CN108665268A - Fingerprint IRLRD feature encryptions method and the payment system based on this method - Google Patents

Fingerprint IRLRD feature encryptions method and the payment system based on this method Download PDF

Info

Publication number
CN108665268A
CN108665268A CN201810469567.1A CN201810469567A CN108665268A CN 108665268 A CN108665268 A CN 108665268A CN 201810469567 A CN201810469567 A CN 201810469567A CN 108665268 A CN108665268 A CN 108665268A
Authority
CN
China
Prior art keywords
fingerprint
irlrd
feature
circuit
random
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201810469567.1A
Other languages
Chinese (zh)
Inventor
姚丽莎
李孙长
王占凤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Xinhua University
Original Assignee
Anhui Xinhua University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Xinhua University filed Critical Anhui Xinhua University
Priority to CN201810469567.1A priority Critical patent/CN108665268A/en
Publication of CN108665268A publication Critical patent/CN108665268A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3674Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a kind of fingerprint IRLRD feature encryption methods, and the mobile-payment system based on fingerprint IRLRD feature encryption methods.The mobile-payment system, including ARM control modules, data memory module, fingerprint collecting circuit, human-computer interaction circuit, communication interface circuit, relay control output circuit and the power circuit for foregoing circuit power supply.ARM control modules are by ARM fingerprint IRLRD feature encryptions, realizing the authentication of fingerprint IRLRD feature encryptions.The present invention has the following advantages compared with prior art:The mobile-payment system of the present invention; it obtains the fingerprint image of user and the IRLRD features that take the fingerprint is as key; the Secure Transaction for completing mobile payment is protected by Multi Identity Attestation; it prevents payment information hacked and destroys; prevent payment information in mobile payment the security crises such as to be tampered, reveal or fake, ensures the orderly progress of mobile payment.

