CN107239683A - A kind of auth method based on fingerprint recognition, device and system - Google Patents

A kind of auth method based on fingerprint recognition, device and system Download PDF

Info

Publication number
CN107239683A
CN107239683A CN201610188632.4A CN201610188632A CN107239683A CN 107239683 A CN107239683 A CN 107239683A CN 201610188632 A CN201610188632 A CN 201610188632A CN 107239683 A CN107239683 A CN 107239683A
Authority
CN
China
Prior art keywords
fingerprint
challenge
test
array
background server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610188632.4A
Other languages
Chinese (zh)
Other versions
CN107239683B (en
Inventor
徐业健
王斐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201610188632.4A priority Critical patent/CN107239683B/en
Publication of CN107239683A publication Critical patent/CN107239683A/en
Application granted granted Critical
Publication of CN107239683B publication Critical patent/CN107239683B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1347Preprocessing; Feature extraction
    • G06V40/1359Extracting features related to ridge properties; Determining the fingerprint type, e.g. whorl or loop
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1365Matching; Classification
    • G06V40/1376Matching features related to ridge properties or fingerprint texture

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a kind of auth method based on fingerprint recognition, device and system, to solve when terminal is located at untrusted region, it is impossible to the problem of reference fingerprint stored using cloud database carries out authentication to user.Terminal positioned at untrusted region is received after the authentication request of application program initiation, obtains the test fingerprint of the application program collection, and authentication request is sent to the background server in trusted areas;Receive the challenge fingerprint array of the background server feedback, first between the test fingerprint of calculating and the challenge fingerprint array is not inconsistent into right matrix to send to the background server, second between the reference fingerprint in background server and challenge fingerprint array is not inconsistent right matrix matching, to obtain the authentication result of the test fingerprint, so, when terminal is located at untrusted region, the reference fingerprint that can be stored using cloud database carries out authentication to user, expands the application of the authentication of fingerprint recognition.

