer end A needs to support EAPOL
(Extensible Authentication Protocol over LAN, the Extensible Authentication Protocol on LAN), and client
End A can initiate 802.1X certifications by starting customer end A software;In the technical program, customer end A is to support fingerprint to know
Other mobile phone.
Equipment end B is the network equipment for supporting 802.1X agreements, for providing the port of access to LAN for customer end A,
Specific example, in hardware can be router, and router has the function of judging network address and select IP paths, and it can be more
In internetworking environment, flexible connection is established, each seed can be connected with media access method with entirely different packet
Net, customer end A can rely on router and connect into internet.Except router, network hotspot, i.e. wireless network can also be
In access point, access point, compared with wireless router mentioned above, common wireless aps do not have route work(
Can, increase coverage during its more function, the wireless terminal of access and original network are to belong to same subnet.
Certificate server C is to provide the entity of authentication service, and for being authenticated, authorizing to customer end A and charging, it can
Think that RADIUS (Remote Authentication Dial-In User Service, remote authentication dial-in user service) takes
Business device.In the checking system of this case, 802.1X verification process can with triggering mode can be it is a variety of, can be by client
Actively initiate, can also be initiated by equipment end.In " customer end A active triggering mode ", actively sent out from client to equipment end
EAPOL-Start (EAPOL starts) message is sent to carry out triggering authentication;And being used for support in " equipment end active triggering mode " can not lead
The dynamic client for sending EAPOL-Start messages, such as the 802.1x clients that Windows XP are carried.Either which kind of is triggered
Mode, 802.1x Verification Systems are all to realize authentication information between client, equipment end and certificate server using EAP protocol
Exchange.The EAPOL forms based on ethernet local area network are used to encapsulate EAP messages between client and equipment end, then
It is carried in ethernet data frame and interacts.
In the present case, customer end A, i.e. mobile phone, progress web search step, user can put open WIFI switches, make first
With mobile phone searching whole network, to find the network based on 802.1X certifications, on mobile phone screen corresponding to the real network
SSID.SSID is Service Set Identifier abbreviation, is meant:Service set.SSID technologies can be by one
WLAN is divided into several sub-networks for needing different identity to verify, each sub-network is required for independent authentication,
Corresponding sub-network can just only be entered by the user of authentication, prevent unauthorized user from entering present networks.
User finds the network for needing to connect, SSID corresponding to click, now mobile phone ejection fingerprint input mark.Such as Fig. 2
It is shown, customer end A, i.e. mobile phone, include fingerprint input module A3.Fingerprint input module A3 include finger scan modules A 31 and to
Measure modular converter A32.Finger scan modules A 31 can use the Fingerprint Identification Unit of capacitive sensing on hardware, installed in mobile phone
Surface.The general principle of capacitive sensing technology is that it conducts fingerprint image according to the resistance variations on user's finger top layer.Carefully
The combination of both arrangement modes of particular electrical quality and cell in born of the same parents enables the resistance of skin surface to be measured to
And its change is unique.Fingerprint Identification Unit reads the resistance variations of finger live body epidermis first, and then conduction shows these changes
Finger figure.
It should be noted that customer end A obtains the finger print information of user using fingerprint input module A3, and it is corresponding
, the information-storing device C1 in certificate server C must also include the corresponding finger print information that can be verified for use by examination & verification,
Consequently facilitating later stage matching and comparison.Due to the data volume of finger print information and little, very big hardware load will not be caused, so
In practical operation, multiple finger print informations can be included, form a complete finger print information group.Such as four can be supported altogether
Finger print information, the left hand thumb of user, hand thumb, left index finger and right hand forefinger are corresponded to respectively.Because in component environment,
Due to user, some finger there may be greasy dirt, cause finger print information not distinguish, it is difficult to input.Completely refer to when in the presence of one group
Line group information, you can user can voluntarily select the finger of cleaning to be operated during checking.
As shown in figure 1, fingerprint input module A3 is also comprising the vectorial modular converter being used cooperatively with finger scan modules A 31
A32, in the technical program, the vectorial modular converter A32 finger print information that gets of acting as scanning enters line code, makees
Vector is characterized, the concrete form of characteristic vector is string number.In the processing procedure of fingerprint, it is broadly divided into fingerprint image
Collection, Fingerprint enhancement, the several parts of feature extraction and matching, wherein feature extraction and matching is the difficult point of technology, whole
Also occupy critical role in individual system.In the technical program, it can use in the prior art to the mode of Finger print characteristic abstract,
Such as original fingerprint image is pre-processed and feature extraction, by original fingerprint image be converted into by limited individual feature point group into
Data link table, the neighbor point of characteristic point and its surrounding is handled, generate matching characteristic vector, characteristic vector represent
Structural relation between each characteristic point.
Obtain including the finger print information of characteristic vector, just obtain corresponding encrypted message in the technical program.It is and right
The username information answered, the title input of user name is carried out without user on mobile phone, but is also inputted comprising physical address
Modules A 2.
By physical address input module A2, customer end A gets the physical address of itself, i.e. MAC (Media automatically
Access Control, medium access control) address, unlike IP address, IP address can according to the setting of user come
It is changed, and MAC Address, after any network equipment is once produced, its MAC Address can not be by matching somebody with somebody in locality connection
Put and modify.Based on the characteristic that MAC Address is more fixed, in the technical program, user name that MAC Address is just used as.
Mobile phone uses MAC Address as user name, and the characteristic vector of fingerprint carries out 802.1X network verification for password.
As shown in figure 1, in the system, certificate server C, i.e. 802.1X radius server ends, include information and deposit
Reservoir C1.Corresponding MAC Address and spy can be contained naturally by the user profile of checking by being stored with information-storing device C1
Levy vector information.
The mac address information and the fingerprint characteristic vector information of user obtained in customer end A is sent to certificate server C,
Verified to certificate server C.Specifically, matching module C2 can be searched, matches, be compared finger print information.Matching module C2
By mac address information, in certificate server C, the fingerprint database corresponding to the mac address information is found.Actually should
In, the mac address information and finger print data information that are stored on information-storing device C1 not necessarily correspond, it is possible to
It is one-to-many.Such case is because the multiple fingers of same user same customer end A typing in other words refer to as mandate
Line.Matching module C2 is additionally operable to calculate, and calculates the characteristic vector of representative this fingerprint now transmitted and registered fingerprint
Similarity, its similarity are judged as identifying successfully when exceeding threshold value (threshold).If its similar degree is just sentenced for more than 95%
It is set to certification success, now threshold value is exactly that 0.95. threshold values decide authentication result.And the setting of threshold value can be in system building
It is manually set by keeper.So far, comparison match step is completed.
, can be with tradition and 802.1x specific exchange method and authentication mode includes the form of message in the technical program
802.1x verification mode be consistent, do not make an amendment.
By such mode of operation, user can use mobile phone as customer end A, it is no longer necessary to as conventional art field
In, username information and encrypted message are manually entered on the touchscreen, then carry out 802.1x network verification.
But use physical address input module A2 obtains mobile phone in itself and unique MAC hardware address, eliminates manually
The trouble of input, and the input value of password need to be scanned by finger scan modules A 31 and obtain and enter by vectorial modular converter A32
The code metaplasia of row characteristic vector into, you can carry out transmission checking in a network, convenient and swift, user experience is good.
The effect of modules and annexation, are described further technical scheme in the present embodiment as detailed above
One complete job step.
First, start to sweep into step 1, network sweep step, in this step, the network sweep modules A 1 of customer end A
Retouch, show the service set of each network and be shown on the display screen of customer end A.
Then, into step 2, fingerprint scanning step.In this step, user selects to need the network institute connected first
Corresponding service set, system send the request for connecting the network, customer end A ejection prompting, prompt to need user's input to refer to
Line.
Finger is seated in customer end A by user, i.e., on the Fingerprint Identification Unit on mobile phone, the finger scan mould in customer end A
Block A31 obtains the finger print information of active user.
Now, into step 3, step of converting.In this step, fingerprint input module A3 vectorial modular converter A32 will
The finger print information code got, switchs to characteristic vector.
Into step 4, forwarding step.The characteristic vector of the fingerprint is sent to certificate server C from customer end A.Now send out
The information sent includes username information and encrypted message.In the present embodiment, corresponding to username information and encrypted message are distinguished
It is the physical MAC address and finger print information of customer end A.