Description

Fingerprint IRLRD feature encryptions method and the payment system based on this method
The present invention is application for a patent for invention number:2015101916255, the applying date:On April 21st, 2015, denomination of invention:Refer to The divisional application of line IRLRD feature encryptions method and mobile-payment system and method based on this method.
Technical field
The present invention relates to fingerprint characteristic encryption technology field more particularly to a kind of fingerprint IRLRD feature encryption methods, And the mobile-payment system based on fingerprint IRLRD feature encryption methods.
Background technology
Important link of the mobile payment as e-commerce, safety are the importances of entire e-commerce security. With the development of e-commerce, e-commerce spreads to the every aspect in our live and works, e-finance services content Such as online purchase, Web bank, enterprise bank, Home Banking, management of personal money, Internet stock trading, online reimbursement, network payment of duty Deng great changes also are occurring.All these network finance services are required for realizing by mobile payment.But due to moving Dynamic payment is realized by Internet, and due to the opening of Internet, payment information is highly susceptible to the broken of hacker Bad and attack, the leakage of these information and the impaired interests for directly threatening enterprises and individuals, so constantly reinforcing mobile payment Information privacy, the true integrality of information and the non-repudiation of information are that current realization mobile payment security to be considered Sixty-four dollar question.
By biological identification technology, using the fingerprint with uniqueness and lifelong invariance, as mobile-payment system People's authentication information can greatly improve the safety and reliability of mobile-payment system.But due to the inherency of fingerprint characteristic, The defect that there are templates to be easily stolen, cannot change, when fingerprint characteristic is by security attack, fingerprint characteristic will be unable to continue to make With.To ensure that the safety of fingerprint characteristic identification, the minutia to take the fingerprint incorporate in encryption frame, finger has been effectively ensured The safety of line feature avoids the attack in fingerprint characteristic transmission process, and fingerprint characteristic encryption technology is applied to mobile branch Fu Zhong efficiently solves the security hidden trouble in mobile payment.
Invention content
It is an object of the invention to overcome the deficiencies of the prior art and provide a kind of fingerprint IRLRD feature encryption methods, and Mobile-payment system based on fingerprint IRLRD feature encryption methods.
The present invention is achieved by the following technical solutions:A kind of fingerprint IRLRD feature encryption methods,
The IRLRD features of the fingerprint are what the fingerprint singularity based on the field of direction extracted, are retouched using random regional area Subcharacter is stated to determine fingerprint characteristic;Specifically comprise the following steps:
(61) random to generating one in fingerprint foreground area according to any one random seed s in the fingerprint image of acquisition Point set, and a corresponding random direction is generated to each random point, it obtains random point set and is expressed as: N is the number of random point;
(62) the fingerprint IRLRD sampled according to the field of direction feature extraction of fingerprint regional area1Feature, if random point miIt is right The sampled point answered is classified as { oi,1,oi,2,…,oi,k, wherein K is sampling number, miCorresponding description:{φ(oi,1i),φ (oi,2i),…,φ(oi,ki),For sampled point oi,kRelative to θiAngle, retouch all random points are corresponding Son is stated to be connected in turn to obtain fingerprint IRLRD1Feature;
(63) according to step (61) extraction random point set M in each fingerprint feature point carry out it is a series of translation and Rotation generates a series of fingerprint feature information, forms random fingerprint feature, is encoded to random fingerprint characteristic data value IRLRD2
(64) the fingerprint IRLRD that step (62) obtains1The IRLRD that feature and step (63) obtain2Character code data value connects It picks up and, obtain fingerprint IRLRD features:IRLRD=IRLRD1+IRLRD2
Mould is stored based on the mobile-payment system of power fingerprint IRLRD feature encryption methods, including ARM control modules, data Block, fingerprint collecting circuit, human-computer interaction circuit, communication interface circuit, relay control output circuit and for foregoing circuit power Power circuit, the ARM control modules are by ARM fingerprint IRLRD feature encryptions, realizing fingerprint IRLRD feature encryptions Authentication.
As advanced optimizing for said program, the human-computer interaction circuit includes liquid crystal display and touch screen and its outer Circuit is enclosed, is realized by touch interactive device and is interacted with the mobile-payment system.
As advanced optimizing for said program, the relay controls output interface circuit for realizing fingerprint IRLRD The control of the mobile payment platform product of feature encryption exports.
As advanced optimizing for said program, the signal output end of the ARM control modules is stored with the data respectively Module, the fingerprint collecting circuit, human-computer interaction circuit, the communication interface circuit, relay control output circuit electrical connection, should Communication interface circuit is RS-232 serial interface circuits.