Description

A kind of auth method based on fingerprint recognition, device and system
Technical field
The present invention relates to fingerprint identification technology field, more particularly to a kind of authentication side based on fingerprint recognition Method, device and system.
Background technology
Fingerprint recognition, refers to that electronic equipment gathers user fingerprints, by the fingerprint of collection and the fingerprint prestored Template is matched to verify the technology of user identity.Disabled user can be avoided to use electronics by fingerprint recognition Equipment, is referred to as terminal by the electronic equipment with fingerprint identification function below.
Typical fingerprint identification process comprises the following steps:1st, recognized needed for being obtained by fingerprint collecting equipment The image of fingerprint;2nd, the fingerprint image of collection is pre-processed, specifically includes picture quality and judge, scheme Image intensifying, finger-print region detection, fingerprint orientation and frequence estimation, image binaryzation processing, image thinning Deng;3rd, from pretreated fingerprint image, the crestal line data of fingerprint are obtained;4th, from the crestal line number of fingerprint In, the characteristic point needed for the identification that takes the fingerprint takes the fingerprint feature;5th, by the fingerprint characteristic of extraction with Fingerprint characteristic in the reference fingerprint template preserved in database is matched one by one, judges whether identical fingerprints. 6th, complete after fingerprint matching processing, export the result of fingerprint recognition.
The reference fingerprint as matching object that user inputs during fingerprint identification function is configured is nothing What method was cancelled and changed, so the protection of reference fingerprint template needs the strategy for taking security higher.It is actual In, in order to ensure the security of fingerprint recognition, the reference that will be stored in cloud database is not allowed typically Fingerprint is read in equipment, does not also allow the reference fingerprint that equipment itself is stored being sent to high in the clouds, therefore, Fingerprint recognition is mainly used in the trusted areas of untrusted region or in single device.
With the popularization of mobile office, many enterprises provide common moving terminal for employee, for example, bank Clip making machine, to facilitate the outgoing office of employee.These common moving terminals can not possibly be previously stored each employee Reference fingerprint, and when employee go out office leave trusted areas when, the reference stored in cloud database refers to Line can not be transferred to the common moving terminal, therefore, common moving terminal nothing after trusted areas is left Method carries out authentication to user.Under other scenes, in order to improve the security of certification, work as terminal During positioned at untrusted region, do not allow terminal to carry out identity to user using the reference fingerprint being locally stored and test Card, and the reference fingerprint stored in cloud database can not be transferred to the terminal, this again results in the terminal Authentication can not be carried out to user.I.e., in the prior art, when terminal is located at untrusted region, The reference fingerprint that can not be stored using cloud database carries out authentication to user.
The content of the invention
The embodiment of the present invention provides a kind of auth method based on fingerprint recognition, device and system, to solve Certainly in the prior art, when terminal is located at untrusted region, it is impossible to which the reference stored using cloud database is referred to The problem of line carries out authentication to user.
Concrete technical scheme provided in an embodiment of the present invention is as follows:
First aspect there is provided a kind of auth method based on fingerprint recognition, including:
Terminal positioned at untrusted region is received after the authentication request of application program initiation, obtains described The test fingerprint of application program collection;
The terminal sends the authentication request to the background server positioned at trusted areas, the body Part checking request is used for the corresponding authentication result of test fingerprint for obtaining the application program collection;
The terminal receives the challenge fingerprint battle array that the background server is fed back based on the authentication request Row, the challenge fingerprint array includes the N number of challenge fingerprint generated at random;
First between the terminal calculating test fingerprint and the challenge fingerprint array is not inconsistent right matrix, And it is not inconsistent right matrix to background server transmission described first, described first, which is not inconsistent right matrix, is used for The mismatch degree between the test fingerprint and the challenge fingerprint array is described, makes the background server It is not inconsistent right matrix based on described first and returns to the corresponding authentication result of the test fingerprint.
On the basis of first aspect, optionally, the N number of challenge fingerprint generated at random is the backstage N number of fingerprint that server is randomly selected from fingerprint database.
On the basis of first aspect, optionally, the terminal calculates the test fingerprint and referred to the challenge First between line array is not inconsistent right matrix, including:
The terminal obtains M minutiae point in the crestal line of the test fingerprint, and the challenge fingerprint M minutiae point in array in the crestal line of each challenge fingerprint;
The terminal compares M minutiae point and the test fingerprint in the crestal line of each challenge fingerprint successively Crestal line in M minutiae point, obtain in M minutiae point in the crestal line of each challenge fingerprint it is each carefully The corresponding crestal line matching degree of node;
M crestal line matching degree is added and is averaging, obtain each for each challenge fingerprint by the terminal The challenging value of fingerprint is challenged, and
Challenging value based on obtained each challenge fingerprint forms described first and is not inconsistent right matrix.
Second aspect there is provided a kind of auth method based on fingerprint recognition, including:
Being directed to for terminal transmission that background server in trusted areas receives positioned at untrusted region should The authentication request of authentication is carried out with the test fingerprint of programmed acquisition;
Generation includes the challenge fingerprint array of N number of challenge fingerprint to the background server at random;
The background server sends the challenge fingerprint array of the generation to the terminal;
The background server receives the test fingerprint and the challenge fingerprint battle array that the terminal is sent First between row is not inconsistent after right matrix, obtains the reference fingerprint prestored;
The background server calculate respectively between each reference fingerprint and the challenge fingerprint array second not Degree of conformity matrix;
The background server is not inconsistent right matrix based on described first and counted respectively for each reference fingerprint Second calculated is not inconsistent right matrix, it is determined that each matching degree between reference fingerprint and the test fingerprint;
The background server is based on the matching degree between each reference fingerprint and the test fingerprint, to described Terminal returns to the corresponding authentication result of the test fingerprint.
On the basis of second aspect, optionally, the random generation of the background server includes N number of challenge and referred to The challenge fingerprint array of line, including:
The background server randomly selects N number of fingerprint from fingerprint database, and fingerprint array is challenged in generation, The fingerprint database is stored in the background server or is stored in its of the background server connection In his equipment.
On the basis of second aspect, optionally, the background server calculate each reference fingerprint with it is described Second between challenge fingerprint array is not inconsistent right matrix, including:
The background server obtains M minutiae point in the crestal line of each reference fingerprint, and described chooses M minutiae point in war fingerprint array in the crestal line of each challenge fingerprint;
For each reference fingerprint, the background server is compared in the crestal line of each challenge fingerprint successively M minutiae point and M minutiae point in the crestal line of one reference fingerprint, obtain each challenge fingerprint The corresponding crestal line matching degree of each minutiae point in middle M minutiae point;
M crestal line matching degree is added and is averaging, obtained for each challenge fingerprint by the background server One reference fingerprint is formed to the challenging value of each challenge fingerprint, and by the challenging value of each challenge fingerprint Second be not inconsistent right matrix.
On the basis of second aspect, optionally, it is not inconsistent right matrix based on described first and each reference refers to The second of line is not inconsistent right matrix, it is determined that each matching degree between reference fingerprint and the test fingerprint, symbol Close following formula requirements:
Wherein, σ is the matching degree between any one reference fingerprint and test fingerprint, test fingerprint and challenge First between fingerprint array be not inconsistent right matrix for [{ AC1 }, { AC2 }, { AC3 } ... { ACN }], it is described any one Second between reference fingerprint and challenge fingerprint array, which is not inconsistent right matrix, is [{BC1},{BC2},{BC3},...{BCN}]。
On the basis of second aspect, optionally, the background server be based on each reference fingerprint with it is described Matching degree between test fingerprint, the corresponding authentication result of the test fingerprint is returned to the terminal, Including:
The background server judges ginseng based on the matching degree between each reference fingerprint and the test fingerprint Examine and whether there is object reference fingerprint, between the object reference fingerprint and the test fingerprint in fingerprint It is less than predetermined threshold value with degree;
If there is object reference fingerprint, to the terminal return the corresponding authentication of the test fingerprint into Work(;
If in the absence of object reference fingerprint, returning to the corresponding authentication of the test fingerprint to the terminal and losing Lose.
The third aspect there is provided a kind of authentication means based on fingerprint recognition, including:
After collecting unit, the authentication request for receiving application program initiation, the application journey is obtained The test fingerprint of sequence collection;