After certificate server C receives username information and encrypted message, step 5, comparison match step are put into.Visitor
Family end A just includes information-storing device C1 originally, wherein including username information and finger print information, matching module C2 is looked into
Look for, the finger print information acquired in step 4 characteristic vector will be compared with the finger print information in certificate server C,
Fingerprint characteristic coincidence rate is obtained, then compared with predetermined threshold value.Threshold value can carry out systemic presupposition, such as 95% according to actual conditions.
Afterwards, into step 6, step is verified, when fingerprint characteristic coincidence rate is more than or equal to predetermined threshold value, the client
A passes through checking.After checking, customer end A completes 802.1x certifications by normal 802.1x interaction flows.The present embodiment
In 802.1x authentication methods and traditional 802.1x authentication methods be consistent, do not change any 802.1x message identifyings and friendship
Mutual process.
Claims (10)
1. a kind of network verifying system based on fingerprint, includes client, equipment end and certificate server, it is characterised in that:Institute
State client and include fingerprint input module, the fingerprint input module is used to obtain finger print information, and the finger print information is sent
To the certificate server;
The certificate server includes information-storing device, and described information memory storage has the client-side information allowed by checking
With corresponding finger print information;
The certificate server also includes matching module, and the matching module is used for the fingerprint for obtaining the fingerprint input module
Information carries out lookup matching with the finger print information recorded in described information memory;
The equipment end provides the port to network for the client.
A kind of 2. network verifying system based on fingerprint according to claim 1, it is characterised in that:The client includes
Physical address input module, the physical address that the physical address input module is used to obtain the client are believed as user name
Breath, the fingerprint input module are used to obtain finger print information as encrypted message, the username information and the encrypted message
As one group of complete user profile.
A kind of 3. network verifying system based on fingerprint according to claim 1, it is characterised in that:The fingerprint inputs mould
Block includes finger scan module and vectorial modular converter, and the finger scan module is used to scan finger acquisition finger print information, institute
Vectorial modular converter is stated to be used to finger print information being converted into code as the characteristic vector for representing this fingerprint.
A kind of 4. network verifying system based on fingerprint according to claim 3, it is characterised in that:The client is also wrapped
Module containing network sweep.
A kind of 5. network verifying system based on fingerprint according to claim 1 or 2 or 3 or 4, it is characterised in that:It is described
Matching module includes comparison module, the finger print information that the comparison module sends the client and described information memory
In data be compared, generate fingerprint characteristic coincidence rate, the fingerprint characteristic coincidence rate is compared with predetermined threshold value.
6. a kind of verification method of the network verifying system based on fingerprint, it is characterised in that comprise the following steps:
Step 1:Client sends connection request to the network that needs connect;
Step 2:The client obtains the finger print information of user;
Step 3:Finger print information is sent to certificate server by the client;
Step 4:The fingerprint letter recorded in finger print information and certificate server that the certificate server obtains the client
Breath carries out lookup matching;
Step 5:The finger print information that the finger print information that will match in the certificate server obtains with the client is compared
It is right, if comparing unanimously, judge that the client passes through network verification.
A kind of 7. verification method of network verifying system based on fingerprint according to claim 6, it is characterised in that:In step
In rapid 3, the client is combined into one group using the physical address of itself as username information together with the finger print information got
User profile is sent to the certificate server.
A kind of 8. verification method of network verifying system based on fingerprint according to claim 6, it is characterised in that:In step
In rapid 2, after the client obtains the finger print information of user, finger print information is converted into code as the feature for representing this fingerprint
Vector.
A kind of 9. verification method of network verifying system based on fingerprint according to claim 6, it is characterised in that:In step
Before rapid 1, the client scan network, acquisition needs the service set of the network connected.
A kind of 10. verification method of network verifying system based on fingerprint according to claim 6, it is characterised in that:
In step 5, the certificate server enters the finger print information that the client is sent and the data in the certificate server
Row compares, and generates fingerprint characteristic coincidence rate, the fingerprint characteristic coincidence rate is compared with predetermined threshold value, if more than or equal to described
Threshold value, then judge that the client passes through checking.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201710680669.3A CN107438076A (en) | 2017-08-10 | 2017-08-10 | A kind of network verifying system and its verification method based on fingerprint |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201710680669.3A CN107438076A (en) | 2017-08-10 | 2017-08-10 | A kind of network verifying system and its verification method based on fingerprint |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN107438076A true CN107438076A (en) | 2017-12-05 |
Family
ID=60461366
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201710680669.3A Pending CN107438076A (en) | 2017-08-10 | 2017-08-10 | A kind of network verifying system and its verification method based on fingerprint |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN107438076A (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113572773A (en) * | 2021-07-27 | 2021-10-29 | 迈普通信技术股份有限公司 | Access equipment and terminal access control method |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104394531A (en) * | 2014-10-08 | 2015-03-04 | 无锡指网生物识别科技有限公司 | Wireless network connecting method of a terminal device |
| US20170024605A1 (en) * | 2008-07-22 | 2017-01-26 | Synaptics Incorporated | Systems and methods for authenticating a user of a biometric sensor |
| WO2017053494A1 (en) * | 2015-09-23 | 2017-03-30 | Alibaba Group Holding Limited | Method, apparatus and system for preventing cross-site request forgery |
| US20170149840A1 (en) * | 2015-11-19 | 2017-05-25 | Bank Of America Corporation | Selectively Enabling and Disabling Biometric Authentication Based on Mobile Device State Information |
-
2017
- 2017-08-10 CN CN201710680669.3A patent/CN107438076A/en active Pending
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20170024605A1 (en) * | 2008-07-22 | 2017-01-26 | Synaptics Incorporated | Systems and methods for authenticating a user of a biometric sensor |
| CN104394531A (en) * | 2014-10-08 | 2015-03-04 | 无锡指网生物识别科技有限公司 | Wireless network connecting method of a terminal device |
| WO2017053494A1 (en) * | 2015-09-23 | 2017-03-30 | Alibaba Group Holding Limited | Method, apparatus and system for preventing cross-site request forgery |
| US20170149840A1 (en) * | 2015-11-19 | 2017-05-25 | Bank Of America Corporation | Selectively Enabling and Disabling Biometric Authentication Based on Mobile Device State Information |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113572773A (en) * | 2021-07-27 | 2021-10-29 | 迈普通信技术股份有限公司 | Access equipment and terminal access control method |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12075342B2 (en) | Cellular network onboarding through wireless local area network | |
| US20230328516A1 (en) | Device based credentials | |
| JP3869392B2 (en) | User authentication method in public wireless LAN service system and recording medium storing program for causing computer to execute the method | |
| US7633953B2 (en) | Method, system and device for service selection via a wireless local area network | |
| US20040073793A1 (en) | Network system, information processing device, repeater, and method of building network system | |
| CN105898743B (en) | A kind of method for connecting network, apparatus and system | |
| CN103297968B (en) | A kind of method, equipment and the system of wireless terminal certification | |
| CN101102188B (en) | Method and system for mobile access to virtual local area network | |
| JP2006527432A (en) | Login method with multiple identifiers for instant messaging system | |
| CN107948979B (en) | Information processing method and device and auditing equipment | |
| CN101616414A (en) | Method, system and server for terminal authentication | |
| US20060291659A1 (en) | Wireless communication authentication | |
| CN106961683B (en) | A method, system and discoverer AP for detecting illegal AP | |
| US20060112269A1 (en) | Level-specific authentication system and method in home network | |
| CN102882851A (en) | Generating method of address book and server | |
| CN107612883A (en) | A kind of mobile applications automatic logging method and system | |
| CN107135506B (en) | A kind of portal authentication method, apparatus and system | |
| CN108834146A (en) | A kind of Bidirectional identity authentication method between terminal and authentication gateway | |
| CN114554474B (en) | Access method, system and network intercommunication functional entity for NSA users roaming to SA | |
| CN106657034A (en) | Service authentication method and authentication capability opening server | |
| CN107438076A (en) | A kind of network verifying system and its verification method based on fingerprint | |
| JP2013504828A (en) | ICP website login method, system and login device for user in ID / locator separation network | |
| CN101321100B (en) | Communication method and system, and household base station | |
| CN107172185A (en) | Network collocating method and device | |
| JP2007536844A (en) | Method and system for storing temporary I-WLAN identities - Patents.com |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171205 |