CN101631020A - Identity authentication system combining fingerprint identification and PKI system - Google Patents

Identity authentication system combining fingerprint identification and PKI system Download PDF

Info

Publication number
CN101631020A
CN101631020A CN200810040644A CN200810040644A CN101631020A CN 101631020 A CN101631020 A CN 101631020A CN 200810040644 A CN200810040644 A CN 200810040644A CN 200810040644 A CN200810040644 A CN 200810040644A CN 101631020 A CN101631020 A CN 101631020A
Authority
CN
China
Prior art keywords
fingerprint
certificate
identity
authentication
pki
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN200810040644A
Other languages
Chinese (zh)
Inventor
李智勇
黄海深
王晓敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI FERLY DIGITAL TECHNOLOGIES Co Ltd
Original Assignee
SHANGHAI FERLY DIGITAL TECHNOLOGIES Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI FERLY DIGITAL TECHNOLOGIES Co Ltd filed Critical SHANGHAI FERLY DIGITAL TECHNOLOGIES Co Ltd
Priority to CN200810040644A priority Critical patent/CN101631020A/en
Publication of CN101631020A publication Critical patent/CN101631020A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Collating Specific Patterns (AREA)

Abstract

The invention relates to an identity authentication system combining fingerprint identification and a PKI system in the technical field of information security, which comprises a certificate identity authentication subsystem, a fingerprint identity authentication subsystem, a service terminal and an intelligent password fingerprint instrument, wherein the certificate identity authentication subsystem, the fingerprint identity authentication subsystem and the service terminal are connected with one another through a network, the intelligent password fingerprint instrument is directly connected with the service terminal, and the certificate identity authentication subsystem is used for network identity authentications to ensure the data secure communications between each subsystems; and the fingerprint identity authentication subsystem consists of a fingerprint verification server which stores personnel fingerprints and identity information, supports the encryption function and simultaneously can transmit fingerprint templates to the certificate identity authentication subsystem, the service terminal and the intelligent password fingerprint instrument according to requests, and can verify the fingerprint templates and return information on matching or not matching according to the requests. The security strength of the identity authentication system is strengthened greatly.

Description

The identity authorization system that fingerprint recognition combines with the PKI system
Technical field
The present invention relates to a kind of system of field of information security technology, specifically is the identity authorization system that a kind of fingerprint recognition combines with the PKI system.
Background technology
Information security relates to collection, storage, transmission, the visit overall process of information.Information operating executor's illegal property and all can influence information security to unauthorised broken of information etc., various recognition technologies are exactly in order to set up matching, the consistency between operator and the information operating.In the past, to authentication, adopt modes such as password, voucher mostly, these modes are in still extensive use today, though the foundation of this mode is simple and convenient, is accompanied by easily and loses, forget, duplicate and many congenital bad shortcomings such as stolen.
In broad terms, all provide the system of public key encryption and digital signature service, all can be called PKI system (public key architecture), the main purpose of PKI is by automatic managing keys and certificate, can set up the networking operational environment of a safety for the user, the user can be convenient to use under multiple applied environment to encrypt and digital signature technology, thereby guarantee the confidentiality of online data, integrality, validity, the confidentiality of data is meant that data are in transmission course, can not be stolen a glance at by the unauthorized person, the integrality of data is meant that data can not illegally be distorted in transmission course, the validity of data is meant that data can not be denied.Typical case, complete, an effective PKI application system should have at least with the lower part: the public key certificate management.The issue of blacklist and management.The backup of key and recovery.Automatically new key more.Automatically manage historical key.Support cross-certification.
Because the PKI architecture is present comparative maturity, perfect Internet network security solution, the a series of network security product of the numerous and confused release of some external big network security companies based on PKI, Verisign as the U.S., IBM, safety product suppliers such as Entrust provide the safety product of a series of client and server end for the user, for Development of E-business provides safety assurance.Advanced all in the world Web banks all are based on the PKI system.
Derived widely used now PKI system by cryptography.The most significant problem is the management of key in the whole PKI system.The administrative relationships of private key are to the safety of whole PKI, so the carrier of private key also becomes the part of most fragile in the whole system.For secret key safety, present popular form is the authentication of dual factors, is about to certificate (private key) and is kept among the believable hardware carrier (Smart Card or USB Key equipment etc.).Even if but like this, also may exist and lose, usurp equivalent risk.
Biometrics identification technology is undoubtedly the preferred manner of authentication.Fingerprint identification technology is as the most widely used technology of field of biological recognition, and its main cause is that the fingerprint collecting process is simple, and the collecting device cost is relatively low and the fingerprint comparison algorithm is relatively ripe through long-term optimization.The fingerprint characteristic is the part of human body, can not lose, and needn't worry to leave behind; Fingerprint characteristic is that everyone is unique, cannot duplicate, and does not worry stolen.So utilizing fingerprint identification technology is safety, accurate, reliable as the means of authentication.But because bio-identification is because himself characteristic can't be accomplished hundred-percent accurate identification, so can't be competent at fully for the application scenario that any mistake can not occur.
Summary of the invention
The present invention is directed to above-mentioned deficiency of the prior art, the identity authorization system that provides a kind of fingerprint recognition to combine with the PKI system.The technical scheme that fingerprint recognition combines with the PKI technology has been proposed, determine personnel's authenticity by the fingerprint identity recognizing technology, the auxiliary figure certificate is realized the accurate judgement of personnel identity and is ensured the communication two party identity legitimacy, ensures the integrality of data and the fail safe of storage by digital signature technology.
The present invention is achieved through the following technical solutions, the present invention includes: certificate identity authentication subsystem, fingerprint identity validation subsystem, service terminal and intelligent cipher fingerprint instrument, wherein:
Connect by network between certificate identity authentication subsystem, fingerprint identity validation subsystem, service terminal three, the intelligent cipher fingerprint instrument is directly connected in service terminal, the certificate identity authentication subsystem is used for the authentication on the network, guarantees the data security communication between each subsystem; The fingerprint identity validation subsystem is made up of the fingerprint authentication server, personnel's fingerprint and identity information have been deposited in the fingerprint authentication server, the fingerprint authentication server is supported encryption function, can accept, store encrypted from the fingerprint template in the intelligent cipher fingerprint instrument, simultaneously can issue fingerprint template to certificate identity authentication subsystem and service terminal and intelligent cipher fingerprint instrument according to request, the fingerprint authentication server can and return the information of whether mating according to the requests verification fingerprint template.
Described certificate identity authentication subsystem, i.e. pki system, be responsible for following operation: 1. the additions and deletions of operator message, mechanism information change and look into; 2. digital certificate is signed and issued, abolishes, is freezed; 3. signature verification service, data encryption service.
Described fingerprint identity validation subsystem is responsible for following operation: 1. the increase of fingerprint recognition data, deletion, modification; 2. fingerprint inquiry comparison service.
Described service terminal cooperatively interacts with certificate identity authentication subsystem and the input of fingerprint identity validation subsystem respectively as verification terminal.
Described intelligent cipher fingerprint instrument, it is responsible for the connecting system personnel fingerprint of (promptly being called for short the operator), fingerprint is finished in the intelligent cipher fingerprint instrument and is gathered and generate fingerprint template (fingerprint characteristic data), and be built-in with memory, storage fingerprint characteristic information, the digital certificate that the operator is correlated with, key etc. also are sent to certificate identity authentication subsystem and fingerprint identity validation subsystem realization double authentication (being double factor authentication) by service terminal with feedback information simultaneously.
Described certificate identity authentication subsystem, comprise: RA registration center, AA authorization services device, LDAP Lightweight Directory Access Protocol server, the SSL secure socket layer protocol of ca authentication center (certificate granting center), RA (registration power) registration center and branch, above-mentioned submodule cooperates cooperation each other, the security service of PKI foundation of trust facility externally is provided, instruction flow therebetween has ripe international standard, the international standard that relates to comprises that X.509 ITU reaches ITU and X.500 wait, wherein:
The ca authentication center is the core of PKI PKIX, it mainly finish generation/grant a certificate, generation/grant a certificate revocation list (CRL), issue certificate and CRL to LIST SERVER, safeguard functions such as certificate database and audit log storehouse, as the third party who is trusted in the e-commerce transaction, solve the legitimacy problem of PKI in the PKI system specially.
The ca authentication center can classification: CA of general headquarters and root CA, wherein the CA of general headquarters refers to use the CA system of the tissue of native system, and root CA refers to CA professional or even nationwide system, for the CA system of this tissue provides legitimate verification.
RA registration center is the mechanism of application, audit and the registration of digital certificate, is the extension at ca authentication center, and logically RA and CA are an integral body, mainly are responsible for the function that certificate registration is provided, examines and issues licence.
AA (Authentication and Authorization) authorization services device provides the management of user profile, authentication and authorization for the system manager.
LDAP (Lightweight Directory Access Protocol) Lightweight Directory Access Protocol server, storage and uniform user profile, certificate and authorization message, LDAP/DB is a database server of realizing this function.
SSL (Secure Sockets Layer) secure socket layer protocol, the authentication that is widely used on the Internet is communicated by letter with the data security between Web server and the user side browser.
Described fingerprint authentication server, comprise: database and alignment algorithm module, encrypting-decrypting module, database can be any relevant database such as SQLSERVER/SYBASE/INFORMIX/DB2/ORECAL etc., alignment algorithm module and encrypting-decrypting module have been set up site mechanism table in database, the site equipment list, person chart, the fingerprint template table, the Operation Log table, system manager's table, set up personnel's finger print information and operation system personnel's number corresponding relation in the table, formation personnel mechanism and post Rights Management System, thus provide the site organization management, equipment control, the post rights management, the fingerprint template management, Operation Log Management.
Described intelligent cipher fingerprint instrument, comprise main process chip and COS (Chip OperatingSystem) management system, be responsible for connecting system personnel's (being the operator) fingerprint, and built-in memory, deposit fingerprint characteristic information (being fingerprint template), the digital certificate that the operator is correlated with, key etc.Therefore, safety of data is extremely important in the intelligent cipher fingerprint instrument.
Described main process chip adopts safety chip, is achieved as follows function: key management on the sheet (key generation, key storage, key updating etc.); Signature and authentication (can support public key algorithms such as RSA, ECC territory) on the sheet; Tailor-made algorithm is downloaded and is carried out and high data rate encryption and decryption (support the DES/3DES algorithm and comprise the close various special purpose system algorithms of doing tailor-made algorithm of state).Private key leaves in the safety chip, never goes out chip, thereby has guaranteed the being perfectly safe property of private key.
Described COS management system, be used for the storage in the intelligent cipher fingerprint instrument of managing digital certificate, private key and fingerprint template, the ca authentication center is initiated instruction by the routine interface of realizing defining to the intelligent cipher fingerprint instrument, the intelligent cipher fingerprint instrument responds in view of the above, thereby the illegal invasion of system is had very strong antijamming capability.
Described intelligent cipher fingerprint instrument, gather connecting system personnel's (being the operator) finger print information, it is the core of safety problem, can be in different ways: if system scale is less according to system scale, take the concentrated collection of appointed place, avoiding the illegal correspondence that may exist on fingerprint and the personnel identity from root; If system scale is bigger, fingerprint collecting work can be taked the pattern of differentiated control, sets up the administrative mechanism of the keeper of general headquarters, the keeper of branch, three grades of combinations of operating agency keeper separately.According to the scale of institutional framework and information system, can RA operator be set in general headquarters or branch, finish the work and the generation of audit and typing operator message.Carry out the process that fingerprint is registered according to authorization code, the suggestion place is that branch finishes, with the safety of safeguards system.
When the present invention worked, the corresponding business flow process was as follows:
1, newly-increased operator
RA typing review operations person information → generation fingerprint authorization code → fingerprint identification system according to authorization code register fingerprint → foreground according to the authorization code downloading digital certificate to follow-up business flow processs such as fingerprint instrument → register, mandates.
2, deletion action person
A, RA abolish certificate → deletion certificate information, delete fingerprint masterplate, the digital certificate of the operator in the finger print information → deletion fingerprint instrument in user profile → deletion system of fingerprints.
3, retouching operation person
A, operating agency are responsible for fingerprint masterplate, the digital certificate of the operator in checking fingerprint → deletion fingerprint instrument.
B, RA abolish certificate → deletion certificate, user profile → newly-increased operator's flow process (not containing the fingerprint registration).
4, register, encryption flow
Fingerprint instrument built-in check fingerprint → extraction digital certificate → digital signature → certificate verification center certifying digital signature → follow-up business is handled.
5, authorization flow
The information of taking the fingerprint → finger print identifying center identity verification → follow-up authorization flow.
The present invention is by combining fingerprint recognition fingerprint biological characteristic and PKI system, this verification system can be good at solving the leak that certificate in the simple PKI system/the private key carrier is used by the unauthorized personnel, also can overcome simultaneously the false problem of the knowledge that exists in the fingerprint recognition, strengthen the security intensity of identification system greatly.The probability that is obtained by the unauthorized personnel by information when in theory, using PKI finger print identifying fingerprint instrument levels off to 0.Owing to the written or printed documents innovation biological identification technology and PKI system are combined, solve the developing certificate of present PKI system (private key) and deposited the leak of existence, strengthened the fail safe of whole PKI authentication system greatly, will bring into play bigger promotion to the development of PKI system, thereby improve the fail safe of information system.Compared with prior art, the present invention has following beneficial effect:
1. the communication information between fingerprint template and fingerprint authentication server uses the asymmetric arithmetic of PKI system to encrypt, even guarantee that fingerprint template is is also intercepted and captured and can't be revealed.When uploading fingerprint template, therefore most unencryptions transmit data in case intercepted and captured in existing fingerprint authentication terminal (fingerprint instrument), and fingerprint template may be used by bootlegging, thereby has lost the function of fingerprint template as authentication.Have part fingerprint authentication terminal to claim that the fingerprint template data upload encrypts now, but, can only adopt symmetry algorithm owing to do not combine with PKI, if thereby Crypted password in case reveal, fingerprint template still might be used by bootlegging.And in the PKI system, introduced certificate, by cooperating cryptographic algorithm, digest algorithm etc., even having guaranteed the communication between intelligent cipher fingerprint instrument and the fingerprint authentication server also can't crack after intercepting and capturing, and communication process can be not disturbed.
2. the legitimacy that traditional certificate terminals such as USB Key come identity verification by the PKI system, but owing to can't judge different users's identity, and make the certificate terminals only can use for a people.USB Key also can judge the different users by password in theory, but password reveal easily, thereby make the certificate terminals become in the whole P K I system a weak ring, so do not use substantially in practice.In system of the present invention, the intelligent cipher fingerprint instrument is as the certificate terminals, wherein can deposit a plurality of users' fingerprint template and user's certificate, and set up between fingerprint template by the user and the certificate thereof association promptly can be on same certificate terminals the different user of (intelligent cipher fingerprint instrument) difference, thereby reach different users and only can call its corresponding certificate, both made same certificate terminals to use simultaneously, guaranteed the fail safe of system again for many people.
3. fingerprint is finished collection in the intelligent cipher fingerprint instrument, and downloads fingerprint template (fingerprint characteristic data) and all finish by encryption in the fingerprint identity validation subsystem, thereby has guaranteed the fail safe of fingerprint template (fingerprint characteristic data) in transmission course.System of the present invention has solved the leak of the finger print data leakage of traditional fingerprint verification system existence by encryption.In the system that the present invention uses, even fingerprint template is intercepted and captured in transmission, the interceptor also can't obtain fingerprint characteristic, thereby also can't be by the camouflage fingerprint authentication of out-tricking.
The present invention can be widely used in following place:
1. the debarkation authentication of transaction system such as Web bank, Internet securities;
2. the information system of E-Government, classified information net, financial industry etc. has strict industry and place to authentication
3. can be widely used in other safety guarantee of the information system more than three grades particularly of all five levels of confirming according to " information security hierarchical protection management method " that the Ministry of Public Security, the office that maintains secrecy, the close office of merchant etc. announce.
Description of drawings
Fig. 1 is the structural representation of system of the present invention.
Fig. 2 is the present invention's schematic flow sheet that fingerprint template is encrypted in the fingerprint template gatherer process.
Embodiment
Below in conjunction with accompanying drawing embodiments of the invention are elaborated: present embodiment has provided detailed execution mode being to implement under the prerequisite with the technical solution of the present invention, but protection scope of the present invention is not limited to following embodiment.
As shown in Figure 1, present embodiment comprises: certificate identity authentication subsystem, fingerprint identity validation subsystem, service terminal and intelligent cipher fingerprint instrument, wherein: connect by network between certificate identity authentication subsystem, fingerprint identity validation subsystem, service terminal three, the intelligent cipher fingerprint instrument is directly connected in service terminal, the certificate identity authentication subsystem is used for the authentication on the network, guarantees the data security communication between each subsystem; The fingerprint identity validation subsystem is made up of the fingerprint authentication server, personnel's fingerprint and identity information have been deposited in the fingerprint authentication server, the fingerprint authentication server is supported encryption function, can accept, store encrypted from the fingerprint template in the intelligent cipher fingerprint instrument, simultaneously can issue fingerprint template to certificate identity authentication subsystem and service terminal and intelligent cipher fingerprint instrument according to request, the fingerprint authentication server is according to the requests verification fingerprint template and return the information of whether mating.
Described certificate identity authentication subsystem, i.e. pki system, be responsible for following operation: 1. the additions and deletions of operator message, mechanism information change and look into; 2. digital certificate is signed and issued, abolishes, is freezed; 3. signature verification service, data encryption service.
Described fingerprint identity validation subsystem is responsible for following operation: 1. the increase of fingerprint recognition data, deletion, modification; 2. fingerprint inquiry comparison service, its concrete parameter is as follows:
Operating system Windows 98/SE, Windows ME, Windows 2000, Windows XP hardware interface USB (universal serial bus), USB1.1/2.0
Capacity 256M-4G
Read-write speed is read: 30M/S writes: 20M/S
Refuse sincere (FRR)≤1%
Know false rate (FAR)≤0.0001%
Built-in algorithms RSA (1024/2048)/ECC192/SCB2
Certificate and standard P KCS#11, CSP, X.509v3, SSLv3, IPSec
Working temperature-10 ℃-70 ℃
The safety Design product is by Ministry of Public Security's safety product test;
Useful life>1,000,000 times.
Described service terminal cooperatively interacts with certificate identity authentication subsystem and the input of fingerprint identity validation subsystem respectively as verification terminal.
Described intelligent cipher fingerprint instrument, it is responsible for the connecting system personnel fingerprint of (promptly being called for short the operator), fingerprint is finished in the intelligent cipher fingerprint instrument and is gathered and generate fingerprint template (fingerprint characteristic data), and be built-in with memory, storage fingerprint characteristic information, the digital certificate that the operator is correlated with, key etc. also are sent to certificate identity authentication subsystem and fingerprint identity validation subsystem realization double authentication (being double factor authentication) by service terminal with feedback information simultaneously.
Described certificate identity authentication subsystem, comprise: the RA registration center of ca authentication center, RA registration center and branch, AA authorization services device, LDAP Lightweight Directory Access Protocol server, SSL secure socket layer protocol, above-mentioned submodule cooperates cooperation each other, the security service of PKI foundation of trust facility externally is provided, instruction flow therebetween has ripe international standard, the international standard that relates to comprises that X.509 ITU reaches ITU and X.500 wait, wherein:
The ca authentication center is the core of PKI PKIX, it mainly finish generation/grant a certificate, generation/grant a certificate revocation list (CRL), issue certificate and CRL to LIST SERVER, safeguard functions such as certificate database and audit log storehouse, as the third party who is trusted in the e-commerce transaction, solve the legitimacy problem of PKI in the PKI system specially.
The ca authentication center can classification: CA of general headquarters and root CA, wherein the CA of general headquarters refers to use the CA system of the tissue of native system, and root CA refers to CA professional or even nationwide system, for the CA system of this tissue provides legitimate verification.
RA registration center is the mechanism of application, audit and the registration of digital certificate, is the extension at ca authentication center, and logically RA and CA are an integral body, mainly are responsible for the function that certificate registration is provided, examines and issues licence.
AA (Authentication and Authorization) authorization services device provides the management of user profile, authentication and authorization for the system manager.
LDAP (Lightweight Directory Access Protocol) Lightweight Directory Access Protocol server, storage and uniform user profile, certificate and authorization message, LDAP/DB is a database server of realizing this function.
SSL (Secure Sockets Layer) secure socket layer protocol, the authentication that is widely used on the Internet is communicated by letter with the data security between Web server and the user side browser.
Described fingerprint authentication server, comprise: database and alignment algorithm module, encrypting-decrypting module, database can be any relevant database such as SQLSERVER/SYBASE/INFORMIX/DB2/ORECAL etc., alignment algorithm module and encrypting-decrypting module have been set up site mechanism table in database, the site equipment list, person chart, the fingerprint template table, the Operation Log table, system manager's table, set up personnel's finger print information and operation system personnel's number corresponding relation in the table, formation personnel mechanism and post Rights Management System, thus provide the site organization management, equipment control, the post rights management, the fingerprint template management, Operation Log Management.
Described intelligent cipher fingerprint instrument, comprise main process chip and COS (Chip OperatingSystem) management system, be responsible for connecting system personnel's (being the operator) fingerprint, and built-in memory, deposit fingerprint characteristic information (being fingerprint template), the digital certificate that the operator is correlated with, key etc.Therefore, safety of data is extremely important in the intelligent cipher fingerprint instrument.
Described main process chip adopts safety chip, is achieved as follows function: key management on the sheet (key generation, key storage, key updating etc.); Signature and authentication (can support public key algorithms such as RSA, ECC territory) on the sheet; Tailor-made algorithm is downloaded and is carried out and high data rate encryption and decryption (support the DES/3DES algorithm and comprise the close various special purpose system algorithms of doing tailor-made algorithm of state).Private key leaves in the safety chip, never goes out chip, thereby has guaranteed the being perfectly safe property of private key.
Described COS management system, be used for the storage in the intelligent cipher fingerprint instrument of managing digital certificate, private key and fingerprint template, the ca authentication center is initiated instruction by the routine interface of realizing defining to the intelligent cipher fingerprint instrument, the intelligent cipher fingerprint instrument responds in view of the above, thereby the illegal invasion of system is had very strong antijamming capability.
Described intelligent cipher fingerprint instrument, gather connecting system personnel's (being the operator) finger print information, it is the core of safety problem, can be in different ways: if system scale is less according to system scale, take the concentrated collection of appointed place, avoiding the illegal correspondence that may exist on fingerprint and the personnel identity from root; If system scale is bigger, fingerprint collecting work can be taked the pattern of differentiated control, sets up the administrative mechanism of the keeper of general headquarters, the keeper of branch, three grades of combinations of operating agency keeper separately.According to the scale of institutional framework and information system, can RA operator be set in general headquarters or branch, finish the work and the generation of audit and typing operator message.Carry out the process that fingerprint is registered according to authorization code, the suggestion place is that branch finishes, with the safety of safeguards system.
As shown in Figure 2, it is fingerprint template ciphering process in the fingerprint template gatherer process, at first be responsible for (operator) and initiate the fingerprint collecting request from service terminal, intelligent cipher fingerprint instrument prompting operation person gathers fingerprint, the intelligent cipher fingerprint instrument is encrypted finger print data and is uploaded, and upload the encryption fingerprint template, feedback acknowledgment information after the deciphering.
Described intelligent cipher fingerprint instrument, its parameter is specific as follows:
Sensor type reflection capacitance type fingerprint transducer (Capacitive area sensor)
Chip model producer: FingerPrint Card model: FPC1011C
Transducer useful life 1,000,000 times (1,000,000 times)
The reflective 3D fingerprint collecting of Detection Techniques technology has the living body finger print detecting function
The detecting location skin corium
Resolution 363DPI
Applicability all has favorable applicability to dried wet finger, dirty finger, damaged finger
Memory space 8M can store the user profile of 1100 pieces of finger print informations and each user's 160 byte at most, extends to 2400 pieces.
Environmental index working temperature-10 ℃~55 ℃
Storage temperature-20 ℃~60 ℃
Relative humidity 20%~90%
Vibration 10-55Hz, 0.35mm, 1 octave/min, X, Y, the Z direction 30min that respectively circulates
The communication interface communication interface is supported RS232, RS458, USB1.1
RS232 communications parameter data bit: 8, parity check bit: do not have position of rest: 1
1200BPS-115200BPS is adjustable for the RS232 communication baud rate
In the present embodiment, realize fingerprint recognition, public and private key is to generating cryptographic key protection, certificate storage, all kinds of cryptographic algorithm.Performance index for certificate and cipher key operation have:
1) read data: certificate size X.509V3 is about the 2K byte, therefore Intelligent key read or write speed amount of test data is set at the 2K byte.Carry out the operation of reading the 2K data 50 times during test continuously, the mean value of operation required time is 650 milliseconds.
2) write data: carry out writing for 50 times the operation of 2K data during test continuously, the mean value of operation required time is 1800 milliseconds.
3) 1024 keys of generation are right: in order to guarantee the safety of private key, key is produced by fingerprint USBKEY inside chip.The computing relevant with private key all finished in fingerprint USBKEY, and private key can't be read forever.Carry out 50 times during test continuously and produce 1024 operations that key is right.The generation key is 10 seconds to the mean value of required time.The public key encryption time is about 40ms, and the private key deciphering time is about 790ms.The private key signature time is the 750ms. PKI deciphering time to be about 50ms.
4) versatility: the upright fingerprint KEY in side provides the interface of the MicrosoftCryptoAPI standard that meets industry-wide adoption, can satisfy the demand of application and development easily.
Electro Magnetic Compatibility is antistatic ± 15KV
Anti-electromagnetic interference satisfies the FCC of International Electrotechnical Commission standard

Claims (10)

1, the identity authorization system that combines with the PKI system of a kind of fingerprint recognition, it is characterized in that, comprise: certificate identity authentication subsystem, fingerprint identity validation subsystem, service terminal and intelligent cipher fingerprint instrument, wherein: connect by network between certificate identity authentication subsystem, fingerprint identity validation subsystem, service terminal three, the intelligent cipher fingerprint instrument is directly connected in service terminal, the certificate identity authentication subsystem is used for the authentication on the network, guarantees the data security communication between each subsystem; The fingerprint identity validation subsystem is made up of the fingerprint authentication server, personnel's fingerprint and identity information have been deposited in the fingerprint authentication server, the fingerprint authentication server is supported encryption function, can accept, store encrypted from the fingerprint template in the intelligent cipher fingerprint instrument, simultaneously can issue fingerprint template to certificate identity authentication subsystem and service terminal and intelligent cipher fingerprint instrument according to request, the fingerprint authentication server can and return the information of whether mating according to the requests verification fingerprint template.
2, fingerprint recognition according to claim 1 and the identity authorization system that the PKI system combines is characterized in that, described certificate identity authentication subsystem, i.e. and pki system, be responsible for following operation: 1. the additions and deletions of operator message, mechanism information change and look into; 2. digital certificate is signed and issued, abolishes, is freezed; 3. signature verification service, data encryption service.
3, fingerprint recognition according to claim 1 and the identity authorization system that the PKI system combines is characterized in that, described fingerprint identity validation subsystem is responsible for following operation: 1. the increase of fingerprint recognition data, deletion, modification; 2. fingerprint inquiry comparison service.
4, the identity authorization system that fingerprint recognition according to claim 1 combines with the PKI system, it is characterized in that, described certificate identity authentication subsystem, comprise: the ca authentication center, the RA registration center of RA registration center and branch, AA authorization services device, LDAP Lightweight Directory Access Protocol server, the SSL secure socket layer protocol, above-mentioned submodule cooperates cooperation each other, the security service of PKI foundation of trust facility externally is provided, instruction flow therebetween has ripe international standard, the international standard that relates to comprises that X.500 X.509 ITU reach ITU, wherein:
The ca authentication center is the core of PKI PKIX, it mainly finish generation/grant a certificate, generation/grant a certificate revocation list, issue certificate and CRL to LIST SERVER, safeguard functions such as certificate database and audit log storehouse, as the third party who is trusted in the e-commerce transaction, solve the legitimacy problem of PKI in the PKI system specially;
The ca authentication center can classification: CA of general headquarters and root CA, and wherein the CA of general headquarters refers to use the CA system of the tissue of native system, and root CA refers to CA professional or even nationwide system, for the CA system of this tissue provides legitimate verification;
RA registration center is the mechanism of application, audit and the registration of digital certificate, is the extension at ca authentication center, and logically RA and CA are an integral body, mainly are responsible for the function that certificate registration is provided, examines and issues licence;
AA authorization services device provides the management of user profile, authentication and authorization for the system manager;
LDAP Lightweight Directory Access Protocol server, storage and uniform user profile, certificate and authorization message, LDAP/DB is a database server of realizing this function;
The SSL secure socket layer protocol, the authentication that is widely used on the Internet is communicated by letter with the data security between Web server and the user side browser.
5, the identity authorization system that fingerprint recognition according to claim 1 combines with the PKI system, it is characterized in that, described fingerprint authentication server, comprise: database and alignment algorithm module, encrypting-decrypting module, database can be any relevant database, alignment algorithm module and encrypting-decrypting module have been set up site mechanism table in database, the site equipment list, person chart, the fingerprint template table, the Operation Log table, system manager's table, set up personnel's finger print information and operation system personnel's number corresponding relation in the table, formation personnel mechanism and post Rights Management System, thus provide the site organization management, equipment control, the post rights management, the fingerprint template management, Operation Log Management.
6, the identity authorization system that combines with the PKI system of fingerprint recognition according to claim 1, it is characterized in that, described intelligent cipher fingerprint instrument, it is responsible for connecting system personnel's fingerprint, fingerprint is finished in the intelligent cipher fingerprint instrument and is gathered and generate fingerprint template, and be built-in with memory, storage fingerprint characteristic information, the digital certificate that the operator is correlated with, key etc. also are sent to certificate identity authentication subsystem and fingerprint identity validation subsystem realization double authentication by service terminal with feedback information simultaneously.
7, the identity authorization system that combines with the PKI system according to claim 1 or 6 described fingerprint recognition, it is characterized in that, described intelligent cipher fingerprint instrument, comprise main process chip and COS management system, be responsible for connecting system personnel's fingerprint, and built-in memory, deposit fingerprint characteristic information, the digital certificate that the operator is correlated with, key.
8, fingerprint recognition according to claim 7 and the identity authorization system that the PKI system combines is characterized in that, described main process chip adopts safety chip, is achieved as follows function: key management on the sheet; Signature and authentication on the sheet; Tailor-made algorithm is downloaded and is carried out and the high data rate encryption and decryption, and private key leaves in the safety chip, never goes out chip, thereby has guaranteed the being perfectly safe property of private key.
9, the identity authorization system that combines with the PKI system of fingerprint recognition according to claim 7, it is characterized in that, described COS management system, be used for the storage in the intelligent cipher fingerprint instrument of managing digital certificate, private key and fingerprint template, the ca authentication center is initiated instruction by the routine interface of realizing defining to the intelligent cipher fingerprint instrument, the intelligent cipher fingerprint instrument responds in view of the above, thereby the illegal invasion of system is had very strong antijamming capability.
10, the identity authorization system that combines with the PKI system according to claim 1 or 6 described fingerprint recognition, it is characterized in that, described intelligent cipher fingerprint instrument, gather connecting system personnel's finger print information, it is the core of safety problem, can be in different ways: if system scale is less, taking the concentrated collection of appointed place, avoiding the illegal correspondence that may exist on fingerprint and the personnel identity from root according to system scale; If system scale is bigger, fingerprint collecting work can be taked the pattern of differentiated control, the administrative mechanism that sets up the keeper of general headquarters, the keeper of branch, three grades of combinations of operating agency keeper separately, scale according to institutional framework and information system, can RA operator be set in general headquarters or branch, finish the work and the generation of audit and typing operator message, carry out the process of fingerprint registration according to authorization code, the suggestion place is that branch finishes, with the safety of safeguards system.
CN200810040644A 2008-07-16 2008-07-16 Identity authentication system combining fingerprint identification and PKI system Pending CN101631020A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200810040644A CN101631020A (en) 2008-07-16 2008-07-16 Identity authentication system combining fingerprint identification and PKI system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200810040644A CN101631020A (en) 2008-07-16 2008-07-16 Identity authentication system combining fingerprint identification and PKI system

Publications (1)

Publication Number Publication Date
CN101631020A true CN101631020A (en) 2010-01-20

Family

ID=41575981

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200810040644A Pending CN101631020A (en) 2008-07-16 2008-07-16 Identity authentication system combining fingerprint identification and PKI system

Country Status (1)

Country Link
CN (1) CN101631020A (en)

Cited By (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102281288A (en) * 2011-07-11 2011-12-14 北京信安世纪科技有限公司 Method for enhancing security of digital certificate revocation list (CRL)
CN102737189A (en) * 2012-06-28 2012-10-17 成都卫士通信息产业股份有限公司 Control method for enhancing using security of cryptographic machine by adopting dual-factor mandatory certification technology
CN102769623A (en) * 2012-07-24 2012-11-07 北京华财理账顾问有限公司 Two-factor authentication method based on digital certificate and biological identification information
CN103701977A (en) * 2013-12-25 2014-04-02 深圳市江波龙电子有限公司 Portable electronic device, communication system and information authentication method
CN104053020A (en) * 2013-03-15 2014-09-17 深圳市九洲电器有限公司 Method and system for realizing electronic commerce interaction by set-top box
CN104578422A (en) * 2015-01-13 2015-04-29 国电南瑞科技股份有限公司 Remote maintenance method for transformer substation telecontrol forwarding table
CN104639315A (en) * 2013-11-10 2015-05-20 航天信息股份有限公司 Dual-authentication method and device based on identity passwords and fingerprint identification
CN104660412A (en) * 2014-10-22 2015-05-27 南京泽本信息技术有限公司 Password-less security authentication method and system for mobile equipment
WO2015110037A1 (en) * 2014-01-27 2015-07-30 邵通 Dual-channel identity authentication method and system
CN104852928A (en) * 2015-06-01 2015-08-19 上海雷腾软件股份有限公司 Authentication method for fingerprint encryption
CN105207987A (en) * 2015-08-10 2015-12-30 上海闻泰电子科技有限公司 Fingerprint identification system based on Bluetooth mobile phone terminal
CN105227562A (en) * 2015-10-14 2016-01-06 公安部第三研究所 The key business data transmission mediation device of identity-based checking and using method thereof
CN105516180A (en) * 2015-12-30 2016-04-20 北京金科联信数据科技有限公司 Cloud secret key authentication system based on public key algorithm
CN105740682A (en) * 2016-01-12 2016-07-06 黑河学院 Computer system as well as identification method and system of user thereof
CN106101111A (en) * 2016-06-24 2016-11-09 郑州信大捷安信息技术股份有限公司 Vehicle electronics safe communication system and communication means
CN106156569A (en) * 2015-03-30 2016-11-23 重庆邮电大学 A kind of event execution method, electronic equipment, relevant apparatus and system
CN103731262B (en) * 2013-12-26 2017-01-18 中金金融认证中心有限公司 Digital certificate authentication device and digital certificate authentication system
CN106936775A (en) * 2015-12-29 2017-07-07 航天信息股份有限公司 A kind of authentication method and system based on fingerprint recognition
CN106934621A (en) * 2015-12-30 2017-07-07 远光软件股份有限公司 The examination & approval safety certifying method and system of payment funding
CN107004376A (en) * 2014-06-27 2017-08-01 伊利诺斯工具制品有限公司 The system and method for welding system operator identification
CN107045684A (en) * 2016-02-06 2017-08-15 戴见霖 Identification system and its recognition methods
CN107070949A (en) * 2017-05-24 2017-08-18 江苏大学 A kind of vehicle-mounted net Lightweight Identify Authentication Protocol Design Method based on device-fingerprint
CN107370601A (en) * 2017-09-18 2017-11-21 山东确信信息产业股份有限公司 A kind of intelligent terminal, system and method for integrating a variety of safety certifications
CN108023979A (en) * 2017-11-30 2018-05-11 公安部第三研究所 Safety strong portable operation terminal and system
CN108650271A (en) * 2018-05-17 2018-10-12 深圳大普微电子科技有限公司 A kind of method for managing user right and system
CN108737376A (en) * 2018-04-16 2018-11-02 北京明朝万达科技股份有限公司 A kind of double factor authentication method and system based on fingerprint and digital certificate
CN109756333A (en) * 2018-11-26 2019-05-14 西安得安信息技术有限公司 key management system
CN109842491A (en) * 2017-11-28 2019-06-04 上海耕岩智能科技有限公司 A kind of electronic equipment
CN109885994A (en) * 2019-01-08 2019-06-14 深圳禾思众成科技有限公司 A kind of offline identity authorization system, equipment and computer readable storage medium
CN110912693A (en) * 2019-11-22 2020-03-24 福建金密网络安全测评技术有限公司 Digital certificate format compliance detection system
CN111131142A (en) * 2019-10-22 2020-05-08 北京握奇智能科技有限公司 Fingerprint authentication encryption system and method for multi-application system
CN111404688A (en) * 2019-11-19 2020-07-10 浙江机电职业技术学院 Portable authentication system and method
CN111767531A (en) * 2020-09-01 2020-10-13 南京壹证通信息科技有限公司 Authentication system and method based on biological characteristics
CN112035818A (en) * 2020-09-23 2020-12-04 南京航空航天大学 Identity authentication system based on physical encryption radiation imaging
CN113037742A (en) * 2021-03-04 2021-06-25 上海华申智能卡应用系统有限公司 Fingerprint authentication method and system
CN114884654A (en) * 2022-04-29 2022-08-09 江西锐盾智能科技有限公司 Safety interaction system of banking library

Cited By (47)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102281288A (en) * 2011-07-11 2011-12-14 北京信安世纪科技有限公司 Method for enhancing security of digital certificate revocation list (CRL)
CN102737189A (en) * 2012-06-28 2012-10-17 成都卫士通信息产业股份有限公司 Control method for enhancing using security of cryptographic machine by adopting dual-factor mandatory certification technology
CN102737189B (en) * 2012-06-28 2014-12-24 成都卫士通信息产业股份有限公司 Control method for enhancing using security of cryptographic machine by adopting dual-factor mandatory certification technology
CN102769623A (en) * 2012-07-24 2012-11-07 北京华财理账顾问有限公司 Two-factor authentication method based on digital certificate and biological identification information
CN104053020A (en) * 2013-03-15 2014-09-17 深圳市九洲电器有限公司 Method and system for realizing electronic commerce interaction by set-top box
CN104639315B (en) * 2013-11-10 2018-06-05 航天信息股份有限公司 The method and apparatus of ID-based cryptosystem and fingerprint recognition double authentication
CN104639315A (en) * 2013-11-10 2015-05-20 航天信息股份有限公司 Dual-authentication method and device based on identity passwords and fingerprint identification
CN103701977A (en) * 2013-12-25 2014-04-02 深圳市江波龙电子有限公司 Portable electronic device, communication system and information authentication method
CN103731262B (en) * 2013-12-26 2017-01-18 中金金融认证中心有限公司 Digital certificate authentication device and digital certificate authentication system
WO2015110037A1 (en) * 2014-01-27 2015-07-30 邵通 Dual-channel identity authentication method and system
CN107004376B (en) * 2014-06-27 2021-01-26 伊利诺斯工具制品有限公司 System and method for welding system operator identification
CN107004376A (en) * 2014-06-27 2017-08-01 伊利诺斯工具制品有限公司 The system and method for welding system operator identification
CN104660412A (en) * 2014-10-22 2015-05-27 南京泽本信息技术有限公司 Password-less security authentication method and system for mobile equipment
CN104578422A (en) * 2015-01-13 2015-04-29 国电南瑞科技股份有限公司 Remote maintenance method for transformer substation telecontrol forwarding table
CN106156569B (en) * 2015-03-30 2020-01-10 重庆邮电大学 Event execution method, electronic equipment, related device and system
CN106156569A (en) * 2015-03-30 2016-11-23 重庆邮电大学 A kind of event execution method, electronic equipment, relevant apparatus and system
CN104852928A (en) * 2015-06-01 2015-08-19 上海雷腾软件股份有限公司 Authentication method for fingerprint encryption
CN105207987A (en) * 2015-08-10 2015-12-30 上海闻泰电子科技有限公司 Fingerprint identification system based on Bluetooth mobile phone terminal
CN105227562A (en) * 2015-10-14 2016-01-06 公安部第三研究所 The key business data transmission mediation device of identity-based checking and using method thereof
CN105227562B (en) * 2015-10-14 2019-05-24 公安部第三研究所 The key business data transmission mediation device and its application method of identity-based verifying
CN106936775A (en) * 2015-12-29 2017-07-07 航天信息股份有限公司 A kind of authentication method and system based on fingerprint recognition
CN106934621A (en) * 2015-12-30 2017-07-07 远光软件股份有限公司 The examination & approval safety certifying method and system of payment funding
CN105516180A (en) * 2015-12-30 2016-04-20 北京金科联信数据科技有限公司 Cloud secret key authentication system based on public key algorithm
CN105740682B (en) * 2016-01-12 2018-08-31 黑河学院 The personal identification method and system of a kind of computer system and its user
CN105740682A (en) * 2016-01-12 2016-07-06 黑河学院 Computer system as well as identification method and system of user thereof
CN107045684A (en) * 2016-02-06 2017-08-15 戴见霖 Identification system and its recognition methods
CN106101111A (en) * 2016-06-24 2016-11-09 郑州信大捷安信息技术股份有限公司 Vehicle electronics safe communication system and communication means
CN107070949A (en) * 2017-05-24 2017-08-18 江苏大学 A kind of vehicle-mounted net Lightweight Identify Authentication Protocol Design Method based on device-fingerprint
CN107070949B (en) * 2017-05-24 2020-05-05 江苏大学 Vehicle-mounted network lightweight identity authentication protocol design method based on device fingerprints
CN107370601A (en) * 2017-09-18 2017-11-21 山东确信信息产业股份有限公司 A kind of intelligent terminal, system and method for integrating a variety of safety certifications
CN107370601B (en) * 2017-09-18 2023-09-05 确信信息股份有限公司 Intelligent terminal, system and method integrating multiple security authentications
CN109842491A (en) * 2017-11-28 2019-06-04 上海耕岩智能科技有限公司 A kind of electronic equipment
CN108023979A (en) * 2017-11-30 2018-05-11 公安部第三研究所 Safety strong portable operation terminal and system
CN108737376A (en) * 2018-04-16 2018-11-02 北京明朝万达科技股份有限公司 A kind of double factor authentication method and system based on fingerprint and digital certificate
CN108650271A (en) * 2018-05-17 2018-10-12 深圳大普微电子科技有限公司 A kind of method for managing user right and system
CN109756333A (en) * 2018-11-26 2019-05-14 西安得安信息技术有限公司 key management system
CN109885994A (en) * 2019-01-08 2019-06-14 深圳禾思众成科技有限公司 A kind of offline identity authorization system, equipment and computer readable storage medium
CN111131142A (en) * 2019-10-22 2020-05-08 北京握奇智能科技有限公司 Fingerprint authentication encryption system and method for multi-application system
CN111404688A (en) * 2019-11-19 2020-07-10 浙江机电职业技术学院 Portable authentication system and method
CN111404688B (en) * 2019-11-19 2022-06-17 浙江机电职业技术学院 Portable authentication system and method
CN110912693B (en) * 2019-11-22 2022-06-03 福建金密网络安全测评技术有限公司 Digital certificate format compliance detection system
CN110912693A (en) * 2019-11-22 2020-03-24 福建金密网络安全测评技术有限公司 Digital certificate format compliance detection system
CN111767531A (en) * 2020-09-01 2020-10-13 南京壹证通信息科技有限公司 Authentication system and method based on biological characteristics
CN112035818A (en) * 2020-09-23 2020-12-04 南京航空航天大学 Identity authentication system based on physical encryption radiation imaging
CN112035818B (en) * 2020-09-23 2023-08-18 南京航空航天大学 Physical encryption radiation imaging-based identity authentication system
CN113037742A (en) * 2021-03-04 2021-06-25 上海华申智能卡应用系统有限公司 Fingerprint authentication method and system
CN114884654A (en) * 2022-04-29 2022-08-09 江西锐盾智能科技有限公司 Safety interaction system of banking library

Similar Documents

Publication Publication Date Title
CN101631020A (en) Identity authentication system combining fingerprint identification and PKI system
TWI237978B (en) Method and apparatus for the trust and authentication of network communications and transactions, and authentication infrastructure
US20030115475A1 (en) Biometrically enhanced digital certificates and system and method for making and using
KR100876003B1 (en) User Authentication Method Using Biological Information
US8447991B2 (en) Card authentication system
US6321333B1 (en) Efficient digital certificate processing in a data processing system
US7549057B2 (en) Secure transactions with passive storage media
JP4460763B2 (en) Encryption key generation method using biometric data
EP1571525A1 (en) A method, a hardware token, and a computer program for authentication
WO2003007527A2 (en) Biometrically enhanced digital certificates and system and method for making and using
US20090293111A1 (en) Third party system for biometric authentication
CN201286105Y (en) Identity authentication system combining fingerprint recognition with PKI system
KR19990044692A (en) Document authentication system and method
KR100341147B1 (en) A user Authentication system and control method using Bio-Information in Internet/Intranet environment
CN2609069Y (en) Fingerprint digital autograph device
CN102004872A (en) Fingerprint encryption-based identity authentication system and implementation method thereof
KR20160139885A (en) Certification System for Using Biometrics and Certification Method for Using Key Sharing and Recording medium Storing a Program to Implement the Method
CN111798224A (en) SGX-based digital currency payment method
WO2022042745A1 (en) Key management method and apparatus
Cavoukian et al. Keynote paper: Biometric encryption: Technology for strong authentication, security and privacy
CN113781689A (en) Access control system based on block chain
CN103295169B (en) Method and system for safely supervising real estate real person registration information
Bosworth et al. Entities, identities, identifiers and credentials—what does it all mean?
KR101360843B1 (en) Next Generation Financial System
KR20030042639A (en) Multi-certification system and the method using smart card

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20100120