Transmitting element, for the authentication request to be sent to the background server positioned at trusted areas, The authentication request is used for the corresponding authentication knot of test fingerprint for obtaining the application program collection Really;
Receiving unit, is referred to for receiving the background server based on the challenge that the authentication request is fed back Line array, the challenge fingerprint array includes the N number of challenge fingerprint generated at random;
Processing unit, for calculate first between the test fingerprint and the challenge fingerprint array be not inconsistent it is right Matrix, and it is not inconsistent right matrix to background server transmission described first, described first is not inconsistent right square Battle array is used to describe the mismatch degree between the test fingerprint and the challenge fingerprint array, makes the backstage Server is not inconsistent right matrix based on described first and returns to the corresponding authentication result of the test fingerprint.
In each embodiment of the device of the third aspect for realizing first aspect and first aspect Method.
Fourth aspect there is provided a kind of authentication means based on fingerprint recognition, including:
Receiving unit, the survey gathered for application program that the terminal for receiving positioned at untrusted region is sent Try the authentication request that fingerprint carries out authentication;
Processing unit, includes the challenge fingerprint array of N number of challenge fingerprint for generating at random;
Transmitting element, the challenge fingerprint array for sending the generation to the terminal;
The receiving unit, is additionally operable to receiving the test fingerprint and the challenge that the terminal is sent First between fingerprint array is not inconsistent after right matrix, obtains the reference fingerprint prestored;
The processing unit, is additionally operable to calculate between each reference fingerprint and the challenge fingerprint array respectively Two are not inconsistent right matrix;
It is not inconsistent right matrix based on described first and is not met for each reference fingerprint is calculated respectively second Matrix is spent, it is determined that each matching degree between reference fingerprint and the test fingerprint;
Based on the matching degree between each reference fingerprint and the test fingerprint, by the transmitting element to institute State terminal and return to the corresponding authentication result of the test fingerprint.
In each embodiment of the device of the fourth aspect for realizing second aspect and second aspect Method.
5th aspect includes processor, memory, transmitter and receiver there is provided a kind of terminal, the terminal, Wherein, be stored with computer-readable program in the memory, and the processor is by running the memory In program, control the transmitter and receiver, realize the body based on fingerprint recognition that first aspect is related to Part verification method.
6th aspect includes processor, memory, transceiver there is provided a kind of server, the equipment, wherein, Have computer-readable program in the memory, the processor by running the program in the memory, The transmitter and receiver are controlled, the auth method based on fingerprint recognition that second aspect is related to is realized.
7th aspect includes the first equipment and the second equipment there is provided a kind of communication system, the communication system, its In, first equipment is the terminal that the device that the third aspect is related to or the 5th aspect are related to, and described second sets The server that the standby device being related to for fourth aspect or the 6th aspect are related to.
In authentication scheme provided in an embodiment of the present invention based on fingerprint recognition, positioned at untrusted region Terminal is received after the authentication request of application program initiation, and the test for obtaining the application program collection refers to Line, receives the challenge fingerprint array of background server feedback, by the test fingerprint of calculating and the challenge fingerprint First between array, which is not inconsistent right matrix, sends to the background server, and background server calculates background service Second between reference fingerprint and challenge fingerprint array in device is not inconsistent right matrix, and is not inconsistent right square by first Battle array is not inconsistent right matrix matching with second, to obtain the authentication result of the test fingerprint.Compared to existing There is the scheme in technology, the embodiment of the present invention, when terminal is located at untrusted region, high in the clouds number can be utilized Authentication is carried out to user according to the reference fingerprint of library storage, expands the application of the authentication of fingerprint recognition Scope, it is to avoid the disclosure risk for the reference fingerprint that the test fingerprint of terminal is stored with cloud database, is improved The security of authentication.
Brief description of the drawings
Fig. 1 is the authentication system configuration diagram based on fingerprint recognition of the embodiment of the present invention;
Fig. 2 is the auth method flow chart based on fingerprint recognition in the embodiment of the present invention;
Fig. 3 is the auth method stream based on fingerprint recognition under practical application scene in the embodiment of the present invention Cheng Tu;
Fig. 4 is a kind of structural representation of the authentication means based on fingerprint recognition in the embodiment of the present invention;
Fig. 5 is a kind of structural representation of terminal in the embodiment of the present invention;
Fig. 6 is the structural representation of another authentication means based on fingerprint recognition in the embodiment of the present invention;
Fig. 7 is a kind of structural representation of server in the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is retouched State.
Fig. 1 show the authentication system configuration diagram based on fingerprint recognition of the embodiment of the present invention, institute Stating system includes terminal and background server, and terminal is in untrusted region, background server and is in trusted area Can be set up in domain, between terminal and background server VPN (Virtual Private Network, VPN) tunnel is communicated, can also set up based on safe transmission layer protocol (Transport Layer Security, TLS), the long of SSL (Secure Sockets Layer, SSL) connects to be communicated.
After terminal, the authentication request for receiving application program initiation, obtain the application program and adopt The test fingerprint of collection, and the authentication request is sent to the background server positioned at trusted areas, institute State the corresponding authentication result of test fingerprint that authentication request is used to obtain the application program collection; The challenge fingerprint array that the background server is fed back based on the authentication request is received, the challenge refers to Line array includes the N number of challenge fingerprint generated at random;Calculate the test fingerprint and the challenge fingerprint array Between first be not inconsistent right matrix, and be not inconsistent right matrix by described first and send to the background server, It is described not to be inconsistent right matrix for describing the mismatch between the test fingerprint and the challenge fingerprint array Degree.
Background server, what the terminal for receiving positioned at untrusted region was sent is directed to what application program was gathered Test fingerprint carries out the authentication request of authentication;The challenge that random generation includes N number of challenge fingerprint refers to Line array;The challenge fingerprint array of generation is sent to the terminal;Receive the described of the terminal transmission First between test fingerprint and the challenge fingerprint array is not inconsistent after right matrix, obtains the reference fingerprint prestored; Second between each reference fingerprint and the challenge fingerprint array is calculated respectively is not inconsistent right matrix, and based on institute First is stated not to be inconsistent right matrix and be not inconsistent right matrix for each reference fingerprint is calculated respectively second, it is determined that Each matching degree between reference fingerprint and the test fingerprint;Referred to based on each reference fingerprint with the test Matching degree between line, the corresponding authentication result of the test fingerprint is returned to the terminal.
As shown in fig.2, the embodiment of the present invention provides a kind of auth method based on fingerprint recognition, use In the system shown in Fig. 1.Methods described is specifically included:
Step 20:Terminal is received after the authentication request of application program initiation, obtains the application program The test fingerprint of collection.
Step 21:The terminal sends the authentication request to the background service in trusted areas Device.
The corresponding identity of test fingerprint that the authentication request is used to obtain the application program collection is tested Demonstrate,prove result.
Step 22:Background server is received after the authentication request of terminal transmission, and random generation includes N The challenge fingerprint array of individual random fingerprint.
Wherein, the challenge fingerprint array includes what the background server was randomly selected from fingerprint database N number of challenge fingerprint, the fingerprint database is stored in the background server or is stored in the backstage clothes It is engaged in the other equipment of device connection.The N number of challenge fingerprint generated at random is the background server from fingerprint number According to the N number of fingerprint randomly selected in storehouse.
Step 23:Background server sends the challenge fingerprint array of generation to terminal.
Step 24:Terminal is received after challenge fingerprint array, calculates the test fingerprint and the challenge fingerprint First between array is not inconsistent right matrix.
Specifically, first between the terminal calculating test fingerprint and the challenge fingerprint array does not meet Matrix is spent, is comprised the following steps:
S1:Obtain M minutiae point in the crestal line of the test fingerprint, and the challenge fingerprint array In each challenge fingerprint crestal line in M minutiae point.
S2:The M minutiae point and the ridge of the test fingerprint in the crestal line of each challenge fingerprint are compared successively M minutiae point in line, obtains each minutiae point in M minutiae point in the crestal line of each challenge fingerprint Corresponding crestal line matching degree.
Here S is usedkK-th of details between i-th of challenge fingerprint and test fingerprint in expression challenge fingerprint array The corresponding crestal line matching degree of point, 1≤k≤M.
S3:For each challenge fingerprint, M crestal line matching degree is added and be averaging, each challenge is obtained The challenging value of fingerprint, and the formation of the challenging value based on obtained each challenge fingerprint first is not inconsistent right matrix.
Here represented to challenge the challenging value of i-th of challenge fingerprint in fingerprint array, 1≤i≤N with ACi, and expired Sufficient following equation:
First be not inconsistent right matrix for [{ AC1 }, { AC2 }, { AC3 } ... { ACN }],
Step 25:Terminal sends described first to the background server and is not inconsistent right matrix.
Described first, which is not inconsistent right matrix, is used to describe between the test fingerprint and the challenge fingerprint array Mismatch degree.
Step 26:Background server receives the test fingerprint and the challenge fingerprint that the terminal is sent First between array is not inconsistent after right matrix, obtains the reference fingerprint prestored, each reference fingerprint is calculated respectively Second between the challenge fingerprint array is not inconsistent right matrix.
It should be noted that reference fingerprint is stored in advance in background server, and the background server is also Store the corresponding identity information of each reference fingerprint and authority.
Specifically, second between the background server each reference fingerprint of calculating and the challenge fingerprint array is not inconsistent Right matrix, comprises the following steps:
N1:Obtain M minutiae point in the crestal line of each reference fingerprint, and the challenge fingerprint array In each challenge fingerprint crestal line in M minutiae point.
N2:For each reference fingerprint, the background server compares the crestal line of each challenge fingerprint successively In M minutiae point and one reference fingerprint crestal line in M minutiae point, obtain each challenge The corresponding crestal line matching degree of each minutiae point in fingerprint in M minutiae point.
N3:For each challenge fingerprint, M crestal line matching degree is added and be averaging, each challenge is obtained The challenging value of fingerprint, and the challenging value of each challenge fingerprint is formed the second of one reference fingerprint and is not inconsistent Right matrix.
It should be noted that second between any one reference fingerprint and challenge fingerprint array is not inconsistent right square The computational methods of battle array, first between above-mentioned test fingerprint and challenge fingerprint array is not inconsistent the meter of right matrix Calculation method, it is identical, repeat no more here.
Step 27:Background server is not inconsistent right matrix based on described first and distinguished for each reference fingerprint Second calculated is not inconsistent right matrix, it is determined that each matching degree between reference fingerprint and the test fingerprint.
Be not inconsistent right matrix and each reference fingerprint based on described first second is not inconsistent right matrix, it is determined that often Matching degree between individual reference fingerprint and the test fingerprint, meets following formula requirements:
Wherein, σ is a matching degree between reference fingerprint and test fingerprint, and first, which is not inconsistent right matrix, is [{ AC1 }, { AC2 }, { AC3 } ... { ACN }], the second of a reference fingerprint, which is not inconsistent right matrix, is [{BC1},{BC2},{BC3},...{BCN}]。
Step 28:Background server based on the matching degree between each reference fingerprint and the test fingerprint, to The terminal returns to the corresponding authentication result of the test fingerprint.
Specifically, background server is based on the matching degree between each reference fingerprint and the test fingerprint, to The terminal returns to the corresponding authentication result of the test fingerprint, and detailed process is:
The background server judges ginseng based on the matching degree between each reference fingerprint and the test fingerprint Examine and whether there is object reference fingerprint, between the object reference fingerprint and the test fingerprint in fingerprint It is less than predetermined threshold value with degree;
If there is object reference fingerprint, to the terminal return the corresponding authentication of the test fingerprint into Work(;
If in the absence of object reference fingerprint, returning to the corresponding authentication of the test fingerprint to the terminal and losing Lose.
Illustrate the method shown in Fig. 2 below by a detailed example, as shown in figure 3, including terminal And background server, terminal and background server are set up vpn tunneling by public network and communicated.Wherein, Terminal includes 2 entity modules, is client fingerprint authentication module and finger print identifying trust computing area respectively, Backstage fingerprint authentication module, backstage random fingerprint maker and reference fingerprint template are provided with background server Storehouse.
Wherein, client fingerprint authentication module, the entrance for providing finger print identifying for client application is The finger print identifying that application on client terminals provides application verification interface and is responsible for initiating to apply please Ask.
Finger print identifying trust computing area, is responsible for calculating the challenge fingerprint array and client of background server feedback First is not inconsistent right matrix between the test fingerprint of fingerprint authentication module collection, and obtain first is not met Degree matrix passes the backstage fingerprint authentication module in background server back.Finger print identifying trust computing area is located at terminal Safety zone, the region do not allow it is extraneous arbitrarily access, but can arbitrarily access extraneous region.
Backstage fingerprint authentication module, the service for providing finger print identifying, be responsible for calculate challenge fingerprint array and Second between each reference fingerprint in reference fingerprint template is not inconsistent right matrix, and each ginseng is contrasted one by one Examine the second of fingerprint and be not inconsistent right matrix and first and be not inconsistent difference between right matrix, obtain test fingerprint Actual fingerprint identity, the identity of validation test fingerprint.
Backstage random fingerprint production device, is responsible for random generation challenge fingerprint array, and challenge fingerprint array includes N (N is the positive integer more than 2) individual challenge fingerprint, and terminal is fed back to, challenge fingerprint is the survey of client Try the public reference of the reference fingerprint comparison of fingerprint and background server.
Fingerprint template thesaurus:It is responsible for M reference fingerprint of the storage with identity information, M is positive integer. Specifically, interaction see shown in Fig. 3.
1st, application program initiates the authentication request of currently used person's real name identity, and gathers currently used The test fingerprint of person's input, client fingerprint authentication module is passed to by authentication request and test fingerprint.
2nd, fingerprint authentication module sets up vpn tunneling by public network and background server first, afterwards in VPN Backstage fingerprint authentication module in tunnel to background server goes application to carry out authentication to test fingerprint.
3rd, backstage fingerprint authentication module triggering backstage random fingerprint maker, goes to generate a challenge at random and refers to N number of challenge fingerprint is included in line array C, challenge fingerprint array C.Specifically, random fingerprint maker N number of fingerprint, the fingerprint template in fingerprint template storehouse are randomly selected from a sufficiently large fingerprint template database By outside offer, ATL template data otherness is bigger, and the accuracy of last comparison result is higher.
4th, random fingerprint maker in backstage transfers back to client fingerprint authentication module by fingerprint array C is challenged.
5th, client fingerprint authentication module is challenge fingerprint array C, test fingerprint, and passing to finger print identifying can Letter calculates area, carries out the contrast one by one of test fingerprint and each challenge fingerprint in challenge fingerprint array, obtains First is not inconsistent right matrix:[{AC1},{AC2},{AC3},...{ACN}].
Specifically, using fingerprint matching algorithm during fingerprint comparison, fingerprint matching algorithm uses details point coordinates mould Type does details description, and a secondary fingerprint image is converted into a plane point set being made up of minutiae point by it, Identify that fingerprint passes through carefully with both key points of crestal line branch point using crestal line tip (or being end points) Node is expressed as dot pattern, and finger print identifying is converted into a Point Pattern Matching (details description) automatically.
OrderM minutiae point in the crestal line of test fingerprint is represented,Represent M details of a challenge fingerprint in challenge fingerprint array Point.Minutiae point is relatively required transformation into polar coordinate system, be in template details point set and input details point set In respectively select a reference point as the origin in corresponding polar coordinate system, and calculate other details point relative to ginseng According to the polar coordinates of point.
Represent M details in the crestal line of test fingerprint under polar coordinates Point,Represent N number of in the crestal line of the next challenge fingerprint of polar coordinates Minutiae point.WhereinWithRepresent corresponding polar radius, polar angle and relative to reference point Minutiae Direction.
Based on existing minutiae point alignment algorithm, by the radius put under polar coordinates, angle, the comparison in direction, Crestal line matching degree (matching fraction) is obtained, S is recorded ask, obtained after all minutiae points of test fingerprint One group of matching fraction, [S1,S2,…,SM], the crestal line matching degree of M minutiae point is added and is averaging, one is obtained The challenging value of individual challenge fingerprint.
Wherein, 0<ACi<100, all challenge fingerprints and test fingerprint obtain first after comparing and are not inconsistent right square Battle array [{ AC1 }, { AC2 }, { AC3 } ... { ACN }].
It should be noted that challenging value is bigger, illustrate that test fingerprint and challenge fingerprint are more dissimilar.
6th, finger print identifying trust computing area is not inconsistent right matrix by obtain first and passes client finger print identifying back Module.
7th, client fingerprint authentication module is not inconsistent right matrix by first and passes backstage fingerprint authentication module back.
8th, backstage fingerprint authentication module reads all reference fingerprints of storage from reference fingerprint ATL, according to Secondary and challenge fingerprint array C is compared, obtain second be not inconsistent right matrix [{ BC1 }, { BC2 }, { BC3 } ... { BCN }], Further, the second of each reference fingerprint is contrasted successively be not inconsistent right matrix and first do not meet matrix and obtain Each the matching degree between reference fingerprint and test fingerprint, obtains the true identity the result of test fingerprint.
Each the matching degree between reference fingerprint and the test fingerprint meets following formula:
Wherein, σ is a matching degree between reference fingerprint and test fingerprint.
Because the first challenging value for not being inconsistent right matrix and the second each element not being inconsistent in right matrix is Between 0~100, i.e., 0<ACi<100,0<BCi<100, the matching degree difference of two matrix correspondence positions is less than 5% (BCi-ACi<5), it is believed that the Point matching, all Point matching results, if respectively less than 5%, judging should The match is successful with test fingerprint for reference fingerprint, and authentication result is is verified, optionally, moreover it is possible to inquire about To the corresponding identity information of the reference fingerprint.
9th, backstage fingerprint authentication module returns to the corresponding identity of test fingerprint to client identity authentication module and tested Demonstrate,prove result.
10th, the corresponding authentication result of test fingerprint is returned to corresponding answer by client identity authentication module Use program.
The auth method based on fingerprint recognition provided based on above-described embodiment, the embodiment of the present invention is provided A kind of authentication means 400 based on fingerprint recognition, the device can be used for performing above-mentioned Fig. 2 and Fig. 3 The implementation procedure of terminal in described method, wherein, described device 400 can be terminal or be installed on institute The device in terminal is stated, Fig. 4 show the structural representation of device 400 provided in an embodiment of the present invention, such as Shown in Fig. 4, the device 400 includes collecting unit 401, transmitting element 402, receiving unit 403 and place Unit 404 is managed, wherein:
After collecting unit 401, the authentication request for receiving application program initiation, described answer is obtained With the test fingerprint of programmed acquisition;
Transmitting element 402, for the authentication request to be sent to the background service positioned at trusted areas Device, the authentication request is used for the corresponding authentication of test fingerprint for obtaining the application program collection As a result;
Receiving unit 403, for receiving the background server based on choosing that the authentication request is fed back War fingerprint array, the challenge fingerprint array includes the N number of challenge fingerprint generated at random;
Processing unit 404, is not inconsistent for calculating first between the test fingerprint and the challenge fingerprint array Right matrix, and it is not inconsistent right matrix to background server transmission described first, described first does not meet Degree matrix is used to describe the mismatch degree between the test fingerprint and the challenge fingerprint array, makes described Background server is not inconsistent right matrix based on described first and returns to the corresponding authentication knot of the test fingerprint Really.
Optionally, the N number of challenge fingerprint generated at random is the background server from fingerprint database The N number of fingerprint randomly selected.
Optionally, the processing unit 404 is being calculated between the test fingerprint and the challenge fingerprint array First when not being inconsistent right matrix, specifically for:
Obtain every in M minutiae point in the crestal line of the test fingerprint, and the challenge fingerprint array M minutiae point in the crestal line of individual challenge fingerprint;
Compare successively in M minutiae point in the crestal line of each challenge fingerprint and the crestal line of the test fingerprint M minutiae point, obtain in M minutiae point in the crestal line of each challenge fingerprint each minutiae point correspondingly Crestal line matching degree;
For each challenge fingerprint, M crestal line matching degree is added and be averaging, obtain each challenge fingerprint Challenging value, and
Challenging value based on obtained each challenge fingerprint forms described first and is not inconsistent right matrix.
The above-mentioned device 400 being related to of the embodiment of the present invention can be independent part or be integrated in In miscellaneous part.
It should be noted that the function of the unit of device 400 in the embodiment of the present invention is realized and handed over Mutual mode can with further reference to related method embodiment description, will not be repeated here.
Fig. 5 is referred to, based on same inventive concept, the embodiment of the present invention also provides a kind of based on fingerprint recognition Identity-validation device 500, the equipment 500 can be used for performing terminal in the method described in above-mentioned Fig. 2 and Fig. 3 Function, as shown in figure 5, equipment 500 includes memory 501, processor 502, the and of receiver 503 Transmitter 504.The program code for performing the present invention program is stored in memory 501, and by processor 502 To control to perform.
The program stored in memory 501 performs the identity based on fingerprint recognition for instruction processing unit 502 and tested Card method, including:Received after the authentication request that application program is initiated, obtained by receiver 503 The test fingerprint of the application program collection;The authentication request is sent by the transmitter 504 To the background server for being located at trusted areas, the authentication request is used to obtain the application program collection The corresponding authentication result of test fingerprint;The background server base is received by the receiver 503 The challenge fingerprint array fed back in the authentication request, the challenge fingerprint array includes what is generated at random N number of challenge fingerprint;First calculated between the test fingerprint and the challenge fingerprint array is not inconsistent right matrix, And it is not inconsistent right matrix to background server transmission described first, described first, which is not inconsistent right matrix, is used for The mismatch degree between the test fingerprint and the challenge fingerprint array is described, makes the background server It is not inconsistent right matrix based on described first and returns to the corresponding authentication result of the test fingerprint.
The background server can be the server shown in device or Fig. 7 shown in Fig. 6.
Wherein, processor 502 can be central processing unit (CPU) or ASIC (English: Application-specific integrated circuit, referred to as:ASIC), can be it is one or more be used for control The integrated circuit that processing procedure sequence is performed, can use field programmable gate array (field programmable Gate array, FPGA) exploitation hardware circuit, can be baseband chip.
The quantity of memory 501 can be one or more.Memory 501 can include read-only storage (English Text:Read-only memory, referred to as:ROM), random access memory (English:random access Memory, referred to as:) and magnetic disk storage RAM.
Receiver 503 can be used for being communicated with external equipment, for example receiver 503 can with base station, The equipment such as background server are communicated.
Transmitter 504, can be used for being communicated with external equipment, and for example transmitter 504 can also be with base Stand, the equipment such as background server is communicated.
Transmitter 504 and receiver 503 can be same entity modules, for example, can be that by transmitting-receiving The entity module of function, such as be properly termed as transceiver, or transmitter 504 and receiver 503 can also It is single entity module.
Memory 501, transmitter 504 and receiver 503 can be connected by bus with processor 502, Or can also be connected respectively with processor 502 by special connecting line.
By being designed programming to processor 502, the code corresponding to method illustrated above is cured to In chip, so that chip is operationally able to carry out the method shown in Fig. 2 and Fig. 3.
It is understood that the equipment 500 of the present embodiment, which can be used for realizing in above method embodiment, is related to end The institute at end is functional, and it implements the associated description that process is referred to above method embodiment, herein not Repeat again.
The auth method based on fingerprint recognition provided based on above-described embodiment, the embodiment of the present invention is provided A kind of authentication means 600 based on fingerprint recognition, the device can be used for performing above-mentioned Fig. 2 and Fig. 3 The implementation procedure of background server in described method, Fig. 6 show device provided in an embodiment of the present invention 600 structural representation, as shown in fig. 6, the device 600 include receiving unit 601, processing unit 602, Transmitting element 603, wherein:
Receiving unit 601, what the terminal for receiving positioned at untrusted region was sent gathers for application program Test fingerprint carry out authentication authentication request;
Processing unit 602, includes the challenge fingerprint array of N number of challenge fingerprint for generating at random;
Transmitting element 603, the challenge fingerprint array for sending the generation to the terminal;
The receiving unit 601, be additionally operable to receive the test fingerprint that the terminal sends with it is described First between challenge fingerprint array is not inconsistent after right matrix, obtains the reference fingerprint prestored;
The processing unit 602, is additionally operable to calculate respectively between each reference fingerprint and the challenge fingerprint array Second be not inconsistent right matrix;
It is not inconsistent right matrix based on described first and is not met for each reference fingerprint is calculated respectively second Matrix is spent, it is determined that each matching degree between reference fingerprint and the test fingerprint;
Based on the matching degree between each reference fingerprint and the test fingerprint, pass through the transmitting element 603 The corresponding authentication result of the test fingerprint is returned to the terminal.
Optionally, the processing unit 602 includes the challenge fingerprint array of N number of challenge fingerprint in random generation When, specifically for:
N number of fingerprint, generation challenge fingerprint array, the fingerprint database are randomly selected from fingerprint database In the other equipment for storing in said device or being stored in described device connection.
Optionally, the processing unit 602 is being calculated between each reference fingerprint and the challenge fingerprint array Second when not being inconsistent right matrix, specifically for:
Obtain every in M minutiae point in the crestal line of each reference fingerprint, and the challenge fingerprint array M minutiae point in the crestal line of individual challenge fingerprint;
For each reference fingerprint, compare successively M minutiae point in the crestal line of each challenge fingerprint and M minutiae point in the crestal line of one reference fingerprint, obtains M minutiae point in each challenge fingerprint In the corresponding crestal line matching degree of each minutiae point;
For each challenge fingerprint, M crestal line matching degree is added and be averaging, obtain each challenge fingerprint Challenging value, and by it is each challenge fingerprint challenging value formed the second of one reference fingerprint be not inconsistent it is right Matrix.
Optionally, the processing unit 602 be not inconsistent right matrix and each reference fingerprint based on described first Second be not inconsistent right matrix, it is determined that during each matching degree between reference fingerprint and the test fingerprint, symbol Close following formula requirements:
Wherein, σ is the matching degree between any one reference fingerprint and test fingerprint, test fingerprint and challenge First between fingerprint array be not inconsistent right matrix for [{ AC1 }, { AC2 }, { AC3 } ... { ACN }], it is described any one Second between reference fingerprint and challenge fingerprint array, which is not inconsistent right matrix, is [{BC1},{BC2},{BC3},...{BCN}]。
Optionally, the processing unit 602 is based between each reference fingerprint and the test fingerprint With degree, during authentication result corresponding to the terminal return test fingerprint, specifically for:
Based on the matching degree between each reference fingerprint and the test fingerprint, judge whether deposited in reference fingerprint Matching degree between object reference fingerprint, the object reference fingerprint and the test fingerprint is less than default threshold Value;
If there is object reference fingerprint, to the terminal return the corresponding authentication of the test fingerprint into Work(;
If in the absence of object reference fingerprint, returning to the corresponding authentication of the test fingerprint to the terminal and losing Lose.
The above-mentioned device 600 being related to of the embodiment of the present invention, can be independent part, can also be integrated in it In his part.
It should be noted that the function of the unit of device 600 in the embodiment of the present invention is realized and handed over Mutual mode can with further reference to related method embodiment description, will not be repeated here.
Fig. 7 is referred to, based on same inventive concept, the embodiment of the present invention also provides a kind of server 700, should Server 700 can be used for the operation for performing background server in the method described in above-mentioned Fig. 2 and Fig. 3, such as Fig. 7 Shown, server 700 includes memory 701, processor 702, receiver 703 and transmitter 704. The program code for performing the present invention program is stored in memory 701, and is controlled by processor 702 to perform.
The program stored in memory 701 performs the identity based on fingerprint recognition for instruction processing unit 702 and tested Card method, including:Being directed to for terminal transmission received by receiver 703 positioned at untrusted region applies journey The test fingerprint of sequence collection carries out the authentication request of authentication;Random generation includes N number of challenge fingerprint Challenge fingerprint array;The challenge fingerprint battle array of the generation is sent to the terminal by the transmitter 704 Row;The test fingerprint and the challenge fingerprint battle array that the terminal is sent are being received by receiver 703 First between row is not inconsistent after right matrix, obtains the reference fingerprint prestored;Calculate respectively each reference fingerprint with Second between the challenge fingerprint array is not inconsistent right matrix;It is not inconsistent right matrix based on described first and is directed to What each reference fingerprint was calculated respectively second is not inconsistent right matrix, it is determined that each reference fingerprint refers to described test Matching degree between line;Based on the matching degree between each reference fingerprint and the test fingerprint, by described Transmitter 704 returns to the corresponding authentication result of the test fingerprint to the terminal.
The terminal can be the terminal shown in device or Fig. 5 shown in Fig. 4.
Wherein, processor 702 can be CPU or ASIC, can be it is one or more be used for control program The integrated circuit of execution, can be the hardware circuit developed using on-site programmable gate array FPGA, can be with It is baseband chip.
The quantity of memory 701 can be one or more.Memory 701 can include read-only storage ROM, RAM and magnetic disk storage.
Receiver 703 and transmitter 704 can be used for being communicated with external equipment, for example receiver 703 It can be communicated with transmitter 704 with terminal.
Transmitter 704 and receiver 703 can be same entity modules, for example, can be that by transmitting-receiving The entity module of function, such as be properly termed as transceiver, or transmitter 704 and receiver 703 can also It is single entity module.
Memory 701, transmitter 704 and receiver 703 can be connected by bus with processor 702, Or can also be connected respectively with processor 702 by special connecting line.
By being designed programming to processor 702, the code corresponding to method illustrated above is cured to In chip, so that chip is operationally able to carry out the operation of background server in Fig. 2 and Fig. 3.
It is understood that the equipment 700 of the present embodiment can be used for after realizing and being related in above method embodiment The institute of platform server is functional, and it implements the associated description that process is referred to above method embodiment, Here is omitted.
In summary, in the embodiment of the present invention, the terminal positioned at untrusted region receives application program initiation Authentication request after, obtain the test fingerprint of application program collection, and please by the authentication Seek the background server sent to being located in trusted areas;The background server is received to test based on the identity The challenge fingerprint array of card request feedback, the challenge fingerprint array includes the N number of fingerprint generated at random;Meter Calculate first between the test fingerprint and the challenge fingerprint array and be not inconsistent right matrix, and by described first not Degree of conformity matrix is sent to the background server, and described first, which is not inconsistent right matrix, is used to describe the test Mismatch degree between fingerprint and the challenge fingerprint array, the background server receives the terminal First between the test fingerprint and the challenge fingerprint array that calculate and send is not inconsistent after right matrix, obtains Take the reference fingerprint prestored;Second calculated respectively between each reference fingerprint and the challenge fingerprint array is not inconsistent Right matrix, and second for not being inconsistent right matrix based on described first and being calculated respectively for each reference fingerprint Right matrix is not inconsistent, it is determined that each matching degree between reference fingerprint and the test fingerprint;Based on each ginseng The matching degree between fingerprint and the test fingerprint is examined, the corresponding body of the test fingerprint is returned to the terminal Part the result, so, when terminal is located at untrusted region, and needs to carry out user's real name authentication In the case of, by the way that in terminal collecting test fingerprint, the challenge fingerprint array generated by background server is obtained It is not inconsistent right matrix to first between test fingerprint and challenge fingerprint array and is sent to the background server, Second between the background server each reference fingerprint of calculating and the challenge fingerprint array is not inconsistent right matrix, and It is not inconsistent right matrix and second by judging first and is not inconsistent the otherness of right matrix, obtains test fingerprint correspondence Authentication result, it is to avoid the disclosure risk of the test fingerprint of terminal collection, it also avoid background service The disclosure risk of the reference fingerprint stored in device, additionally it is possible to which the reference fingerprint stored using cloud database is to making User carries out authentication, it is ensured that on the premise of security, expands the application of the authentication of fingerprint.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or meter Calculation machine program product.Therefore, the present invention can be using complete hardware embodiment, complete software embodiment or knot The form of embodiment in terms of conjunction software and hardware.Wherein wrapped one or more moreover, the present invention can be used The computer program product implemented in computer-usable storage medium containing computer readable program code Form.
The present invention is with reference to the production of method according to embodiments of the present invention, equipment (system) and computer program The flow chart and/or block diagram of product is described.It should be understood that can by computer program instructions implementation process figure and / or each flow and/or square frame in block diagram and the flow in flow chart and/or block diagram and/ Or the combination of square frame.These computer program instructions can be provided to all-purpose computer, special-purpose computer, insertion Formula processor or the processor of other programmable data processing devices are to produce a machine so that pass through and calculate The instruction of the computing device of machine or other programmable data processing devices is produced for realizing in flow chart one The device for the function of being specified in individual flow or multiple flows and/or one square frame of block diagram or multiple square frames.
Obviously, those skilled in the art can carry out various changes and modification without de- to the embodiment of the present invention From the spirit and scope of the embodiment of the present invention.So, if these modifications and variations category of the embodiment of the present invention Within the scope of the claims in the present invention and its equivalent technologies, then the present invention be also intended to comprising these change and Including modification.

Claims (17)

1. a kind of auth method based on fingerprint recognition, it is characterised in that including:
Terminal positioned at untrusted region is received after the authentication request of application program initiation, obtains described The test fingerprint of application program collection;
The terminal sends the authentication request to the background server positioned at trusted areas, the body Part checking request is used for the corresponding authentication result of test fingerprint for obtaining the application program collection;
The terminal receives the challenge fingerprint battle array that the background server is fed back based on the authentication request Row, the challenge fingerprint array includes the N number of challenge fingerprint generated at random;
First between the terminal calculating test fingerprint and the challenge fingerprint array is not inconsistent right matrix, And it is not inconsistent right matrix to background server transmission described first, described first, which is not inconsistent right matrix, is used for The mismatch degree between the test fingerprint and the challenge fingerprint array is described, makes the background server It is not inconsistent right matrix based on described first and returns to the corresponding authentication result of the test fingerprint.
2. the method as described in claim 1, it is characterised in that the N number of challenge generated at random refers to Line is N number of fingerprint that the background server is randomly selected from fingerprint database.
3. method as claimed in claim 1 or 2, it is characterised in that the terminal calculates the test First between fingerprint and the challenge fingerprint array is not inconsistent right matrix, including:
The terminal obtains M minutiae point in the crestal line of the test fingerprint, and the challenge fingerprint M minutiae point in array in the crestal line of each challenge fingerprint;
The terminal compares M minutiae point and the test fingerprint in the crestal line of each challenge fingerprint successively Crestal line in M minutiae point, obtain in M minutiae point in the crestal line of each challenge fingerprint it is each carefully The corresponding crestal line matching degree of node;
M crestal line matching degree is added and is averaging, obtain each for each challenge fingerprint by the terminal The challenging value of fingerprint is challenged, and
Challenging value based on obtained each challenge fingerprint forms described first and is not inconsistent right matrix.
4. a kind of auth method based on fingerprint recognition, it is characterised in that including:
Being directed to for terminal transmission that background server in trusted areas receives positioned at untrusted region should The authentication request of authentication is carried out with the test fingerprint of programmed acquisition;
Generation includes the challenge fingerprint array of N number of challenge fingerprint to the background server at random;
The background server sends the challenge fingerprint array of the generation to the terminal;
The background server receives the test fingerprint and the challenge fingerprint battle array that the terminal is sent First between row is not inconsistent after right matrix, obtains the reference fingerprint prestored;
The background server calculate respectively between each reference fingerprint and the challenge fingerprint array second not Degree of conformity matrix;
The background server is not inconsistent right matrix based on described first and counted respectively for each reference fingerprint Second calculated is not inconsistent right matrix, it is determined that each matching degree between reference fingerprint and the test fingerprint;
The background server is based on the matching degree between each reference fingerprint and the test fingerprint, to described Terminal returns to the corresponding authentication result of the test fingerprint.
5. method as claimed in claim 4, it is characterised in that the background server generates bag at random The challenge fingerprint array of N number of challenge fingerprint is included, including:
The background server randomly selects N number of fingerprint from fingerprint database, and fingerprint array is challenged in generation, The fingerprint database is stored in the background server or is stored in its of the background server connection In his equipment.
6. the method as described in claim 4 or 5, it is characterised in that the background server calculates every Second between individual reference fingerprint and the challenge fingerprint array is not inconsistent right matrix, including:
The background server obtains M minutiae point in the crestal line of each reference fingerprint, and described chooses M minutiae point in war fingerprint array in the crestal line of each challenge fingerprint;
For each reference fingerprint, the background server is compared in the crestal line of each challenge fingerprint successively M minutiae point and M minutiae point in the crestal line of one reference fingerprint, obtain each challenge fingerprint The corresponding crestal line matching degree of each minutiae point in middle M minutiae point;
M crestal line matching degree is added and is averaging, obtained for each challenge fingerprint by the background server One reference fingerprint is formed to the challenging value of each challenge fingerprint, and by the challenging value of each challenge fingerprint Second be not inconsistent right matrix.
7. the method as described in any one in claim 4-6, it is characterised in that based on described first Be not inconsistent right matrix and each reference fingerprint second is not inconsistent right matrix, it is determined that each reference fingerprint with it is described Matching degree between test fingerprint, meets following formula requirements:
<mrow> <mi>&amp;sigma;</mi> <mo>=</mo> <mrow> <mo>(</mo> <munderover> <mo>&amp;Sigma;</mo> <mrow> <mi>i</mi> <mo>=</mo> <mn>0</mn> </mrow> <mi>N</mi> </munderover> <mi>f</mi> <mi>l</mi> <mi>o</mi> <mi>o</mi> <mi>r</mi> <mo>(</mo> <mfrac> <mrow> <mi>B</mi> <mi>C</mi> <mi>i</mi> <mo>-</mo> <mi>A</mi> <mi>C</mi> <mi>i</mi> </mrow> <mi>N</mi> </mfrac> <mo>)</mo> <mo>)</mo> </mrow> <mi>%</mi> <mo>,</mo> <mn>1</mn> <mo>&amp;le;</mo> <mi>i</mi> <mo>&amp;le;</mo> <mi>N</mi> </mrow>
Wherein, σ is the matching degree between any one reference fingerprint and test fingerprint, test fingerprint and challenge First between fingerprint array be not inconsistent right matrix for [{ AC1 }, { AC2 }, { AC3 } ... { ACN }], it is described any one Second between reference fingerprint and challenge fingerprint array, which is not inconsistent right matrix, is [{BC1},{BC2},{BC3},...{BCN}]。
8. the method as described in any one in claim 4-7, it is characterised in that the background service Device returns to the test based on the matching degree between each reference fingerprint and the test fingerprint to the terminal The corresponding authentication result of fingerprint, including:
The background server judges ginseng based on the matching degree between each reference fingerprint and the test fingerprint Examine and whether there is object reference fingerprint, between the object reference fingerprint and the test fingerprint in fingerprint It is less than predetermined threshold value with degree;
If there is object reference fingerprint, to the terminal return the corresponding authentication of the test fingerprint into Work(;
If in the absence of object reference fingerprint, returning to the corresponding authentication of the test fingerprint to the terminal and losing Lose.
9. a kind of authentication means based on fingerprint recognition, it is characterised in that including:
After collecting unit, the authentication request for receiving application program initiation, the application journey is obtained The test fingerprint of sequence collection;
Transmitting element, for the authentication request to be sent to the background server positioned at trusted areas, The authentication request is used for the corresponding authentication knot of test fingerprint for obtaining the application program collection Really;
Receiving unit, is referred to for receiving the background server based on the challenge that the authentication request is fed back Line array, the challenge fingerprint array includes the N number of challenge fingerprint generated at random;
Processing unit, for calculate first between the test fingerprint and the challenge fingerprint array be not inconsistent it is right Matrix, and it is not inconsistent right matrix to background server transmission described first, described first is not inconsistent right square Battle array is used to describe the mismatch degree between the test fingerprint and the challenge fingerprint array, makes the backstage Server is not inconsistent right matrix based on described first and returns to the corresponding authentication result of the test fingerprint.
10. device as claimed in claim 9, it is characterised in that the N number of challenge generated at random refers to Line is N number of fingerprint that the background server is randomly selected from fingerprint database.
11. the device as described in claim 9 or 10, it is characterised in that the processing unit is being calculated First between the test fingerprint and the challenge fingerprint array when not being inconsistent right matrix, specifically for:
Obtain every in M minutiae point in the crestal line of the test fingerprint, and the challenge fingerprint array M minutiae point in the crestal line of individual challenge fingerprint;
Compare successively in M minutiae point in the crestal line of each challenge fingerprint and the crestal line of the test fingerprint M minutiae point, obtain in M minutiae point in the crestal line of each challenge fingerprint each minutiae point correspondingly Crestal line matching degree;
For each challenge fingerprint, M crestal line matching degree is added and be averaging, obtain each challenge fingerprint Challenging value, and
Challenging value based on obtained each challenge fingerprint forms described first and is not inconsistent right matrix.
12. a kind of authentication means based on fingerprint recognition, it is characterised in that including:
Receiving unit, the survey gathered for application program that the terminal for receiving positioned at untrusted region is sent Try the authentication request that fingerprint carries out authentication;
Processing unit, includes the challenge fingerprint array of N number of challenge fingerprint for generating at random;
Transmitting element, the challenge fingerprint array for sending the generation to the terminal;
The receiving unit, is additionally operable to receiving the test fingerprint and the challenge that the terminal is sent First between fingerprint array is not inconsistent after right matrix, obtains the reference fingerprint prestored;
The processing unit, is additionally operable to calculate between each reference fingerprint and the challenge fingerprint array respectively Two are not inconsistent right matrix;
It is not inconsistent right matrix based on described first and is not met for each reference fingerprint is calculated respectively second Matrix is spent, it is determined that each matching degree between reference fingerprint and the test fingerprint;
Based on the matching degree between each reference fingerprint and the test fingerprint, by the transmitting element to institute State terminal and return to the corresponding authentication result of the test fingerprint.
13. device as claimed in claim 12, it is characterised in that the processing unit is being generated at random Including it is N number of challenge fingerprint challenge fingerprint array when, specifically for:
N number of fingerprint, generation challenge fingerprint array, the fingerprint database are randomly selected from fingerprint database In the other equipment for storing in said device or being stored in described device connection.
14. the device as described in claim 12 or 13, it is characterised in that the processing unit is being calculated When each second between reference fingerprint and the challenge fingerprint array is not inconsistent right matrix, specifically for:
Obtain every in M minutiae point in the crestal line of each reference fingerprint, and the challenge fingerprint array M minutiae point in the crestal line of individual challenge fingerprint;
For each reference fingerprint, compare successively M minutiae point in the crestal line of each challenge fingerprint and M minutiae point in the crestal line of one reference fingerprint, obtains M minutiae point in each challenge fingerprint In the corresponding crestal line matching degree of each minutiae point;
For each challenge fingerprint, M crestal line matching degree is added and be averaging, obtain each challenge fingerprint Challenging value, and by it is each challenge fingerprint challenging value formed the second of one reference fingerprint be not inconsistent it is right Matrix.
15. the device as described in any one in claim 12-14, it is characterised in that the processing list Member is not inconsistent right matrix not being inconsistent the second of right matrix and each reference fingerprint based on described first, it is determined that often During matching degree between individual reference fingerprint and the test fingerprint, meet following formula requirements:
<mrow> <mi>&amp;sigma;</mi> <mo>=</mo> <mrow> <mo>(</mo> <munderover> <mo>&amp;Sigma;</mo> <mrow> <mi>i</mi> <mo>=</mo> <mn>0</mn> </mrow> <mi>N</mi> </munderover> <mi>f</mi> <mi>l</mi> <mi>o</mi> <mi>o</mi> <mi>r</mi> <mo>(</mo> <mfrac> <mrow> <mi>B</mi> <mi>C</mi> <mi>i</mi> <mo>-</mo> <mi>A</mi> <mi>C</mi> <mi>i</mi> </mrow> <mi>N</mi> </mfrac> <mo>)</mo> <mo>)</mo> </mrow> <mi>%</mi> <mo>,</mo> <mn>1</mn> <mo>&amp;le;</mo> <mi>i</mi> <mo>&amp;le;</mo> <mi>N</mi> </mrow>
Wherein, σ is the matching degree between any one reference fingerprint and test fingerprint, test fingerprint and challenge First between fingerprint array be not inconsistent right matrix for [{ AC1 }, { AC2 }, { AC3 } ... { ACN }], it is described any one Second between reference fingerprint and challenge fingerprint array, which is not inconsistent right matrix, is [{BC1},{BC2},{BC3},...{BCN}]。
16. the device as described in any one in claim 12-15, it is characterised in that the processing list Member returns to described survey based on the matching degree between each reference fingerprint and the test fingerprint to the terminal When trying the corresponding authentication result of fingerprint, specifically for:
Based on the matching degree between each reference fingerprint and the test fingerprint, judge whether deposited in reference fingerprint Matching degree between object reference fingerprint, the object reference fingerprint and the test fingerprint is less than default threshold Value;
If there is object reference fingerprint, to the terminal return the corresponding authentication of the test fingerprint into Work(;
If in the absence of object reference fingerprint, returning to the corresponding authentication of the test fingerprint to the terminal and losing Lose.
17. a kind of authentication system based on fingerprint recognition, it is characterised in that including such as claim 9-11 Described device and the device as described in claim 12-16.
CN201610188632.4A 2016-03-29 2016-03-29 Identity verification method, device and system based on fingerprint identification Active CN107239683B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610188632.4A CN107239683B (en) 2016-03-29 2016-03-29 Identity verification method, device and system based on fingerprint identification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610188632.4A CN107239683B (en) 2016-03-29 2016-03-29 Identity verification method, device and system based on fingerprint identification

Publications (2)

Publication Number Publication Date
CN107239683A true CN107239683A (en) 2017-10-10
CN107239683B CN107239683B (en) 2020-09-25

Family

ID=59983364

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610188632.4A Active CN107239683B (en) 2016-03-29 2016-03-29 Identity verification method, device and system based on fingerprint identification

Country Status (1)

Country Link
CN (1) CN107239683B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101150407A (en) * 2007-10-25 2008-03-26 王松 Network identity validation method based on fingerprint
US20140108441A1 (en) * 2012-10-15 2014-04-17 Juked, Inc. Efficient matching of data
CN103745147A (en) * 2013-12-30 2014-04-23 华为技术有限公司 System mode starting method and application program starting method and device
CN104573651B (en) * 2014-12-31 2018-02-13 北京天诚盛业科技有限公司 Fingerprint identification method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101150407A (en) * 2007-10-25 2008-03-26 王松 Network identity validation method based on fingerprint
US20140108441A1 (en) * 2012-10-15 2014-04-17 Juked, Inc. Efficient matching of data
CN103745147A (en) * 2013-12-30 2014-04-23 华为技术有限公司 System mode starting method and application program starting method and device
CN104573651B (en) * 2014-12-31 2018-02-13 北京天诚盛业科技有限公司 Fingerprint identification method and device

Also Published As

Publication number Publication date
CN107239683B (en) 2020-09-25

Similar Documents

Publication Publication Date Title
CN105763521B (en) A kind of device authentication method and device
TW202011242A (en) Blockchain cross-chain authentication method and system, and server and readable storage medium
CN106411950B (en) Authentication method, apparatus and system based on block chain transaction id
CN104392534B (en) Electronic voting method and device based on finger vein feature recognition
CN109542796A (en) Test method and Related product
CN108351932A (en) CAPTCHA challenges based on image
CN107231234A (en) A kind of identity registration method and device
CN106779716A (en) Authentication method, apparatus and system based on block chain account address
CN105262733B (en) A kind of fingerprint method for authenticating, cloud server, fingerprint identification method and terminal
CN108632259A (en) A kind of mist calculate node device authentication system and method based on block chain
CN104967553B (en) Method for message interaction and relevant apparatus and communication system
US10490001B2 (en) Process for verification of an access right of an individual
CN106576046A (en) System and device binding metadata with hardware intrinsic properties
CN108491709A (en) The method and apparatus of permission for identification
CN109446772A (en) Accrediting amount calculation method, device, computer equipment and storage medium
CN105550928A (en) System and method of network remote account opening for commercial bank
CN106572082A (en) Approval signature verifying method, mobile device, terminal device and system
CN110611647A (en) Node joining method and device on block chain system
CN104270253A (en) Method, devices and system for user identity authentication
CN104486306B (en) Identity authentication method is carried out based on finger hand vein recognition and cloud service
CN106470200A (en) A kind of auth method and relevant apparatus
CN108400989A (en) A kind of safety certificate equipment of shared resource authentication, method and system
CN108540447A (en) A kind of certification authentication method and system based on block chain
CN107483208A (en) Generation, verification method and the device of identifying code picture
CN108833445A (en) A kind of authentication method and device suitable for Internet of things system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant