CN107239683A - A kind of auth method based on fingerprint recognition, device and system - Google Patents
A kind of auth method based on fingerprint recognition, device and system Download PDFInfo
- Publication number
- CN107239683A CN107239683A CN201610188632.4A CN201610188632A CN107239683A CN 107239683 A CN107239683 A CN 107239683A CN 201610188632 A CN201610188632 A CN 201610188632A CN 107239683 A CN107239683 A CN 107239683A
- Authority
- CN
- China
- Prior art keywords
- fingerprint
- challenge
- test
- array
- background server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/1347—Preprocessing; Feature extraction
- G06V40/1359—Extracting features related to ridge properties; Determining the fingerprint type, e.g. whorl or loop
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/1365—Matching; Classification
- G06V40/1376—Matching features related to ridge properties or fingerprint texture
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention discloses a kind of auth method based on fingerprint recognition, device and system, to solve when terminal is located at untrusted region, it is impossible to the problem of reference fingerprint stored using cloud database carries out authentication to user.Terminal positioned at untrusted region is received after the authentication request of application program initiation, obtains the test fingerprint of the application program collection, and authentication request is sent to the background server in trusted areas;Receive the challenge fingerprint array of the background server feedback, first between the test fingerprint of calculating and the challenge fingerprint array is not inconsistent into right matrix to send to the background server, second between the reference fingerprint in background server and challenge fingerprint array is not inconsistent right matrix matching, to obtain the authentication result of the test fingerprint, so, when terminal is located at untrusted region, the reference fingerprint that can be stored using cloud database carries out authentication to user, expands the application of the authentication of fingerprint recognition.
Description
Technical field
The present invention relates to fingerprint identification technology field, more particularly to a kind of authentication side based on fingerprint recognition
Method, device and system.
Background technology
Fingerprint recognition, refers to that electronic equipment gathers user fingerprints, by the fingerprint of collection and the fingerprint prestored
Template is matched to verify the technology of user identity.Disabled user can be avoided to use electronics by fingerprint recognition
Equipment, is referred to as terminal by the electronic equipment with fingerprint identification function below.
Typical fingerprint identification process comprises the following steps:1st, recognized needed for being obtained by fingerprint collecting equipment
The image of fingerprint;2nd, the fingerprint image of collection is pre-processed, specifically includes picture quality and judge, scheme
Image intensifying, finger-print region detection, fingerprint orientation and frequence estimation, image binaryzation processing, image thinning
Deng;3rd, from pretreated fingerprint image, the crestal line data of fingerprint are obtained;4th, from the crestal line number of fingerprint
In, the characteristic point needed for the identification that takes the fingerprint takes the fingerprint feature;5th, by the fingerprint characteristic of extraction with
Fingerprint characteristic in the reference fingerprint template preserved in database is matched one by one, judges whether identical fingerprints.
6th, complete after fingerprint matching processing, export the result of fingerprint recognition.
The reference fingerprint as matching object that user inputs during fingerprint identification function is configured is nothing
What method was cancelled and changed, so the protection of reference fingerprint template needs the strategy for taking security higher.It is actual
In, in order to ensure the security of fingerprint recognition, the reference that will be stored in cloud database is not allowed typically
Fingerprint is read in equipment, does not also allow the reference fingerprint that equipment itself is stored being sent to high in the clouds, therefore,
Fingerprint recognition is mainly used in the trusted areas of untrusted region or in single device.
With the popularization of mobile office, many enterprises provide common moving terminal for employee, for example, bank
Clip making machine, to facilitate the outgoing office of employee.These common moving terminals can not possibly be previously stored each employee
Reference fingerprint, and when employee go out office leave trusted areas when, the reference stored in cloud database refers to
Line can not be transferred to the common moving terminal, therefore, common moving terminal nothing after trusted areas is left
Method carries out authentication to user.Under other scenes, in order to improve the security of certification, work as terminal
During positioned at untrusted region, do not allow terminal to carry out identity to user using the reference fingerprint being locally stored and test
Card, and the reference fingerprint stored in cloud database can not be transferred to the terminal, this again results in the terminal
Authentication can not be carried out to user.I.e., in the prior art, when terminal is located at untrusted region,
The reference fingerprint that can not be stored using cloud database carries out authentication to user.
The content of the invention
The embodiment of the present invention provides a kind of auth method based on fingerprint recognition, device and system, to solve
Certainly in the prior art, when terminal is located at untrusted region, it is impossible to which the reference stored using cloud database is referred to
The problem of line carries out authentication to user.
Concrete technical scheme provided in an embodiment of the present invention is as follows:
First aspect there is provided a kind of auth method based on fingerprint recognition, including:
Terminal positioned at untrusted region is received after the authentication request of application program initiation, obtains described
The test fingerprint of application program collection;
The terminal sends the authentication request to the background server positioned at trusted areas, the body
Part checking request is used for the corresponding authentication result of test fingerprint for obtaining the application program collection;
The terminal receives the challenge fingerprint battle array that the background server is fed back based on the authentication request
Row, the challenge fingerprint array includes the N number of challenge fingerprint generated at random;
First between the terminal calculating test fingerprint and the challenge fingerprint array is not inconsistent right matrix,
And it is not inconsistent right matrix to background server transmission described first, described first, which is not inconsistent right matrix, is used for
The mismatch degree between the test fingerprint and the challenge fingerprint array is described, makes the background server
It is not inconsistent right matrix based on described first and returns to the corresponding authentication result of the test fingerprint.
On the basis of first aspect, optionally, the N number of challenge fingerprint generated at random is the backstage
N number of fingerprint that server is randomly selected from fingerprint database.
On the basis of first aspect, optionally, the terminal calculates the test fingerprint and referred to the challenge
First between line array is not inconsistent right matrix, including:
The terminal obtains M minutiae point in the crestal line of the test fingerprint, and the challenge fingerprint
M minutiae point in array in the crestal line of each challenge fingerprint;
The terminal compares M minutiae point and the test fingerprint in the crestal line of each challenge fingerprint successively
Crestal line in M minutiae point, obtain in M minutiae point in the crestal line of each challenge fingerprint it is each carefully
The corresponding crestal line matching degree of node;
M crestal line matching degree is added and is averaging, obtain each for each challenge fingerprint by the terminal
The challenging value of fingerprint is challenged, and
Challenging value based on obtained each challenge fingerprint forms described first and is not inconsistent right matrix.
Second aspect there is provided a kind of auth method based on fingerprint recognition, including:
Being directed to for terminal transmission that background server in trusted areas receives positioned at untrusted region should
The authentication request of authentication is carried out with the test fingerprint of programmed acquisition;
Generation includes the challenge fingerprint array of N number of challenge fingerprint to the background server at random;
The background server sends the challenge fingerprint array of the generation to the terminal;
The background server receives the test fingerprint and the challenge fingerprint battle array that the terminal is sent
First between row is not inconsistent after right matrix, obtains the reference fingerprint prestored;
The background server calculate respectively between each reference fingerprint and the challenge fingerprint array second not
Degree of conformity matrix;
The background server is not inconsistent right matrix based on described first and counted respectively for each reference fingerprint
Second calculated is not inconsistent right matrix, it is determined that each matching degree between reference fingerprint and the test fingerprint;
The background server is based on the matching degree between each reference fingerprint and the test fingerprint, to described
Terminal returns to the corresponding authentication result of the test fingerprint.
On the basis of second aspect, optionally, the random generation of the background server includes N number of challenge and referred to
The challenge fingerprint array of line, including:
The background server randomly selects N number of fingerprint from fingerprint database, and fingerprint array is challenged in generation,
The fingerprint database is stored in the background server or is stored in its of the background server connection
In his equipment.