The present invention has the following advantages compared with prior art:The mobile branch based on fingerprint IRLRD feature encryptions of the present invention In the system of paying:Fingerprint IRLRD feature keys are extracted, using " the fingerprint of the topological structure and variation of constant " fingerprint characteristic " IRLRD feature keys " solve the contradiction of secure communication, i.e., the problem that " confidentiality " and " non repudiation " cannot be satisfactory to both parties.Its In, the topological structure of constant " fingerprint characteristic " is since different " fingerprint IRLRD feature keys " are by same " the fingerprint spy What sign " generated, so the topological structure with constant " fingerprint characteristic ";" the fingerprint IRLRD feature keys " of variation is by same What one fingerprint stochastic transformation generated, therefore have and do not guessed the cipher random for obtaining and ensuring information security.Meanwhile fingerprint IRLRD feature keys also solve random key and are unable to Self-certified and the high-cost problem of fingerprint identity validation.Key is accepted as unavoidable Card refers to that the key can be as the voucher of user, for example the voucher is user's fingerprint, and fingerprint is the user Legal voucher.Thus the key is just proved to be the user naturally, therefore under the premise of key secret, solves random Key can be with the problem of Self-certified;The high cost of fingerprint identity validation refer to purchase fingerprint instrument be a kind of additional expenditure after all, and Fingerprint IRLRD feature keys are generated, user need to only reserve a fingerprint on fingerprint random generator, later without using fingerprint Instrument constantly can generate and use fingerprint IRLRD feature keys, thus can use fingerprint identity validation at low cost.Using fingerprint The key that IRLRD features are signed as fingerprint electron solves the problems, such as the concealed and disclosed Self-certified problem of " key ".
Fingerprint IRLRD characteristic electrons signature is signed using fingerprint IRLRD characteristic electrons so that law of electronic signature has more method Validity is restrained, it makes authentication and authentification of message unified, and the biological characteristic of electronic signature people and electronic signature key is made to close One, the biological characteristic and electronic signature key unification, electronic signature information content authentication and information owner's body of the people that signs electronically Both part certifications are unified.It is solved using fingerprint IRLRD characteristic electrons signature and generates random fingerprint spy using fingerprint feature information Key problem is levied, solves the problems, such as intrinsic fingerprint characteristic to become random fingerprint feature key, it is close to solve random fingerprint feature The problem of key safety certification, solves in the local Verify Your Identity questions for using fingerprint at low cost.
Fingerprint IRLRD characteristic electron certificates calculate random fingerprint IRLRD feature keys, fingerprint IRLRD characteristic electrons signature The elements such as method, fingerprint electron signature authentication introduce digital certificates, become fingerprint IRLRD characteristic electron certificates, are demonstrate,proved with fingerprint electron Book is carrier, which possesses the excellent of the technologies such as fingerprint characteristic key, fingerprint electron signature algorithm, fingerprint electron signature authentication Gesture, this be digital certificates it is incomparable.Fingerprint IRLRD characteristic electron certificates are provided with can authentication in open and can be concealed Both " key " unified function.Its based on digital certificates, be transformed the proprietary public-key cryptography of its signature algorithm, certificate, Signature of the certificate issuers to certificate.
Based on the WPKI technologies of CA fingerprint IRLRD feature key certifications, when which asks other side's public key to CA every time all The non-repudiation and authenticity of the authentication in traditional PKI technologies must be overcome by fingerprint IRLRD feature keys come certification Existing defects, if the certificate that the third party has usurped user's second illegally has registered the public private key pair of user's second on CA, and this is public Private key pair without associated biometric identity authentication information, is believed again when the third party is sent using the identity of user's second to user's first Breath, and user's first can only prove the identity of user's second by the public key of user's second, this makes user's second that can not clarify, and identity is recognized The non-repudiation and authenticity existing defects of card.
The method of mobile payment based on fingerprint IRLRD feature encryptions of the present invention, obtains the fingerprint image of user and extraction Fingerprint IRLRD features protect the Secure Transaction for completing mobile payment, such enterprise and use by Multi Identity Attestation as key Family can both effectively prevent payment information hacked and destroy during mobile payment, be also possible to prevent fingerprint spy Sign is distorted, and has effectively been prevented payment information in mobile payment and the security crises such as has been tampered, reveals or fakes, guarantee mobile payment Orderly progress.
Description of the drawings
Fig. 1 is the structural schematic diagram of the mobile-payment system of the fingerprint IRLRD feature encryptions of the present invention.
The flow chart of the fingerprint IRLRD feature encryption algorithms of Fig. 2 present invention.
Fig. 3 is the fingerprint image core point and triangulation point of the preferred embodiment of the present invention.
The random point of Fig. 4 the preferred embodiment of the present invention generates schematic diagram.
The Tico sampling structures of Fig. 5 the preferred embodiment of the present invention.
The translation schematic diagram of Fig. 6 the preferred embodiment of the present invention.
The rotation schematic diagram of Fig. 7 the preferred embodiment of the present invention.
The scaling schematic diagram of Fig. 8 the preferred embodiment of the present invention.
The fingerprint IRLRD characteristic electrons signature schematic diagram of Fig. 9 present invention.
The fingerprint IRLRD characteristic electron certificate format schematic diagrames of Figure 10 present invention.
The PKI technical schematic diagrams based on CA fingerprint IRLRD feature key certifications of Figure 11 present invention
The secure wireless communication control principle schematic diagram of the WPKI of Figure 12 present invention.
The mobile payment process schematic of the fingerprint IRLRD feature encryptions of Figure 13 present invention.
Specific implementation mode
It elaborates below to the embodiment of the present invention, the present embodiment is carried out lower based on the technical solution of the present invention Implement, gives detailed embodiment and specific operating process, but protection scope of the present invention is not limited to following implementation Example.
As shown in Figure 1, a kind of mobile-payment system based on fingerprint IRLRD feature encryptions of the present embodiment includes ARM controls Molding block 10, data memory module 11, fingerprint collecting circuit 12, human-computer interaction circuit 14, communication interface circuit 15, relay control Output circuit 13 processed and the power circuit 16 powered for foregoing circuit, the ARM control modules pass through special to ARM fingerprints IRLRD Sign encryption, realizes the authentication of fingerprint IRLRD feature encryptions.
ARM control modules include arm processor, and fingerprint collecting electricity includes fingerprint sensor, arm processor be for finger Line sensor, relay control output interface, and Ethernet interface, AD/DA, LCD and touch screen, RS-232, memory carry out The ARM embeded processors of communication.The signal output end of ARM control modules respectively with the data memory module, the fingerprint collecting Circuit, human-computer interaction circuit, the communication interface circuit, relay control output circuit electrical connection, communication interface circuit RS- 232 serial interface circuits realize public network information access for controlling such as mobile device module, GPS module.
Fingerprint sensor realizes that the identity of fingerprint IRLRD feature encryptions is recognized by ARM fingerprint IRLRD feature encryption algorithms Card.Relay controls output interface and is exported for realizing the control of the mobile payment platform product of fingerprint IRLRD feature encryptions.With Too network interface for realizing internet network-control.The LCD and touch screen are the people for realizing information inputs such as fingerprint etc. Machine interface is interactive.
The memory is used to store the data parameters etc. of mobile device embedded OS and its operation.The power supply Circuit constantly thinks system power supply for ensureing.
Wherein, the ARM fingerprint IRLRD feature encryption algorithms in arm processor are the cores of this system, and feature exists In including the extraction of fingerprint IRLRD feature keys, fingerprint IRLRD characteristic electrons signature, fingerprint IRLRD characteristic electrons certificate and be based on The WPKI technologies of CA fingerprint IRLRD feature key certifications.Fingerprint IRLRD feature encryptions algorithm flow chart such as Fig. 2 institutes of the present invention Show, first with fingerprint singularity and the translation of fingerprint image, rotation and the unrelated characteristic of scaling, take the fingerprint singular point with Machine feature-fingerprint IRLRD features, the fingerprint IRLRD features based on extraction generate safe and reliable fingerprint characteristic key, by this For encrypting in frame, electronic signature, digital certificates and PKI technologies are transformed using fingerprint IRLRD features, formation refers to Line IRLRD characteristic electrons signature, fingerprint IRLRD characteristic electrons certificate and the WPKI based on CA fingerprint IRLRD feature key certifications Technology.
The fingerprint IRLRD feature keys generate, and complete to encrypt as feature key using IRLRD features, and IRLRD is special Sign is fingerprint singularity detection and extraction algorithm based on the field of direction, describes subcharacter using random regional area to determine fingerprint Feature.
The minutiae feature of fingerprint is common feature in fingerprint recognition.Fingerprint minutiae feature includes mainly that singular point is special It seeks peace structure feature.The feature of these minutiae points is highly stable, has unchangeable property.Core point and triangulation point constitute singular point Feature, as shown in Figure 3.The singular point of fingerprint image and the translation of fingerprint image, rotation and scaling are unrelated, therefore common unusual Point is used as fingerprint index.Since fingerprint algorithm is computationally intensive, higher to computer performance and configuration requirement, therefore present invention extraction refers to Line minutiae point random character, the detail characteristics of fingerprints based on extraction generate safe and reliable fingerprint characteristic key, by this for adding In close frame.And in most of cryptographic systems, it generates uncertain key and is only safety and reliability, this just needs setting Consider to increase its unpredictability, that is, randomness when counting key schedule.
A random seed s is given in fingerprint image, to generating a random point set in fingerprint foreground area, and it is right Each random point generates a corresponding random direction, this N number of random point set with direction is expressed as:Wherein, N is the number of random point.All random points are d apart from the upper limit to partitioning boundary2, lower limit It is d1,d2It can change with the variation of the size of foreground area, this makes when foreground area is smaller When can also generate enough random points.If Fig. 4 is the schematic diagram that random point generates, random point is random equally distributed.
Sub-sampling structure is described according to the minutiae point of Tico, as shown in figure 5, the stochastic set generated after being generated to random point It closes to extract minutia description and realize the sampling of Fingerprint diretion, and then extracts IRLRD features.Wherein, it is located at sampling The point m of structure centre is reference point, each sampled point pk,lEquidistantly distribute is being r by L radius sizel(1≤l's≤L) is same On heart circle, and include K on each circlelA sampled point.If using θ as the direction of reference point m, all random point miIt can be from ginseng The innermost layer concentric circles that examination point m is directed toward a little sets out, and be linked in sequence each layer successively from inside to outside in the counterclockwise direction, composition one A vector.Corresponding minutiae point description is the angle of each sampled point and reference point direction, then all angle values is claimed to form Vector be description subvector, description to rotation and translation have good robustness.
It defines each sampled point and the angle in reference point direction describes son, IRLRD feature representations as each minutiae point The field of direction feature of fingerprint regional area, and fixed length.If random point miCorresponding sampled point is classified as { oi,1,oi,2,…,oi,k, Wherein, K is sampling number.Formula { φ (o can be usedi,1i),φ(oi,2i),…,φ(oi,ki) indicate miIt is corresponding to retouch Son is stated, whereinFor sampled point oi,kRelative to θiAngle, then first all random points corresponding description is connected successively It picks up to obtain part IRLRD characteristic informations IRLRD1, i.e.,What the present invention extracted retouches State the square presence feature that subcharacter is random site.In the fingerprint identity validation stage, according to the random point set of storageCompletely the fingerprint IRLRD of sampling is extracted at square scene with certification fingerprint1Feature.But it is retouched in extraction Before stating subcharacter, it is necessary to be transformed into random point under the coordinate system of certification fingerprint first.It is carried out using central point and its direction Coordinates calibration, it is assumed that the central point and its direction of resampled finger and certification fingerprint are respectively (xt,ytt) and (xq,yqq), then Random point setIt can be converted by following formula:
Wherein, Δ θ=θqt,It is the random point after Coordinates calibration.By M', certification fingerprint IRLRD1Feature can be extracted by following formula:
Wherein, o'i,kIt is the direction of certification fingerprint sampling point position.
In order to increase the randomness of key, with algorithm to each fingerprint feature point in the random point set M that originally extracted A series of translation and rotation are carried out, a series of fingerprint feature information is generated with this.The parameter wherein translate, rotated is by machine What device randomly generated, from there through random translation and rotation, random fingerprint feature is formed, to be encoded to random fingerprint feature Data value IRLRD2,
The specific method is as follows:
1. as shown in fig. 6, P points are some fingerprint feature points, T is translation vector, and P' is the point after translation, i.e. P'=P+ T:
2. as shown in fig. 7, P points are a bit after translation, P' is by more postrotational, and θ is the angle of rotation, and R is Spin matrix:
P'=R*P,
3. as shown in figure 8, P1And P0It is by translation, postrotational fingerprint feature point, P1' and P0' it is P1And P0By contracting Point after putting, wherein S are scaled matrix.To simplify the calculation, SxAnd SyValue it is generally identical:
P'=S*P,
4. the coordinate for each of obtaining putting is stitched together, fingerprint characteristic IRLRD is generated to encode2
In the process, the topological structure of fingerprint will not change, this makes IRLRD features not only with unpredictable Property, also there is identity authentication function, to solve the problems, such as the non-repudiation of key and crypticity.In conclusion by fingerprint IRLRD1Feature and IRLRD2Character code data value connects, and obtains fingerprint IRLRD features, is expressed as:IRLRD= IRLRD1+IRLRD2.In the algorithm, each random seed is related to description, will be obtained using different random seeds To entirely different IRLRD features, realize that IRLRD features have defeasibility and changeability.The IRLRD that the algorithm takes the fingerprint Feature generates key as feature vector, this describes subcharacter has good robustness to rotation and translation, is suitable for fingerprint It encrypts in frame.
The fingerprint IRLRD characteristic electrons signature, the key signed as fingerprint electron using fingerprint IRLRD features, solution The certainly concealed problem of " key " and disclosed Self-certified problem.Its schematic diagram is as shown in figure 9, wherein fingerprint IRLRD feature encryptions Electronic signature use symmetric key encryption algorithm be AES encryption algorithm.Its specific method includes the following steps:
Step 1:Transmitting terminal is converted to message digest (difference by the plaintext that a kind of functional operation (Hash) will be sent Plaintext correspond to different message digests);
Step 2:Transmitting terminal generates key using fingerprint IRLRD features, and message digest is generated after being encrypted using the key to be referred to The electronic signature of line IRLRD feature encryptions.Transmitting terminal sends jointly to the electronic signature of plaintext and fingerprint IRLRD feature encryptions Receiving terminal;
Step 3:The plaintext Hash of reception is first generated new message digest by receiving terminal, then by fingerprint IRLRD feature encryptions Electronic signature decryption, then by fingerprint electron signature ciphertext data compared with new message digest, if identical, then it represents that It is not altered in plain text, it otherwise indicates to be tampered in plain text.
The proprietary public affairs of its signature algorithm, certificate are transformed based on digital certificates in fingerprint IRLRD characteristic electron certificates Key, certificate issuers are opened to the signature of certificate, make digital certificates have can authentication in open and can both concealed " key " it is unified Function.Wherein, signature algorithm used in certificate is signed by certificate CA fingerprint IRLRD characteristic electrons and is replaced, certificate owner Public-key cryptography caused by the proprietary fingerprint IRLRD feature keys of certificate public key replace, certificate issuers are to certificate Signature is signed by the fingerprint IRLRD characteristic electrons of certificate CA responsible person to be replaced.Signature algorithm and certificate issue used in certificate Person is to the signature of certificate for carrying out fingerprint IRLRD characteristic electron signature authentications to fingerprint electron certificate.The proprietary public affairs of certificate Key is opened for the cipher-text information of generation side's private key encryption to be decrypted.
Fingerprint IRLRD characteristic electrons certificate is improved X.509 standard certificate, improved fingerprint IRLRD features electricity Sub- certificate is as shown in Figure 10.
The WPKI technologies based on CA fingerprint IRLRD feature key certifications, the technology ask other side's public key to CA every time When by fingerprint IRLRD feature keys come certification, must all overcome the non-repudiation of the authentication in traditional PKI technologies and true Reality existing defects.As shown in figure 11, concrete operating principle is:
It is assumed that user's first is sender, user's second is recipient.
Step 1:User's first and user's second apply to become public key certificate authentication center CA member, obtain its digital certificates;
Step 2:User's first is registered in fingerprint CA Accreditation Systems, and operation is as follows:
(21) user fingerprints are obtained first, generate user fingerprints IRLRD features;
(22) fingerprint characteristic random generator inputs user fingerprints IRLRD features, generates two fingerprint IRLRD characteristics According to;
(23) fingerprint IRLRD characteristics are as private key (KA), another fingerprint IRLRD characteristics are as key Random data (RA), random fingerprint IRLRD feature public keys (K is calculated with thisB=KA×RA)。
Step 3:Register user's second;
Step 4:User's first sends ciphertext to user's second;
(41) user's first uses KAPlaintext encryption is become into ciphertext;
(42) this encrypted ciphertext is sent to user's second by user's first.
Step 5:Ciphertext is sent to user's first by user's second;
Step 6:User's second applies for the public key K of user's first to CAB, to decrypt through user's first private key KAEncrypted ciphertext;
Step 7:The CA digital certificates of user's first are transmitted to user's second by CA by registration management system, to verify user's second Legitimacy;
Step 8:User's second is to obtain the public key K of wherein user's firstB, carry out CA digital certificates authentications;
Step 9:The public key K of user's first acquired in user's second useB
Step 10:Ciphertext through user's first private key encryption is decrypted user's second, obtains in plain text.
Because fingerprint characteristic encryption technology to be used in mobile payment platform, therefore need PKI technologies expanding to WPKI technologies. WPKI technologies are the optimization extensions that traditional PKI technologies are applied to wireless environment.Pacify as shown in figure 12 for the wireless communication of WPKI Full mechanism.WPKI systems have the bases such as registration body (RA), certificate repository, PKI clients, application interface and certification authority (CA) This composition part, specific works include the following steps:
(1) as the verifier of certification authority, RA registration bodies are the interfaces between CA and user;
(2) as the authentication center of signing and issuing of digital certificate, CA is the core of entire WPKI systems;
(3) complete WPKI must provide good application interface system, it is ensured that the ease for use of secure network environment and complete Whole property, it is ensured that WPKI and various applications can it is consistent, credible, be safely completed interaction;
(4) certificate is verified before distribution digital certificate is to requestor, the identity of capture and certification user, to CA It is proposed that certificate request, the level of trust being set in certificate are determined by the processing quality of certification;
(5) WPKI is encrypted using the X.509 digital certificate of compression and the ECC elliptic curves of optimization.Used ECC Elliptic curve cipher is as tradition PKI and practical application security intensity, but its Password Length can be 165, with traditional PKI It is compared with 2048 or 1024 of practical application, operand wants small, and complexity also decreases.
As shown in figure 13, the method for mobile payment based on fingerprint IRLRD feature encryptions of this example, includes the following steps:
1. mobile-payment system brush bank card sends out payment request to bank;
2. bank obtains consumer's public key according to solicited message to third-party trusted authorities authentication center (CA), it is used in combination Fingerprint IRLRD characteristic electrons signature on the encrypted bank card of the private key of the public key decryptions consumer of consumer;
3. by being authenticated to fingerprint IRLRD characteristic electrons signature, the engaging method is determined.It is held to further confirm that Block the identity of people, it is desirable that user inputs finger print information on a mobile platform, the fingerprint spy for signing electronically included with user fingerprints Reference breath is compared;
4. after identity validation, so that it may which the fund to transfer user's request out of user bank card completes mobile payment.
Method of mobile payment through the invention, enterprise and user can both effectively prevent propping up during mobile payment Pay information it is hacked and destroy, be also possible to prevent distorting for fingerprint characteristic, effectively prevented disbursement letter in mobile payment The security crises such as be tampered, reveal or fake are ceased, ensure the orderly progress of mobile payment.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention All any modification, equivalent and improvement etc., should all be included in the protection scope of the present invention made by within refreshing and principle.

Claims (5)

1. a kind of fingerprint IRLRD feature encryption methods, it is characterised in that:The IRLRD features of the fingerprint are based on the field of direction Fingerprint singularity extraction, subcharacter is described using random regional area to determine fingerprint characteristic;Specifically comprise the following steps:
(61) according to any one random seed s in the fingerprint image of acquisition, to generating a stochastic set in fingerprint foreground area It closes, and a corresponding random direction is generated to each random point, obtain random point set and be expressed as:N For the number of random point;
(62) the fingerprint IRLRD sampled according to the field of direction feature extraction of fingerprint regional area1Feature, if random point miIt is corresponding Sampled point is classified as { oi,1,oi,2,…,oi,k, wherein K is sampling number,
miCorresponding description:{φ(oi,1i),φ(oi,2i),…,φ(oi,ki),For sampled point oi,kPhase For θiAngle, be connected in turn corresponding description of all random points to obtain fingerprint IRLRD1Feature;
(63) a series of translation and rotation are carried out according to each fingerprint feature point in the random point set M of step (61) extraction Turn, generate a series of fingerprint feature information, forms random fingerprint feature, be encoded to random fingerprint characteristic data value IRLRD2
(64) the fingerprint IRLRD that step (62) obtains1The IRLRD that feature and step (63) obtain2Character code data value connects Come, obtains fingerprint IRLRD features:IRLRD=IRLRD1+IRLRD2
2. a kind of payment system based on fingerprint IRLRD feature encryption methods described in claim 1, it is characterised in that:Including ARM control modules, data memory module, fingerprint collecting circuit, human-computer interaction circuit, communication interface circuit, relay control are defeated The power circuit for going out circuit and powering for foregoing circuit, the ARM control modules pass through to ARM fingerprint IRLRD feature encryptions, reality The authentication of existing fingerprint IRLRD feature encryptions.
3. the payment system of fingerprint IRLRD feature encryption methods according to claim 2, it is characterised in that:It is described man-machine Interaction circuit includes liquid crystal display and touch screen and its peripheral circuit, is realized and the mobile payment by touch interactive device System interaction.
4. the payment system of fingerprint IRLRD feature encryption methods according to claim 2, it is characterised in that:It is described after Electrical equipment control output interface circuit exports for realizing the control of the mobile payment platform product of fingerprint IRLRD feature encryptions.
5. the payment system of fingerprint IRLRD feature encryption methods according to claim 2, it is characterised in that:The ARM The signal output end of control module connects with the data memory module, the fingerprint collecting circuit, human-computer interaction circuit, the communication respectively Mouth circuit, relay control output circuit electrical connection, the communication interface circuit are RS-232 serial interface circuits.
CN201810469567.1A 2015-04-21 2015-04-21 Fingerprint IRLRD feature encryptions method and the payment system based on this method Withdrawn CN108665268A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810469567.1A CN108665268A (en) 2015-04-21 2015-04-21 Fingerprint IRLRD feature encryptions method and the payment system based on this method

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510191625.5A CN104899737B (en) 2015-04-21 2015-04-21 Fingerprint IRLRD feature encryptions method and the mobile-payment system based on this method and method
CN201810469567.1A CN108665268A (en) 2015-04-21 2015-04-21 Fingerprint IRLRD feature encryptions method and the payment system based on this method

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201510191625.5A Division CN104899737B (en) 2015-04-21 2015-04-21 Fingerprint IRLRD feature encryptions method and the mobile-payment system based on this method and method

Publications (1)

Publication Number Publication Date
CN108665268A true CN108665268A (en) 2018-10-16

Family

ID=54032390

Family Applications (3)

Application Number Title Priority Date Filing Date
CN201810469567.1A Withdrawn CN108665268A (en) 2015-04-21 2015-04-21 Fingerprint IRLRD feature encryptions method and the payment system based on this method
CN201510191625.5A Expired - Fee Related CN104899737B (en) 2015-04-21 2015-04-21 Fingerprint IRLRD feature encryptions method and the mobile-payment system based on this method and method
CN201810468697.3A Withdrawn CN108764897A (en) 2015-04-21 2015-04-21 A kind of mobile-payment system and method based on fingerprint IRLRD feature encryptions

Family Applications After (2)

Application Number Title Priority Date Filing Date
CN201510191625.5A Expired - Fee Related CN104899737B (en) 2015-04-21 2015-04-21 Fingerprint IRLRD feature encryptions method and the mobile-payment system based on this method and method
CN201810468697.3A Withdrawn CN108764897A (en) 2015-04-21 2015-04-21 A kind of mobile-payment system and method based on fingerprint IRLRD feature encryptions

Country Status (1)

Country Link
CN (3) CN108665268A (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105373924B (en) * 2015-10-10 2022-04-12 豪威科技(北京)股份有限公司 System for providing safe payment function for terminal equipment
CN105893819B (en) * 2016-03-30 2019-04-05 深圳市德沃尔实业有限公司 A kind of follow-on fingerprint identification method and system based on redundancy incorrect order permutation algorithm
CN107181598B (en) * 2017-07-05 2020-03-10 四川无声信息技术有限公司 Fingerprint key processing method and device
JP6970588B2 (en) * 2017-11-09 2021-11-24 キヤノン株式会社 Management systems, terminals, control methods, and programs
CN109919635A (en) * 2019-02-26 2019-06-21 河北泊松信息科技有限公司 A kind of article method for authenticating and device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103873244B (en) * 2012-12-13 2017-05-10 航天信息股份有限公司 Identity authentication method and system in mobile payment based on fingerprint identification
CN204189208U (en) * 2014-10-24 2015-03-04 宁波乐品视讯科技有限公司 A kind of multifunctional terminal device

Also Published As

Publication number Publication date
CN104899737A (en) 2015-09-09
CN104899737B (en) 2018-10-12
CN108764897A (en) 2018-11-06

Similar Documents

Publication Publication Date Title
US11803633B1 (en) Method and system for securing user access, data at rest and sensitive transactions using biometrics for mobile devices with protected, local templates
US11855983B1 (en) Biometric electronic signature authenticated key exchange token
CN110674523B (en) Method for confirming electronic contract signer by combining digital signature with handwritten signature
US7188362B2 (en) System and method of user and data verification
JP4638990B2 (en) Secure distribution and protection of cryptographic key information
US9384338B2 (en) Architectures for privacy protection of biometric templates
CN104899737B (en) Fingerprint IRLRD feature encryptions method and the mobile-payment system based on this method and method
US20110126024A1 (en) Method and system for combining a PIN and a biometric sample to provide template encryption and a trusted stand-alone computing device
US20040059924A1 (en) Biometric private key infrastructure
US20030101348A1 (en) Method and system for determining confidence in a digital transaction
CN101542971B (en) Fuzzy biometrics based signatures
JP2009533742A (en) Noisy low power PUF certification without database
US11436597B1 (en) Biometrics-based e-signatures for pre-authorization and acceptance transfer
KR20090019576A (en) Certification method and system for a mobile phone
JPH10135943A (en) Portable information storage medium, verification method and verification system
US11070378B1 (en) Signcrypted biometric electronic signature tokens
US11405387B1 (en) Biometric electronic signature authenticated key exchange token
Ajish et al. Secure mobile internet voting system using biometric authentication and wavelet based AES
CN106789977A (en) A kind of method and system that handset token is realized based on Secret splitting
JP2002519782A (en) Apparatus and method for end-to-end authentication using biometric data
Deswarte et al. A Proposal for a Privacy-preserving National Identity Card.
Li et al. E-passport EAC scheme based on Identity-Based Cryptography
CN112699395A (en) Attribute-based anonymous authentication method capable of tracing responsibility for fine-grained access control
CN110505063B (en) Method and system for ensuring security of financial payment
CN110689351A (en) Financial service verification system and financial service verification method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20181016