On the basis of second aspect, optionally, the background server calculate each reference fingerprint with it is described
Second between challenge fingerprint array is not inconsistent right matrix, including:
The background server obtains M minutiae point in the crestal line of each reference fingerprint, and described chooses
M minutiae point in war fingerprint array in the crestal line of each challenge fingerprint;
For each reference fingerprint, the background server is compared in the crestal line of each challenge fingerprint successively
M minutiae point and M minutiae point in the crestal line of one reference fingerprint, obtain each challenge fingerprint
The corresponding crestal line matching degree of each minutiae point in middle M minutiae point;
M crestal line matching degree is added and is averaging, obtained for each challenge fingerprint by the background server
One reference fingerprint is formed to the challenging value of each challenge fingerprint, and by the challenging value of each challenge fingerprint
Second be not inconsistent right matrix.
On the basis of second aspect, optionally, it is not inconsistent right matrix based on described first and each reference refers to
The second of line is not inconsistent right matrix, it is determined that each matching degree between reference fingerprint and the test fingerprint, symbol
Close following formula requirements:
Wherein, σ is the matching degree between any one reference fingerprint and test fingerprint, test fingerprint and challenge
First between fingerprint array be not inconsistent right matrix for [{ AC1 }, { AC2 }, { AC3 } ... { ACN }], it is described any one
Second between reference fingerprint and challenge fingerprint array, which is not inconsistent right matrix, is
[{BC1},{BC2},{BC3},...{BCN}]。
On the basis of second aspect, optionally, the background server be based on each reference fingerprint with it is described
Matching degree between test fingerprint, the corresponding authentication result of the test fingerprint is returned to the terminal,
Including:
The background server judges ginseng based on the matching degree between each reference fingerprint and the test fingerprint
Examine and whether there is object reference fingerprint, between the object reference fingerprint and the test fingerprint in fingerprint
It is less than predetermined threshold value with degree;
If there is object reference fingerprint, to the terminal return the corresponding authentication of the test fingerprint into
Work(;
If in the absence of object reference fingerprint, returning to the corresponding authentication of the test fingerprint to the terminal and losing
Lose.
The third aspect there is provided a kind of authentication means based on fingerprint recognition, including:
After collecting unit, the authentication request for receiving application program initiation, the application journey is obtained
The test fingerprint of sequence collection;
Transmitting element, for the authentication request to be sent to the background server positioned at trusted areas,
The authentication request is used for the corresponding authentication knot of test fingerprint for obtaining the application program collection
Really;
Receiving unit, is referred to for receiving the background server based on the challenge that the authentication request is fed back
Line array, the challenge fingerprint array includes the N number of challenge fingerprint generated at random;
Processing unit, for calculate first between the test fingerprint and the challenge fingerprint array be not inconsistent it is right
Matrix, and it is not inconsistent right matrix to background server transmission described first, described first is not inconsistent right square
Battle array is used to describe the mismatch degree between the test fingerprint and the challenge fingerprint array, makes the backstage
Server is not inconsistent right matrix based on described first and returns to the corresponding authentication result of the test fingerprint.
In each embodiment of the device of the third aspect for realizing first aspect and first aspect
Method.
Fourth aspect there is provided a kind of authentication means based on fingerprint recognition, including:
Receiving unit, the survey gathered for application program that the terminal for receiving positioned at untrusted region is sent
Try the authentication request that fingerprint carries out authentication;
Processing unit, includes the challenge fingerprint array of N number of challenge fingerprint for generating at random;
Transmitting element, the challenge fingerprint array for sending the generation to the terminal;
The receiving unit, is additionally operable to receiving the test fingerprint and the challenge that the terminal is sent
First between fingerprint array is not inconsistent after right matrix, obtains the reference fingerprint prestored;
The processing unit, is additionally operable to calculate between each reference fingerprint and the challenge fingerprint array respectively
Two are not inconsistent right matrix;
It is not inconsistent right matrix based on described first and is not met for each reference fingerprint is calculated respectively second
Matrix is spent, it is determined that each matching degree between reference fingerprint and the test fingerprint;
Based on the matching degree between each reference fingerprint and the test fingerprint, by the transmitting element to institute
State terminal and return to the corresponding authentication result of the test fingerprint.
In each embodiment of the device of the fourth aspect for realizing second aspect and second aspect
Method.
5th aspect includes processor, memory, transmitter and receiver there is provided a kind of terminal, the terminal,
Wherein, be stored with computer-readable program in the memory, and the processor is by running the memory
In program, control the transmitter and receiver, realize the body based on fingerprint recognition that first aspect is related to
Part verification method.
6th aspect includes processor, memory, transceiver there is provided a kind of server, the equipment, wherein,
Have computer-readable program in the memory, the processor by running the program in the memory,
The transmitter and receiver are controlled, the auth method based on fingerprint recognition that second aspect is related to is realized.
7th aspect includes the first equipment and the second equipment there is provided a kind of communication system, the communication system, its
In, first equipment is the terminal that the device that the third aspect is related to or the 5th aspect are related to, and described second sets
The server that the standby device being related to for fourth aspect or the 6th aspect are related to.
In authentication scheme provided in an embodiment of the present invention based on fingerprint recognition, positioned at untrusted region
Terminal is received after the authentication request of application program initiation, and the test for obtaining the application program collection refers to
Line, receives the challenge fingerprint array of background server feedback, by the test fingerprint of calculating and the challenge fingerprint
First between array, which is not inconsistent right matrix, sends to the background server, and background server calculates background service
Second between reference fingerprint and challenge fingerprint array in device is not inconsistent right matrix, and is not inconsistent right square by first
Battle array is not inconsistent right matrix matching with second, to obtain the authentication result of the test fingerprint.Compared to existing
There is the scheme in technology, the embodiment of the present invention, when terminal is located at untrusted region, high in the clouds number can be utilized
Authentication is carried out to user according to the reference fingerprint of library storage, expands the application of the authentication of fingerprint recognition
Scope, it is to avoid the disclosure risk for the reference fingerprint that the test fingerprint of terminal is stored with cloud database, is improved
The security of authentication.
Brief description of the drawings
Fig. 1 is the authentication system configuration diagram based on fingerprint recognition of the embodiment of the present invention;
Fig. 2 is the auth method flow chart based on fingerprint recognition in the embodiment of the present invention;
Fig. 3 is the auth method stream based on fingerprint recognition under practical application scene in the embodiment of the present invention
Cheng Tu;
Fig. 4 is a kind of structural representation of the authentication means based on fingerprint recognition in the embodiment of the present invention;
Fig. 5 is a kind of structural representation of terminal in the embodiment of the present invention;
Fig. 6 is the structural representation of another authentication means based on fingerprint recognition in the embodiment of the present invention;
Fig. 7 is a kind of structural representation of server in the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is retouched
State.
Fig. 1 show the authentication system configuration diagram based on fingerprint recognition of the embodiment of the present invention, institute
Stating system includes terminal and background server, and terminal is in untrusted region, background server and is in trusted area
Can be set up in domain, between terminal and background server VPN (Virtual Private Network,
VPN) tunnel is communicated, can also set up based on safe transmission layer protocol (Transport Layer Security,
TLS), the long of SSL (Secure Sockets Layer, SSL) connects to be communicated.
After terminal, the authentication request for receiving application program initiation, obtain the application program and adopt
The test fingerprint of collection, and the authentication request is sent to the background server positioned at trusted areas, institute
State the corresponding authentication result of test fingerprint that authentication request is used to obtain the application program collection;
The challenge fingerprint array that the background server is fed back based on the authentication request is received, the challenge refers to
Line array includes the N number of challenge fingerprint generated at random;Calculate the test fingerprint and the challenge fingerprint array
Between first be not inconsistent right matrix, and be not inconsistent right matrix by described first and send to the background server,
It is described not to be inconsistent right matrix for describing the mismatch between the test fingerprint and the challenge fingerprint array
Degree.
Background server, what the terminal for receiving positioned at untrusted region was sent is directed to what application program was gathered
Test fingerprint carries out the authentication request of authentication;The challenge that random generation includes N number of challenge fingerprint refers to
Line array;The challenge fingerprint array of generation is sent to the terminal;Receive the described of the terminal transmission
First between test fingerprint and the challenge fingerprint array is not inconsistent after right matrix, obtains the reference fingerprint prestored;
Second between each reference fingerprint and the challenge fingerprint array is calculated respectively is not inconsistent right matrix, and based on institute
First is stated not to be inconsistent right matrix and be not inconsistent right matrix for each reference fingerprint is calculated respectively second, it is determined that
Each matching degree between reference fingerprint and the test fingerprint;Referred to based on each reference fingerprint with the test
Matching degree between line, the corresponding authentication result of the test fingerprint is returned to the terminal.
As shown in fig.2, the embodiment of the present invention provides a kind of auth method based on fingerprint recognition, use
In the system shown in Fig. 1.Methods described is specifically included:
Step 20:Terminal is received after the authentication request of application program initiation, obtains the application program
The test fingerprint of collection.
Step 21:The terminal sends the authentication request to the background service in trusted areas
Device.
The corresponding identity of test fingerprint that the authentication request is used to obtain the application program collection is tested
Demonstrate,prove result.
Step 22:Background server is received after the authentication request of terminal transmission, and random generation includes N
The challenge fingerprint array of individual random fingerprint.
Wherein, the challenge fingerprint array includes what the background server was randomly selected from fingerprint database
N number of challenge fingerprint, the fingerprint database is stored in the background server or is stored in the backstage clothes
It is engaged in the other equipment of device connection.The N number of challenge fingerprint generated at random is the background server from fingerprint number
According to the N number of fingerprint randomly selected in storehouse.
Step 23:Background server sends the challenge fingerprint array of generation to terminal.
Step 24:Terminal is received after challenge fingerprint array, calculates the test fingerprint and the challenge fingerprint
First between array is not inconsistent right matrix.
Specifically, first between the terminal calculating test fingerprint and the challenge fingerprint array does not meet
Matrix is spent, is comprised the following steps:
S1:Obtain M minutiae point in the crestal line of the test fingerprint, and the challenge fingerprint array
In each challenge fingerprint crestal line in M minutiae point.
S2:The M minutiae point and the ridge of the test fingerprint in the crestal line of each challenge fingerprint are compared successively
M minutiae point in line, obtains each minutiae point in M minutiae point in the crestal line of each challenge fingerprint
Corresponding crestal line matching degree.
Here S is usedkK-th of details between i-th of challenge fingerprint and test fingerprint in expression challenge fingerprint array
The corresponding crestal line matching degree of point, 1≤k≤M.
S3:For each challenge fingerprint, M crestal line matching degree is added and be averaging, each challenge is obtained
The challenging value of fingerprint, and the formation of the challenging value based on obtained each challenge fingerprint first is not inconsistent right matrix.
Here represented to challenge the challenging value of i-th of challenge fingerprint in fingerprint array, 1≤i≤N with ACi, and expired
Sufficient following equation:
First be not inconsistent right matrix for [{ AC1 }, { AC2 }, { AC3 } ... { ACN }],
Step 25:Terminal sends described first to the background server and is not inconsistent right matrix.
Described first, which is not inconsistent right matrix, is used to describe between the test fingerprint and the challenge fingerprint array
Mismatch degree.
Step 26:Background server receives the test fingerprint and the challenge fingerprint that the terminal is sent
First between array is not inconsistent after right matrix, obtains the reference fingerprint prestored, each reference fingerprint is calculated respectively
Second between the challenge fingerprint array is not inconsistent right matrix.
It should be noted that reference fingerprint is stored in advance in background server, and the background server is also
Store the corresponding identity information of each reference fingerprint and authority.
Specifically, second between the background server each reference fingerprint of calculating and the challenge fingerprint array is not inconsistent
Right matrix, comprises the following steps:
N1:Obtain M minutiae point in the crestal line of each reference fingerprint, and the challenge fingerprint array
In each challenge fingerprint crestal line in M minutiae point.
N2:For each reference fingerprint, the background server compares the crestal line of each challenge fingerprint successively
In M minutiae point and one reference fingerprint crestal line in M minutiae point, obtain each challenge
The corresponding crestal line matching degree of each minutiae point in fingerprint in M minutiae point.
N3:For each challenge fingerprint, M crestal line matching degree is added and be averaging, each challenge is obtained
The challenging value of fingerprint, and the challenging value of each challenge fingerprint is formed the second of one reference fingerprint and is not inconsistent
Right matrix.
It should be noted that second between any one reference fingerprint and challenge fingerprint array is not inconsistent right square
The computational methods of battle array, first between above-mentioned test fingerprint and challenge fingerprint array is not inconsistent the meter of right matrix
Calculation method, it is identical, repeat no more here.
Step 27:Background server is not inconsistent right matrix based on described first and distinguished for each reference fingerprint
Second calculated is not inconsistent right matrix, it is determined that each matching degree between reference fingerprint and the test fingerprint.
Be not inconsistent right matrix and each reference fingerprint based on described first second is not inconsistent right matrix, it is determined that often
Matching degree between individual reference fingerprint and the test fingerprint, meets following formula requirements:
Wherein, σ is a matching degree between reference fingerprint and test fingerprint, and first, which is not inconsistent right matrix, is
[{ AC1 }, { AC2 }, { AC3 } ... { ACN }], the second of a reference fingerprint, which is not inconsistent right matrix, is
[{BC1},{BC2},{BC3},...{BCN}]。
Step 28:Background server based on the matching degree between each reference fingerprint and the test fingerprint, to
The terminal returns to the corresponding authentication result of the test fingerprint.
Specifically, background server is based on the matching degree between each reference fingerprint and the test fingerprint, to
The terminal returns to the corresponding authentication result of the test fingerprint, and detailed process is:
The background server judges ginseng based on the matching degree between each reference fingerprint and the test fingerprint
Examine and whether there is object reference fingerprint, between the object reference fingerprint and the test fingerprint in fingerprint
It is less than predetermined threshold value with degree;
If there is object reference fingerprint, to the terminal return the corresponding authentication of the test fingerprint into
Work(;
If in the absence of object reference fingerprint, returning to the corresponding authentication of the test fingerprint to the terminal and losing
Lose.
Illustrate the method shown in Fig. 2 below by a detailed example, as shown in figure 3, including terminal
And background server, terminal and background server are set up vpn tunneling by public network and communicated.Wherein,
Terminal includes 2 entity modules, is client fingerprint authentication module and finger print identifying trust computing area respectively,
Backstage fingerprint authentication module, backstage random fingerprint maker and reference fingerprint template are provided with background server
Storehouse.
Wherein, client fingerprint authentication module, the entrance for providing finger print identifying for client application is
The finger print identifying that application on client terminals provides application verification interface and is responsible for initiating to apply please
Ask.
Finger print identifying trust computing area, is responsible for calculating the challenge fingerprint array and client of background server feedback
First is not inconsistent right matrix between the test fingerprint of fingerprint authentication module collection, and obtain first is not met
Degree matrix passes the backstage fingerprint authentication module in background server back.Finger print identifying trust computing area is located at terminal
Safety zone, the region do not allow it is extraneous arbitrarily access, but can arbitrarily access extraneous region.
Backstage fingerprint authentication module, the service for providing finger print identifying, be responsible for calculate challenge fingerprint array and
Second between each reference fingerprint in reference fingerprint template is not inconsistent right matrix, and each ginseng is contrasted one by one
Examine the second of fingerprint and be not inconsistent right matrix and first and be not inconsistent difference between right matrix, obtain test fingerprint
Actual fingerprint identity, the identity of validation test fingerprint.
Backstage random fingerprint production device, is responsible for random generation challenge fingerprint array, and challenge fingerprint array includes N
(N is the positive integer more than 2) individual challenge fingerprint, and terminal is fed back to, challenge fingerprint is the survey of client
Try the public reference of the reference fingerprint comparison of fingerprint and background server.
Fingerprint template thesaurus:It is responsible for M reference fingerprint of the storage with identity information, M is positive integer.
Specifically, interaction see shown in Fig. 3.
1st, application program initiates the authentication request of currently used person's real name identity, and gathers currently used
The test fingerprint of person's input, client fingerprint authentication module is passed to by authentication request and test fingerprint.
2nd, fingerprint authentication module sets up vpn tunneling by public network and background server first, afterwards in VPN
Backstage fingerprint authentication module in tunnel to background server goes application to carry out authentication to test fingerprint.
3rd, backstage fingerprint authentication module triggering backstage random fingerprint maker, goes to generate a challenge at random and refers to
N number of challenge fingerprint is included in line array C, challenge fingerprint array C.Specifically, random fingerprint maker
N number of fingerprint, the fingerprint template in fingerprint template storehouse are randomly selected from a sufficiently large fingerprint template database
By outside offer, ATL template data otherness is bigger, and the accuracy of last comparison result is higher.
4th, random fingerprint maker in backstage transfers back to client fingerprint authentication module by fingerprint array C is challenged.
5th, client fingerprint authentication module is challenge fingerprint array C, test fingerprint, and passing to finger print identifying can
Letter calculates area, carries out the contrast one by one of test fingerprint and each challenge fingerprint in challenge fingerprint array, obtains
First is not inconsistent right matrix:[{AC1},{AC2},{AC3},...{ACN}].
Specifically, using fingerprint matching algorithm during fingerprint comparison, fingerprint matching algorithm uses details point coordinates mould
Type does details description, and a secondary fingerprint image is converted into a plane point set being made up of minutiae point by it,
Identify that fingerprint passes through carefully with both key points of crestal line branch point using crestal line tip (or being end points)
Node is expressed as dot pattern, and finger print identifying is converted into a Point Pattern Matching (details description) automatically.
OrderM minutiae point in the crestal line of test fingerprint is represented,Represent M details of a challenge fingerprint in challenge fingerprint array
Point.Minutiae point is relatively required transformation into polar coordinate system, be in template details point set and input details point set
In respectively select a reference point as the origin in corresponding polar coordinate system, and calculate other details point relative to ginseng
According to the polar coordinates of point.
Represent M details in the crestal line of test fingerprint under polar coordinates
Point,Represent N number of in the crestal line of the next challenge fingerprint of polar coordinates
Minutiae point.WhereinWithRepresent corresponding polar radius, polar angle and relative to reference point
Minutiae Direction.
Based on existing minutiae point alignment algorithm, by the radius put under polar coordinates, angle, the comparison in direction,
Crestal line matching degree (matching fraction) is obtained, S is recorded ask, obtained after all minutiae points of test fingerprint
One group of matching fraction, [S1,S2,…,SM], the crestal line matching degree of M minutiae point is added and is averaging, one is obtained
The challenging value of individual challenge fingerprint.
Wherein, 0<ACi<100, all challenge fingerprints and test fingerprint obtain first after comparing and are not inconsistent right square
Battle array [{ AC1 }, { AC2 }, { AC3 } ... { ACN }].
It should be noted that challenging value is bigger, illustrate that test fingerprint and challenge fingerprint are more dissimilar.
6th, finger print identifying trust computing area is not inconsistent right matrix by obtain first and passes client finger print identifying back
Module.
7th, client fingerprint authentication module is not inconsistent right matrix by first and passes backstage fingerprint authentication module back.
8th, backstage fingerprint authentication module reads all reference fingerprints of storage from reference fingerprint ATL, according to
Secondary and challenge fingerprint array C is compared, obtain second be not inconsistent right matrix [{ BC1 }, { BC2 }, { BC3 } ... { BCN }],
Further, the second of each reference fingerprint is contrasted successively be not inconsistent right matrix and first do not meet matrix and obtain
Each the matching degree between reference fingerprint and test fingerprint, obtains the true identity the result of test fingerprint.
Each the matching degree between reference fingerprint and the test fingerprint meets following formula:
Wherein, σ is a matching degree between reference fingerprint and test fingerprint.
Because the first challenging value for not being inconsistent right matrix and the second each element not being inconsistent in right matrix is
Between 0~100, i.e., 0<ACi<100,0<BCi<100, the matching degree difference of two matrix correspondence positions is less than
5% (BCi-ACi<5), it is believed that the Point matching, all Point matching results, if respectively less than 5%, judging should
The match is successful with test fingerprint for reference fingerprint, and authentication result is is verified, optionally, moreover it is possible to inquire about
To the corresponding identity information of the reference fingerprint.
9th, backstage fingerprint authentication module returns to the corresponding identity of test fingerprint to client identity authentication module and tested
Demonstrate,prove result.
10th, the corresponding authentication result of test fingerprint is returned to corresponding answer by client identity authentication module
Use program.
The auth method based on fingerprint recognition provided based on above-described embodiment, the embodiment of the present invention is provided
A kind of authentication means 400 based on fingerprint recognition, the device can be used for performing above-mentioned Fig. 2 and Fig. 3
The implementation procedure of terminal in described method, wherein, described device 400 can be terminal or be installed on institute
The device in terminal is stated, Fig. 4 show the structural representation of device 400 provided in an embodiment of the present invention, such as
Shown in Fig. 4, the device 400 includes collecting unit 401, transmitting element 402, receiving unit 403 and place
Unit 404 is managed, wherein:
After collecting unit 401, the authentication request for receiving application program initiation, described answer is obtained
With the test fingerprint of programmed acquisition;
Transmitting element 402, for the authentication request to be sent to the background service positioned at trusted areas
Device, the authentication request is used for the corresponding authentication of test fingerprint for obtaining the application program collection
As a result;
Receiving unit 403, for receiving the background server based on choosing that the authentication request is fed back
War fingerprint array, the challenge fingerprint array includes the N number of challenge fingerprint generated at random;
Processing unit 404, is not inconsistent for calculating first between the test fingerprint and the challenge fingerprint array
Right matrix, and it is not inconsistent right matrix to background server transmission described first, described first does not meet
Degree matrix is used to describe the mismatch degree between the test fingerprint and the challenge fingerprint array, makes described
Background server is not inconsistent right matrix based on described first and returns to the corresponding authentication knot of the test fingerprint
Really.
Optionally, the N number of challenge fingerprint generated at random is the background server from fingerprint database
The N number of fingerprint randomly selected.
Optionally, the processing unit 404 is being calculated between the test fingerprint and the challenge fingerprint array
First when not being inconsistent right matrix, specifically for:
Obtain every in M minutiae point in the crestal line of the test fingerprint, and the challenge fingerprint array
M minutiae point in the crestal line of individual challenge fingerprint;
Compare successively in M minutiae point in the crestal line of each challenge fingerprint and the crestal line of the test fingerprint
M minutiae point, obtain in M minutiae point in the crestal line of each challenge fingerprint each minutiae point correspondingly
Crestal line matching degree;
For each challenge fingerprint, M crestal line matching degree is added and be averaging, obtain each challenge fingerprint
Challenging value, and
Challenging value based on obtained each challenge fingerprint forms described first and is not inconsistent right matrix.
The above-mentioned device 400 being related to of the embodiment of the present invention can be independent part or be integrated in
In miscellaneous part.
It should be noted that the function of the unit of device 400 in the embodiment of the present invention is realized and handed over
Mutual mode can with further reference to related method embodiment description, will not be repeated here.
Fig. 5 is referred to, based on same inventive concept, the embodiment of the present invention also provides a kind of based on fingerprint recognition
Identity-validation device 500, the equipment 500 can be used for performing terminal in the method described in above-mentioned Fig. 2 and Fig. 3
Function, as shown in figure 5, equipment 500 includes memory 501, processor 502, the and of receiver 503
Transmitter 504.The program code for performing the present invention program is stored in memory 501, and by processor 502
To control to perform.
The program stored in memory 501 performs the identity based on fingerprint recognition for instruction processing unit 502 and tested
Card method, including:Received after the authentication request that application program is initiated, obtained by receiver 503
The test fingerprint of the application program collection;The authentication request is sent by the transmitter 504
To the background server for being located at trusted areas, the authentication request is used to obtain the application program collection
The corresponding authentication result of test fingerprint;The background server base is received by the receiver 503
The challenge fingerprint array fed back in the authentication request, the challenge fingerprint array includes what is generated at random
N number of challenge fingerprint;First calculated between the test fingerprint and the challenge fingerprint array is not inconsistent right matrix,
And it is not inconsistent right matrix to background server transmission described first, described first, which is not inconsistent right matrix, is used for
The mismatch degree between the test fingerprint and the challenge fingerprint array is described, makes the background server
It is not inconsistent right matrix based on described first and returns to the corresponding authentication result of the test fingerprint.
The background server can be the server shown in device or Fig. 7 shown in Fig. 6.
Wherein, processor 502 can be central processing unit (CPU) or ASIC (English:
Application-specific integrated circuit, referred to as:ASIC), can be it is one or more be used for control
The integrated circuit that processing procedure sequence is performed, can use field programmable gate array (field programmable
Gate array, FPGA) exploitation hardware circuit, can be baseband chip.
The quantity of memory 501 can be one or more.Memory 501 can include read-only storage (English
Text:Read-only memory, referred to as:ROM), random access memory (English:random access
Memory, referred to as:) and magnetic disk storage RAM.
Receiver 503 can be used for being communicated with external equipment, for example receiver 503 can with base station,
The equipment such as background server are communicated.
Transmitter 504, can be used for being communicated with external equipment, and for example transmitter 504 can also be with base
Stand, the equipment such as background server is communicated.
Transmitter 504 and receiver 503 can be same entity modules, for example, can be that by transmitting-receiving
The entity module of function, such as be properly termed as transceiver, or transmitter 504 and receiver 503 can also
It is single entity module.
Memory 501, transmitter 504 and receiver 503 can be connected by bus with processor 502,
Or can also be connected respectively with processor 502 by special connecting line.
By being designed programming to processor 502, the code corresponding to method illustrated above is cured to
In chip, so that chip is operationally able to carry out the method shown in Fig. 2 and Fig. 3.
It is understood that the equipment 500 of the present embodiment, which can be used for realizing in above method embodiment, is related to end
The institute at end is functional, and it implements the associated description that process is referred to above method embodiment, herein not
Repeat again.
The auth method based on fingerprint recognition provided based on above-described embodiment, the embodiment of the present invention is provided
A kind of authentication means 600 based on fingerprint recognition, the device can be used for performing above-mentioned Fig. 2 and Fig. 3
The implementation procedure of background server in described method, Fig. 6 show device provided in an embodiment of the present invention
600 structural representation, as shown in fig. 6, the device 600 include receiving unit 601, processing unit 602,
Transmitting element 603, wherein:
Receiving unit 601, what the terminal for receiving positioned at untrusted region was sent gathers for application program
Test fingerprint carry out authentication authentication request;
Processing unit 602, includes the challenge fingerprint array of N number of challenge fingerprint for generating at random;
Transmitting element 603, the challenge fingerprint array for sending the generation to the terminal;
The receiving unit 601, be additionally operable to receive the test fingerprint that the terminal sends with it is described
First between challenge fingerprint array is not inconsistent after right matrix, obtains the reference fingerprint prestored;
The processing unit 602, is additionally operable to calculate respectively between each reference fingerprint and the challenge fingerprint array
Second be not inconsistent right matrix;
It is not inconsistent right matrix based on described first and is not met for each reference fingerprint is calculated respectively second
Matrix is spent, it is determined that each matching degree between reference fingerprint and the test fingerprint;
Based on the matching degree between each reference fingerprint and the test fingerprint, pass through the transmitting element 603
The corresponding authentication result of the test fingerprint is returned to the terminal.
Optionally, the processing unit 602 includes the challenge fingerprint array of N number of challenge fingerprint in random generation
When, specifically for:
N number of fingerprint, generation challenge fingerprint array, the fingerprint database are randomly selected from fingerprint database
In the other equipment for storing in said device or being stored in described device connection.
Optionally, the processing unit 602 is being calculated between each reference fingerprint and the challenge fingerprint array
Second when not being inconsistent right matrix, specifically for:
Obtain every in M minutiae point in the crestal line of each reference fingerprint, and the challenge fingerprint array
M minutiae point in the crestal line of individual challenge fingerprint;
For each reference fingerprint, compare successively M minutiae point in the crestal line of each challenge fingerprint and
M minutiae point in the crestal line of one reference fingerprint, obtains M minutiae point in each challenge fingerprint
In the corresponding crestal line matching degree of each minutiae point;
For each challenge fingerprint, M crestal line matching degree is added and be averaging, obtain each challenge fingerprint
Challenging value, and by it is each challenge fingerprint challenging value formed the second of one reference fingerprint be not inconsistent it is right
Matrix.
Optionally, the processing unit 602 be not inconsistent right matrix and each reference fingerprint based on described first
Second be not inconsistent right matrix, it is determined that during each matching degree between reference fingerprint and the test fingerprint, symbol
Close following formula requirements:
Wherein, σ is the matching degree between any one reference fingerprint and test fingerprint, test fingerprint and challenge
First between fingerprint array be not inconsistent right matrix for [{ AC1 }, { AC2 }, { AC3 } ... { ACN }], it is described any one
Second between reference fingerprint and challenge fingerprint array, which is not inconsistent right matrix, is
[{BC1},{BC2},{BC3},...{BCN}]。
Optionally, the processing unit 602 is based between each reference fingerprint and the test fingerprint
With degree, during authentication result corresponding to the terminal return test fingerprint, specifically for:
Based on the matching degree between each reference fingerprint and the test fingerprint, judge whether deposited in reference fingerprint
Matching degree between object reference fingerprint, the object reference fingerprint and the test fingerprint is less than default threshold
Value;
If there is object reference fingerprint, to the terminal return the corresponding authentication of the test fingerprint into
Work(;
If in the absence of object reference fingerprint, returning to the corresponding authentication of the test fingerprint to the terminal and losing
Lose.
The above-mentioned device 600 being related to of the embodiment of the present invention, can be independent part, can also be integrated in it
In his part.
It should be noted that the function of the unit of device 600 in the embodiment of the present invention is realized and handed over
Mutual mode can with further reference to related method embodiment description, will not be repeated here.
Fig. 7 is referred to, based on same inventive concept, the embodiment of the present invention also provides a kind of server 700, should
Server 700 can be used for the operation for performing background server in the method described in above-mentioned Fig. 2 and Fig. 3, such as Fig. 7
Shown, server 700 includes memory 701, processor 702, receiver 703 and transmitter 704.
The program code for performing the present invention program is stored in memory 701, and is controlled by processor 702 to perform.
The program stored in memory 701 performs the identity based on fingerprint recognition for instruction processing unit 702 and tested
Card method, including:Being directed to for terminal transmission received by receiver 703 positioned at untrusted region applies journey
The test fingerprint of sequence collection carries out the authentication request of authentication;Random generation includes N number of challenge fingerprint
Challenge fingerprint array;The challenge fingerprint battle array of the generation is sent to the terminal by the transmitter 704
Row;The test fingerprint and the challenge fingerprint battle array that the terminal is sent are being received by receiver 703
First between row is not inconsistent after right matrix, obtains the reference fingerprint prestored;Calculate respectively each reference fingerprint with
Second between the challenge fingerprint array is not inconsistent right matrix;It is not inconsistent right matrix based on described first and is directed to
What each reference fingerprint was calculated respectively second is not inconsistent right matrix, it is determined that each reference fingerprint refers to described test
Matching degree between line;Based on the matching degree between each reference fingerprint and the test fingerprint, by described
Transmitter 704 returns to the corresponding authentication result of the test fingerprint to the terminal.
The terminal can be the terminal shown in device or Fig. 5 shown in Fig. 4.
Wherein, processor 702 can be CPU or ASIC, can be it is one or more be used for control program
The integrated circuit of execution, can be the hardware circuit developed using on-site programmable gate array FPGA, can be with
It is baseband chip.
The quantity of memory 701 can be one or more.Memory 701 can include read-only storage
ROM, RAM and magnetic disk storage.
Receiver 703 and transmitter 704 can be used for being communicated with external equipment, for example receiver 703
It can be communicated with transmitter 704 with terminal.
Transmitter 704 and receiver 703 can be same entity modules, for example, can be that by transmitting-receiving
The entity module of function, such as be properly termed as transceiver, or transmitter 704 and receiver 703 can also
It is single entity module.
Memory 701, transmitter 704 and receiver 703 can be connected by bus with processor 702,
Or can also be connected respectively with processor 702 by special connecting line.
By being designed programming to processor 702, the code corresponding to method illustrated above is cured to
In chip, so that chip is operationally able to carry out the operation of background server in Fig. 2 and Fig. 3.
It is understood that the equipment 700 of the present embodiment can be used for after realizing and being related in above method embodiment
The institute of platform server is functional, and it implements the associated description that process is referred to above method embodiment,
Here is omitted.
In summary, in the embodiment of the present invention, the terminal positioned at untrusted region receives application program initiation
Authentication request after, obtain the test fingerprint of application program collection, and please by the authentication
Seek the background server sent to being located in trusted areas;The background server is received to test based on the identity
The challenge fingerprint array of card request feedback, the challenge fingerprint array includes the N number of fingerprint generated at random;Meter
Calculate first between the test fingerprint and the challenge fingerprint array and be not inconsistent right matrix, and by described first not
Degree of conformity matrix is sent to the background server, and described first, which is not inconsistent right matrix, is used to describe the test
Mismatch degree between fingerprint and the challenge fingerprint array, the background server receives the terminal
First between the test fingerprint and the challenge fingerprint array that calculate and send is not inconsistent after right matrix, obtains
Take the reference fingerprint prestored;Second calculated respectively between each reference fingerprint and the challenge fingerprint array is not inconsistent
Right matrix, and second for not being inconsistent right matrix based on described first and being calculated respectively for each reference fingerprint
Right matrix is not inconsistent, it is determined that each matching degree between reference fingerprint and the test fingerprint;Based on each ginseng
The matching degree between fingerprint and the test fingerprint is examined, the corresponding body of the test fingerprint is returned to the terminal
Part the result, so, when terminal is located at untrusted region, and needs to carry out user's real name authentication
In the case of, by the way that in terminal collecting test fingerprint, the challenge fingerprint array generated by background server is obtained
It is not inconsistent right matrix to first between test fingerprint and challenge fingerprint array and is sent to the background server,
Second between the background server each reference fingerprint of calculating and the challenge fingerprint array is not inconsistent right matrix, and
It is not inconsistent right matrix and second by judging first and is not inconsistent the otherness of right matrix, obtains test fingerprint correspondence
Authentication result, it is to avoid the disclosure risk of the test fingerprint of terminal collection, it also avoid background service
The disclosure risk of the reference fingerprint stored in device, additionally it is possible to which the reference fingerprint stored using cloud database is to making
User carries out authentication, it is ensured that on the premise of security, expands the application of the authentication of fingerprint.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or meter
Calculation machine program product.Therefore, the present invention can be using complete hardware embodiment, complete software embodiment or knot
The form of embodiment in terms of conjunction software and hardware.Wherein wrapped one or more moreover, the present invention can be used
The computer program product implemented in computer-usable storage medium containing computer readable program code
Form.
The present invention is with reference to the production of method according to embodiments of the present invention, equipment (system) and computer program
The flow chart and/or block diagram of product is described.It should be understood that can by computer program instructions implementation process figure and
/ or each flow and/or square frame in block diagram and the flow in flow chart and/or block diagram and/
Or the combination of square frame.These computer program instructions can be provided to all-purpose computer, special-purpose computer, insertion
Formula processor or the processor of other programmable data processing devices are to produce a machine so that pass through and calculate
The instruction of the computing device of machine or other programmable data processing devices is produced for realizing in flow chart one
The device for the function of being specified in individual flow or multiple flows and/or one square frame of block diagram or multiple square frames.
Obviously, those skilled in the art can carry out various changes and modification without de- to the embodiment of the present invention
From the spirit and scope of the embodiment of the present invention.So, if these modifications and variations category of the embodiment of the present invention
Within the scope of the claims in the present invention and its equivalent technologies, then the present invention be also intended to comprising these change and
Including modification.
Claims (17)
1. a kind of auth method based on fingerprint recognition, it is characterised in that including:
Terminal positioned at untrusted region is received after the authentication request of application program initiation, obtains described
The test fingerprint of application program collection;
The terminal sends the authentication request to the background server positioned at trusted areas, the body
Part checking request is used for the corresponding authentication result of test fingerprint for obtaining the application program collection;
The terminal receives the challenge fingerprint battle array that the background server is fed back based on the authentication request
Row, the challenge fingerprint array includes the N number of challenge fingerprint generated at random;
First between the terminal calculating test fingerprint and the challenge fingerprint array is not inconsistent right matrix,
And it is not inconsistent right matrix to background server transmission described first, described first, which is not inconsistent right matrix, is used for
The mismatch degree between the test fingerprint and the challenge fingerprint array is described, makes the background server
It is not inconsistent right matrix based on described first and returns to the corresponding authentication result of the test fingerprint.
2. the method as described in claim 1, it is characterised in that the N number of challenge generated at random refers to
Line is N number of fingerprint that the background server is randomly selected from fingerprint database.
3. method as claimed in claim 1 or 2, it is characterised in that the terminal calculates the test
First between fingerprint and the challenge fingerprint array is not inconsistent right matrix, including:
The terminal obtains M minutiae point in the crestal line of the test fingerprint, and the challenge fingerprint
M minutiae point in array in the crestal line of each challenge fingerprint;
The terminal compares M minutiae point and the test fingerprint in the crestal line of each challenge fingerprint successively
Crestal line in M minutiae point, obtain in M minutiae point in the crestal line of each challenge fingerprint it is each carefully
The corresponding crestal line matching degree of node;
M crestal line matching degree is added and is averaging, obtain each for each challenge fingerprint by the terminal
The challenging value of fingerprint is challenged, and
Challenging value based on obtained each challenge fingerprint forms described first and is not inconsistent right matrix.
4. a kind of auth method based on fingerprint recognition, it is characterised in that including:
Being directed to for terminal transmission that background server in trusted areas receives positioned at untrusted region should
The authentication request of authentication is carried out with the test fingerprint of programmed acquisition;
Generation includes the challenge fingerprint array of N number of challenge fingerprint to the background server at random;
The background server sends the challenge fingerprint array of the generation to the terminal;
The background server receives the test fingerprint and the challenge fingerprint battle array that the terminal is sent
First between row is not inconsistent after right matrix, obtains the reference fingerprint prestored;
The background server calculate respectively between each reference fingerprint and the challenge fingerprint array second not
Degree of conformity matrix;
The background server is not inconsistent right matrix based on described first and counted respectively for each reference fingerprint
Second calculated is not inconsistent right matrix, it is determined that each matching degree between reference fingerprint and the test fingerprint;
The background server is based on the matching degree between each reference fingerprint and the test fingerprint, to described
Terminal returns to the corresponding authentication result of the test fingerprint.
5. method as claimed in claim 4, it is characterised in that the background server generates bag at random
The challenge fingerprint array of N number of challenge fingerprint is included, including:
The background server randomly selects N number of fingerprint from fingerprint database, and fingerprint array is challenged in generation,
The fingerprint database is stored in the background server or is stored in its of the background server connection
In his equipment.
6. the method as described in claim 4 or 5, it is characterised in that the background server calculates every
Second between individual reference fingerprint and the challenge fingerprint array is not inconsistent right matrix, including:
The background server obtains M minutiae point in the crestal line of each reference fingerprint, and described chooses
M minutiae point in war fingerprint array in the crestal line of each challenge fingerprint;
For each reference fingerprint, the background server is compared in the crestal line of each challenge fingerprint successively
M minutiae point and M minutiae point in the crestal line of one reference fingerprint, obtain each challenge fingerprint
The corresponding crestal line matching degree of each minutiae point in middle M minutiae point;
M crestal line matching degree is added and is averaging, obtained for each challenge fingerprint by the background server
One reference fingerprint is formed to the challenging value of each challenge fingerprint, and by the challenging value of each challenge fingerprint
Second be not inconsistent right matrix.
7. the method as described in any one in claim 4-6, it is characterised in that based on described first
Be not inconsistent right matrix and each reference fingerprint second is not inconsistent right matrix, it is determined that each reference fingerprint with it is described
Matching degree between test fingerprint, meets following formula requirements:
<mrow>
<mi>&sigma;</mi>
<mo>=</mo>
<mrow>
<mo>(</mo>
<munderover>
<mo>&Sigma;</mo>
<mrow>
<mi>i</mi>
<mo>=</mo>
<mn>0</mn>
</mrow>
<mi>N</mi>
</munderover>
<mi>f</mi>
<mi>l</mi>
<mi>o</mi>
<mi>o</mi>
<mi>r</mi>
<mo>(</mo>
<mfrac>
<mrow>
<mi>B</mi>
<mi>C</mi>
<mi>i</mi>
<mo>-</mo>
<mi>A</mi>
<mi>C</mi>
<mi>i</mi>
</mrow>
<mi>N</mi>
</mfrac>
<mo>)</mo>
<mo>)</mo>
</mrow>
<mi>%</mi>
<mo>,</mo>
<mn>1</mn>
<mo>&le;</mo>
<mi>i</mi>
<mo>&le;</mo>
<mi>N</mi>
</mrow>
Wherein, σ is the matching degree between any one reference fingerprint and test fingerprint, test fingerprint and challenge
First between fingerprint array be not inconsistent right matrix for [{ AC1 }, { AC2 }, { AC3 } ... { ACN }], it is described any one
Second between reference fingerprint and challenge fingerprint array, which is not inconsistent right matrix, is
[{BC1},{BC2},{BC3},...{BCN}]。
8. the method as described in any one in claim 4-7, it is characterised in that the background service
Device returns to the test based on the matching degree between each reference fingerprint and the test fingerprint to the terminal
The corresponding authentication result of fingerprint, including:
The background server judges ginseng based on the matching degree between each reference fingerprint and the test fingerprint
Examine and whether there is object reference fingerprint, between the object reference fingerprint and the test fingerprint in fingerprint
It is less than predetermined threshold value with degree;
If there is object reference fingerprint, to the terminal return the corresponding authentication of the test fingerprint into
Work(;
If in the absence of object reference fingerprint, returning to the corresponding authentication of the test fingerprint to the terminal and losing
Lose.
9. a kind of authentication means based on fingerprint recognition, it is characterised in that including:
After collecting unit, the authentication request for receiving application program initiation, the application journey is obtained
The test fingerprint of sequence collection;
Transmitting element, for the authentication request to be sent to the background server positioned at trusted areas,
The authentication request is used for the corresponding authentication knot of test fingerprint for obtaining the application program collection
Really;
Receiving unit, is referred to for receiving the background server based on the challenge that the authentication request is fed back
Line array, the challenge fingerprint array includes the N number of challenge fingerprint generated at random;
Processing unit, for calculate first between the test fingerprint and the challenge fingerprint array be not inconsistent it is right
Matrix, and it is not inconsistent right matrix to background server transmission described first, described first is not inconsistent right square
Battle array is used to describe the mismatch degree between the test fingerprint and the challenge fingerprint array, makes the backstage
Server is not inconsistent right matrix based on described first and returns to the corresponding authentication result of the test fingerprint.
10. device as claimed in claim 9, it is characterised in that the N number of challenge generated at random refers to
Line is N number of fingerprint that the background server is randomly selected from fingerprint database.
11. the device as described in claim 9 or 10, it is characterised in that the processing unit is being calculated
First between the test fingerprint and the challenge fingerprint array when not being inconsistent right matrix, specifically for:
Obtain every in M minutiae point in the crestal line of the test fingerprint, and the challenge fingerprint array
M minutiae point in the crestal line of individual challenge fingerprint;
Compare successively in M minutiae point in the crestal line of each challenge fingerprint and the crestal line of the test fingerprint
M minutiae point, obtain in M minutiae point in the crestal line of each challenge fingerprint each minutiae point correspondingly
Crestal line matching degree;
For each challenge fingerprint, M crestal line matching degree is added and be averaging, obtain each challenge fingerprint
Challenging value, and
Challenging value based on obtained each challenge fingerprint forms described first and is not inconsistent right matrix.
12. a kind of authentication means based on fingerprint recognition, it is characterised in that including:
Receiving unit, the survey gathered for application program that the terminal for receiving positioned at untrusted region is sent
Try the authentication request that fingerprint carries out authentication;
Processing unit, includes the challenge fingerprint array of N number of challenge fingerprint for generating at random;
Transmitting element, the challenge fingerprint array for sending the generation to the terminal;
The receiving unit, is additionally operable to receiving the test fingerprint and the challenge that the terminal is sent
First between fingerprint array is not inconsistent after right matrix, obtains the reference fingerprint prestored;
The processing unit, is additionally operable to calculate between each reference fingerprint and the challenge fingerprint array respectively
Two are not inconsistent right matrix;
It is not inconsistent right matrix based on described first and is not met for each reference fingerprint is calculated respectively second
Matrix is spent, it is determined that each matching degree between reference fingerprint and the test fingerprint;
Based on the matching degree between each reference fingerprint and the test fingerprint, by the transmitting element to institute
State terminal and return to the corresponding authentication result of the test fingerprint.
13. device as claimed in claim 12, it is characterised in that the processing unit is being generated at random
Including it is N number of challenge fingerprint challenge fingerprint array when, specifically for:
N number of fingerprint, generation challenge fingerprint array, the fingerprint database are randomly selected from fingerprint database
In the other equipment for storing in said device or being stored in described device connection.
14. the device as described in claim 12 or 13, it is characterised in that the processing unit is being calculated
When each second between reference fingerprint and the challenge fingerprint array is not inconsistent right matrix, specifically for:
Obtain every in M minutiae point in the crestal line of each reference fingerprint, and the challenge fingerprint array
M minutiae point in the crestal line of individual challenge fingerprint;
For each reference fingerprint, compare successively M minutiae point in the crestal line of each challenge fingerprint and
M minutiae point in the crestal line of one reference fingerprint, obtains M minutiae point in each challenge fingerprint
In the corresponding crestal line matching degree of each minutiae point;
For each challenge fingerprint, M crestal line matching degree is added and be averaging, obtain each challenge fingerprint
Challenging value, and by it is each challenge fingerprint challenging value formed the second of one reference fingerprint be not inconsistent it is right
Matrix.
15. the device as described in any one in claim 12-14, it is characterised in that the processing list
Member is not inconsistent right matrix not being inconsistent the second of right matrix and each reference fingerprint based on described first, it is determined that often
During matching degree between individual reference fingerprint and the test fingerprint, meet following formula requirements:
<mrow>
<mi>&sigma;</mi>
<mo>=</mo>
<mrow>
<mo>(</mo>
<munderover>
<mo>&Sigma;</mo>
<mrow>
<mi>i</mi>
<mo>=</mo>
<mn>0</mn>
</mrow>
<mi>N</mi>
</munderover>
<mi>f</mi>
<mi>l</mi>
<mi>o</mi>
<mi>o</mi>
<mi>r</mi>
<mo>(</mo>
<mfrac>
<mrow>
<mi>B</mi>
<mi>C</mi>
<mi>i</mi>
<mo>-</mo>
<mi>A</mi>
<mi>C</mi>
<mi>i</mi>
</mrow>
<mi>N</mi>
</mfrac>
<mo>)</mo>
<mo>)</mo>
</mrow>
<mi>%</mi>
<mo>,</mo>
<mn>1</mn>
<mo>&le;</mo>
<mi>i</mi>
<mo>&le;</mo>
<mi>N</mi>
</mrow>
Wherein, σ is the matching degree between any one reference fingerprint and test fingerprint, test fingerprint and challenge
First between fingerprint array be not inconsistent right matrix for [{ AC1 }, { AC2 }, { AC3 } ... { ACN }], it is described any one
Second between reference fingerprint and challenge fingerprint array, which is not inconsistent right matrix, is
[{BC1},{BC2},{BC3},...{BCN}]。
16. the device as described in any one in claim 12-15, it is characterised in that the processing list
Member returns to described survey based on the matching degree between each reference fingerprint and the test fingerprint to the terminal
When trying the corresponding authentication result of fingerprint, specifically for:
Based on the matching degree between each reference fingerprint and the test fingerprint, judge whether deposited in reference fingerprint
Matching degree between object reference fingerprint, the object reference fingerprint and the test fingerprint is less than default threshold
Value;
If there is object reference fingerprint, to the terminal return the corresponding authentication of the test fingerprint into
Work(;
If in the absence of object reference fingerprint, returning to the corresponding authentication of the test fingerprint to the terminal and losing
Lose.
17. a kind of authentication system based on fingerprint recognition, it is characterised in that including such as claim 9-11
Described device and the device as described in claim 12-16.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610188632.4A CN107239683B (en) | 2016-03-29 | 2016-03-29 | Identity verification method, device and system based on fingerprint identification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610188632.4A CN107239683B (en) | 2016-03-29 | 2016-03-29 | Identity verification method, device and system based on fingerprint identification |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107239683A true CN107239683A (en) | 2017-10-10 |
CN107239683B CN107239683B (en) | 2020-09-25 |
Family
ID=59983364
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610188632.4A Active CN107239683B (en) | 2016-03-29 | 2016-03-29 | Identity verification method, device and system based on fingerprint identification |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107239683B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101150407A (en) * | 2007-10-25 | 2008-03-26 | 王松 | Network identity validation method based on fingerprint |
US20140108441A1 (en) * | 2012-10-15 | 2014-04-17 | Juked, Inc. | Efficient matching of data |
CN103745147A (en) * | 2013-12-30 | 2014-04-23 | 华为技术有限公司 | System mode starting method and application program starting method and device |
CN104573651B (en) * | 2014-12-31 | 2018-02-13 | 北京天诚盛业科技有限公司 | Fingerprint identification method and device |
-
2016
- 2016-03-29 CN CN201610188632.4A patent/CN107239683B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101150407A (en) * | 2007-10-25 | 2008-03-26 | 王松 | Network identity validation method based on fingerprint |
US20140108441A1 (en) * | 2012-10-15 | 2014-04-17 | Juked, Inc. | Efficient matching of data |
CN103745147A (en) * | 2013-12-30 | 2014-04-23 | 华为技术有限公司 | System mode starting method and application program starting method and device |
CN104573651B (en) * | 2014-12-31 | 2018-02-13 | 北京天诚盛业科技有限公司 | Fingerprint identification method and device |
Also Published As
Publication number | Publication date |
---|---|
CN107239683B (en) | 2020-09-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105763521B (en) | A kind of device authentication method and device | |
TW202011242A (en) | Blockchain cross-chain authentication method and system, and server and readable storage medium | |
CN106411950B (en) | Authentication method, apparatus and system based on block chain transaction id | |
CN104392534B (en) | Electronic voting method and device based on finger vein feature recognition | |
CN109542796A (en) | Test method and Related product | |
CN108351932A (en) | CAPTCHA challenges based on image | |
CN107231234A (en) | A kind of identity registration method and device | |
CN106779716A (en) | Authentication method, apparatus and system based on block chain account address | |
CN105262733B (en) | A kind of fingerprint method for authenticating, cloud server, fingerprint identification method and terminal | |
CN108632259A (en) | A kind of mist calculate node device authentication system and method based on block chain | |
CN104967553B (en) | Method for message interaction and relevant apparatus and communication system | |
US10490001B2 (en) | Process for verification of an access right of an individual | |
CN106576046A (en) | System and device binding metadata with hardware intrinsic properties | |
CN108491709A (en) | The method and apparatus of permission for identification | |
CN109446772A (en) | Accrediting amount calculation method, device, computer equipment and storage medium | |
CN105550928A (en) | System and method of network remote account opening for commercial bank | |
CN106572082A (en) | Approval signature verifying method, mobile device, terminal device and system | |
CN110611647A (en) | Node joining method and device on block chain system | |
CN104270253A (en) | Method, devices and system for user identity authentication | |
CN104486306B (en) | Identity authentication method is carried out based on finger hand vein recognition and cloud service | |
CN106470200A (en) | A kind of auth method and relevant apparatus | |
CN108400989A (en) | A kind of safety certificate equipment of shared resource authentication, method and system | |
CN108540447A (en) | A kind of certification authentication method and system based on block chain | |
CN107483208A (en) | Generation, verification method and the device of identifying code picture | |
CN108833445A (en) | A kind of authentication method and device suitable for Internet of things system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |