CN108764897A - A kind of mobile-payment system and method based on fingerprint IRLRD feature encryptions - Google Patents
A kind of mobile-payment system and method based on fingerprint IRLRD feature encryptions Download PDFInfo
- Publication number
- CN108764897A CN108764897A CN201810468697.3A CN201810468697A CN108764897A CN 108764897 A CN108764897 A CN 108764897A CN 201810468697 A CN201810468697 A CN 201810468697A CN 108764897 A CN108764897 A CN 108764897A
- Authority
- CN
- China
- Prior art keywords
- fingerprint
- irlrd
- feature
- mobile
- random
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3674—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3825—Use of electronic signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
- G06Q20/40145—Biometric identity checks
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- Finance (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention discloses a kind of mobile-payment systems and method of mobile payment based on fingerprint IRLRD feature encryption methods.The mobile-payment system, including ARM control modules, data memory module, fingerprint collecting circuit, human-computer interaction circuit, communication interface circuit, relay control output circuit and the power circuit for foregoing circuit power supply.ARM control modules are by ARM fingerprint IRLRD feature encryptions, realizing the authentication of fingerprint IRLRD feature encryptions.The present invention has the following advantages compared with prior art:The mobile-payment system of the present invention; it obtains the fingerprint image of user and the IRLRD features that take the fingerprint is as key; the Secure Transaction for completing mobile payment is protected by Multi Identity Attestation; it prevents payment information hacked and destroys; prevent payment information in mobile payment the security crises such as to be tampered, reveal or fake, ensures the orderly progress of mobile payment.
Description
The present invention is application for a patent for invention number:2015101916255, the applying date:On April 21st, 2015, denomination of invention:Refer to
The divisional application of line IRLRD feature encryptions method and mobile-payment system and method based on this method.
Technical field
The present invention relates to fingerprint characteristic encryption technology fields, more particularly to one kind being based on fingerprint IRLRD feature encryptions
Mobile-payment system and method and method of mobile payment.
Background technology
Important link of the mobile payment as e-commerce, safety are the importances of entire e-commerce security.
With the development of e-commerce, e-commerce spreads to the every aspect in our live and works, e-finance services content
Such as online purchase, Web bank, enterprise bank, Home Banking, management of personal money, Internet stock trading, online reimbursement, network payment of duty
Deng great changes also are occurring.All these network finance services are required for realizing by mobile payment.But due to moving
Dynamic payment is realized by Internet, and due to the opening of Internet, payment information is highly susceptible to the broken of hacker
Bad and attack, the leakage of these information and the impaired interests for directly threatening enterprises and individuals, so constantly reinforcing mobile payment
Information privacy, the true integrality of information and the non-repudiation of information are that current realization mobile payment security to be considered
Sixty-four dollar question.
By biological identification technology, using the fingerprint with uniqueness and lifelong invariance, as mobile-payment system
People's authentication information can greatly improve the safety and reliability of mobile-payment system.But due to the inherency of fingerprint characteristic,
The defect that there are templates to be easily stolen, cannot change, when fingerprint characteristic is by security attack, fingerprint characteristic will be unable to continue to make
With.To ensure that the safety of fingerprint characteristic identification, the minutia to take the fingerprint incorporate in encryption frame, finger has been effectively ensured
The safety of line feature avoids the attack in fingerprint characteristic transmission process, and fingerprint characteristic encryption technology is applied to mobile branch
Fu Zhong efficiently solves the security hidden trouble in mobile payment.
Invention content
It is an object of the invention to overcome the deficiencies of the prior art and provide a kind of based on fingerprint IRLRD feature encryptions
Mobile-payment system and method and method of mobile payment.
The present invention is achieved by the following technical solutions:
A kind of mobile-payment system based on fingerprint IRLRD feature encryptions, including ARM control modules, data memory module,
Fingerprint collecting circuit, human-computer interaction circuit, communication interface circuit, relay control output circuit and the electricity for foregoing circuit power supply
Source circuit, the ARM control modules are by ARM fingerprint IRLRD feature encryptions, realizing the identity of fingerprint IRLRD feature encryptions
Certification.
As advanced optimizing for said program, the human-computer interaction circuit includes liquid crystal display and touch screen and its outer
Circuit is enclosed, is realized by touch interactive device and is interacted with the mobile-payment system.
As advanced optimizing for said program, the relay controls output interface circuit for realizing fingerprint IRLRD
The control of the mobile payment platform product of feature encryption exports.
As advanced optimizing for said program, the signal output end of the ARM control modules is stored with the data respectively
Module, the fingerprint collecting circuit, human-computer interaction circuit, the communication interface circuit, relay control output circuit electrical connection, should
Communication interface circuit is RS-232 serial interface circuits.
As advanced optimizing for said program, the IRLRD features of the fingerprint are the fingerprint singularities based on the field of direction
Extraction, subcharacter is described using random regional area to determine fingerprint characteristic;Specifically comprise the following steps:
(61) according to any one random seed s in the fingerprint image of acquisition, to generating one in fingerprint foreground area
Random point set, and a corresponding random direction is generated to each random point, it obtains random point set and is expressed as:
N is the number of random point;
(62) the fingerprint IRLRD sampled according to the field of direction feature extraction of fingerprint regional area1Feature, if random point miIt is right
The sampled point answered is classified as { oi,1,oi,2,…,oi,k, wherein K is sampling number,
miCorresponding description:{φ(oi,1,θi),φ(oi,2,θi),…,φ(oi,k,θi),For sampled point
oi,kRelative to θiAngle, be connected in turn corresponding description of all random points to obtain fingerprint IRLRD1Feature;
(63) according to step (61) extraction random point set M in each fingerprint feature point carry out it is a series of translation and
Rotation generates a series of fingerprint feature information, forms random fingerprint feature, is encoded to random fingerprint characteristic data value IRLRD2
(64) the fingerprint IRLRD that step (62) obtains1The IRLRD that feature and step (63) obtain2Character code data value connects
It picks up and, obtain fingerprint IRLRD features:IRLRD=IRLRD1+IRLRD2。
A kind of method of mobile payment of the mobile-payment system based on fingerprint IRLRD feature encryptions, it is characterised in that:Including
Following steps:
(71) mobile-payment system brush bank card sends out payment request to bank;
(72) bank obtains consumer's public key according to solicited message to third-party trusted authorities authentication center, is used in combination and disappears
Fingerprint IRLRD characteristic electrons signature on the encrypted bank card of the private key of the person of expense public key decryptions consumer;
(73) by being authenticated to fingerprint IRLRD characteristic electrons signature, the engaging method is determined;It is required that user is in movement
Finger print information is inputted on platform, included fingerprint feature information is compared with user fingerprints electronic signature;
(74) identity validation, the fund that user's request is transferred out of user bank card complete mobile payment.
The present invention has the following advantages compared with prior art:A kind of shifting based on fingerprint IRLRD feature encryptions of the present invention
Dynamic payment system:Fingerprint IRLRD feature keys are extracted, using " the fingerprint of the topological structure and variation of constant " fingerprint characteristic "
IRLRD feature keys " solve the contradiction of secure communication, i.e., the problem that " confidentiality " and " non repudiation " cannot be satisfactory to both parties.Its
In, the topological structure of constant " fingerprint characteristic " is since different " fingerprint IRLRD feature keys " are by same " the fingerprint spy
What sign " generated, so the topological structure with constant " fingerprint characteristic ";" the fingerprint IRLRD feature keys " of variation is by same
What one fingerprint stochastic transformation generated, therefore have and do not guessed the cipher random for obtaining and ensuring information security.Meanwhile fingerprint
IRLRD feature keys also solve random key and are unable to Self-certified and the high-cost problem of fingerprint identity validation.Key is accepted as unavoidable
Card refers to that the key can be as the voucher of user, for example the voucher is user's fingerprint, and fingerprint is the user
Legal voucher.Thus the key is just proved to be the user naturally, therefore under the premise of key secret, solves random
Key can be with the problem of Self-certified;The high cost of fingerprint identity validation refer to purchase fingerprint instrument be a kind of additional expenditure after all, and
Fingerprint IRLRD feature keys are generated, user need to only reserve a fingerprint on fingerprint random generator, later without using fingerprint
Instrument constantly can generate and use fingerprint IRLRD feature keys, thus can use fingerprint identity validation at low cost.Using fingerprint
The key that IRLRD features are signed as fingerprint electron solves the problems, such as the concealed and disclosed Self-certified problem of " key ".
Fingerprint IRLRD characteristic electrons signature is signed using fingerprint IRLRD characteristic electrons so that law of electronic signature has more method
Validity is restrained, it makes authentication and authentification of message unified, and the biological characteristic of electronic signature people and electronic signature key is made to close
One, the biological characteristic and electronic signature key unification, electronic signature information content authentication and information owner's body of the people that signs electronically
Both part certifications are unified.It is solved using fingerprint IRLRD characteristic electrons signature and generates random fingerprint spy using fingerprint feature information
Key problem is levied, solves the problems, such as intrinsic fingerprint characteristic to become random fingerprint feature key, it is close to solve random fingerprint feature
The problem of key safety certification, solves in the local Verify Your Identity questions for using fingerprint at low cost.
Fingerprint IRLRD characteristic electron certificates calculate random fingerprint IRLRD feature keys, fingerprint IRLRD characteristic electrons signature
The elements such as method, fingerprint electron signature authentication introduce digital certificates, become fingerprint IRLRD characteristic electron certificates, are demonstrate,proved with fingerprint electron
Book is carrier, which possesses the excellent of the technologies such as fingerprint characteristic key, fingerprint electron signature algorithm, fingerprint electron signature authentication
Gesture, this be digital certificates it is incomparable.Fingerprint IRLRD characteristic electron certificates are provided with can authentication in open and can be concealed
Both " key " unified function.Its based on digital certificates, be transformed the proprietary public-key cryptography of its signature algorithm, certificate,
Signature of the certificate issuers to certificate.
Based on the WPKI technologies of CA fingerprint IRLRD feature key certifications, when which asks other side's public key to CA every time all
The non-repudiation and authenticity of the authentication in traditional PKI technologies must be overcome by fingerprint IRLRD feature keys come certification
Existing defects, if the certificate that the third party has usurped user's second illegally has registered the public private key pair of user's second on CA, and this is public
Private key pair without associated biometric identity authentication information, is believed again when the third party is sent using the identity of user's second to user's first
Breath, and user's first can only prove the identity of user's second by the public key of user's second, this makes user's second that can not clarify, and identity is recognized
The non-repudiation and authenticity existing defects of card.
The method of mobile payment based on fingerprint IRLRD feature encryptions of the present invention, obtains the fingerprint image of user and extraction
Fingerprint IRLRD features protect the Secure Transaction for completing mobile payment, such enterprise and use by Multi Identity Attestation as key
Family can both effectively prevent payment information hacked and destroy during mobile payment, be also possible to prevent fingerprint spy
Sign is distorted, and has effectively been prevented payment information in mobile payment and the security crises such as has been tampered, reveals or fakes, guarantee mobile payment
Orderly progress.
Description of the drawings
Fig. 1 is the structural schematic diagram of the mobile-payment system of the fingerprint IRLRD feature encryptions of the present invention.
The flow chart of the fingerprint IRLRD feature encryption algorithms of Fig. 2 present invention.
Fig. 3 is the fingerprint image core point and triangulation point of the preferred embodiment of the present invention.
The random point of Fig. 4 the preferred embodiment of the present invention generates schematic diagram.
The Tico sampling structures of Fig. 5 the preferred embodiment of the present invention.
The translation schematic diagram of Fig. 6 the preferred embodiment of the present invention.
The rotation schematic diagram of Fig. 7 the preferred embodiment of the present invention.
The scaling schematic diagram of Fig. 8 the preferred embodiment of the present invention.
The fingerprint IRLRD characteristic electrons signature schematic diagram of Fig. 9 present invention.
The fingerprint IRLRD characteristic electron certificate format schematic diagrames of Figure 10 present invention.
The PKI technical schematic diagrams based on CA fingerprint IRLRD feature key certifications of Figure 11 present invention
The secure wireless communication control principle schematic diagram of the WPKI of Figure 12 present invention.
The mobile payment process schematic of the fingerprint IRLRD feature encryptions of Figure 13 present invention.
Specific implementation mode
It elaborates below to the embodiment of the present invention, the present embodiment is carried out lower based on the technical solution of the present invention
Implement, gives detailed embodiment and specific operating process, but protection scope of the present invention is not limited to following implementation
Example.
As shown in Figure 1, a kind of mobile-payment system based on fingerprint IRLRD feature encryptions of the present embodiment includes ARM controls
Molding block 10, data memory module 11, fingerprint collecting circuit 12, human-computer interaction circuit 14, communication interface circuit 15, relay control
Output circuit 13 processed and the power circuit 16 powered for foregoing circuit, the ARM control modules pass through special to ARM fingerprints IRLRD
Sign encryption, realizes the authentication of fingerprint IRLRD feature encryptions.
ARM control modules include arm processor, and fingerprint collecting electricity includes fingerprint sensor, arm processor be for finger
Line sensor, relay control output interface, and Ethernet interface, AD/DA, LCD and touch screen, RS-232, memory carry out
The ARM embeded processors of communication.The signal output end of ARM control modules respectively with the data memory module, the fingerprint collecting
Circuit, human-computer interaction circuit, the communication interface circuit, relay control output circuit electrical connection, communication interface circuit RS-
232 serial interface circuits realize public network information access for controlling such as mobile device module, GPS module.
Fingerprint sensor realizes that the identity of fingerprint IRLRD feature encryptions is recognized by ARM fingerprint IRLRD feature encryption algorithms
Card.Relay controls output interface and is exported for realizing the control of the mobile payment platform product of fingerprint IRLRD feature encryptions.With
Too network interface for realizing internet network-control.The LCD and touch screen are the people for realizing information inputs such as fingerprint etc.
Machine interface is interactive.
The memory is used to store the data parameters etc. of mobile device embedded OS and its operation.The power supply
Circuit constantly thinks system power supply for ensureing.
Wherein, the ARM fingerprint IRLRD feature encryption algorithms in arm processor are the cores of this system, and feature exists
In including the extraction of fingerprint IRLRD feature keys, fingerprint IRLRD characteristic electrons signature, fingerprint IRLRD characteristic electrons certificate and be based on
The WPKI technologies of CA fingerprint IRLRD feature key certifications.Fingerprint IRLRD feature encryptions algorithm flow chart such as Fig. 2 institutes of the present invention
Show, first with fingerprint singularity and the translation of fingerprint image, rotation and the unrelated characteristic of scaling, take the fingerprint singular point with
Machine feature-fingerprint IRLRD features, the fingerprint IRLRD features based on extraction generate safe and reliable fingerprint characteristic key, by this
For encrypting in frame, electronic signature, digital certificates and PKI technologies are transformed using fingerprint IRLRD features, formation refers to
Line IRLRD characteristic electrons signature, fingerprint IRLRD characteristic electrons certificate and the WPKI based on CA fingerprint IRLRD feature key certifications
Technology.
The fingerprint IRLRD feature keys generate, and complete to encrypt as feature key using IRLRD features,
IRLRD features are fingerprint singularity detection and extraction algorithm based on the field of direction, are described using random regional area
Subcharacter determines fingerprint characteristic.
The minutiae feature of fingerprint is common feature in fingerprint recognition.Fingerprint minutiae feature includes mainly that singular point is special
It seeks peace structure feature.The feature of these minutiae points is highly stable, has unchangeable property.Core point and triangulation point constitute singular point
Feature, as shown in Figure 3.The singular point of fingerprint image and the translation of fingerprint image, rotation and scaling are unrelated, therefore common unusual
Point is used as fingerprint index.Since fingerprint algorithm is computationally intensive, higher to computer performance and configuration requirement, therefore present invention extraction refers to
Line minutiae point random character, the detail characteristics of fingerprints based on extraction generate safe and reliable fingerprint characteristic key, by this for adding
In close frame.And in most of cryptographic systems, it generates uncertain key and is only safety and reliability, this just needs setting
Consider to increase its unpredictability, that is, randomness when counting key schedule.
A random seed s is given in fingerprint image, to generating a random point set in fingerprint foreground area, and it is right
Each random point generates a corresponding random direction, this N number of random point set with direction is expressed as:
Wherein, N is the number of random point.All random points are d apart from the upper limit to partitioning boundary2,
Lower limit is d1,d2It can change with the variation of the size of foreground area, this to work as foreground area
Also enough random points can be generated when smaller.If Fig. 4 is the schematic diagram that random point generates, random point is to be uniformly distributed at random
's.
Sub-sampling structure is described according to the minutiae point of Tico, as shown in figure 5, the stochastic set generated after being generated to random point
It closes to extract minutia description and realize the sampling of Fingerprint diretion, and then extracts IRLRD features.Wherein, it is located at sampling
The point m of structure centre is reference point, each sampled point pk,lEquidistantly distribute is being r by L radius sizel(1≤l's≤L) is same
On heart circle, and include K on each circlelA sampled point.If using θ as the direction of reference point m, all random point miIt can be from ginseng
The innermost layer concentric circles that examination point m is directed toward a little sets out, and be linked in sequence each layer successively from inside to outside in the counterclockwise direction, composition one
A vector.Corresponding minutiae point description is the angle of each sampled point and reference point direction, then all angle values is claimed to form
Vector be description subvector, description to rotation and translation have good robustness.
It defines each sampled point and the angle in reference point direction describes son, IRLRD feature representations as each minutiae point
The field of direction feature of fingerprint regional area, and fixed length.If random point miCorresponding sampled point is classified as { oi,1,oi,2,…,oi,k,
Wherein, K is sampling number.Formula { φ (o can be usedi,1,θi),φ(oi,2,θi),…,φ(oi,k,θi) indicate miIt is corresponding to retouch
Son is stated, whereinFor sampled point oi,kRelative to θiAngle, then first all random points corresponding description is connected successively
It picks up to obtain part IRLRD characteristic informations IRLRD1, i.e.,What the present invention extracted retouches
State the square presence feature that subcharacter is random site.In the fingerprint identity validation stage, according to the random point set of storageCompletely the fingerprint IRLRD of sampling is extracted at square scene with certification fingerprint1Feature.But it is described in extraction
Before subcharacter, it is necessary to be transformed into random point under the coordinate system of certification fingerprint first.It is sat using central point and its direction
Mark alignment, it is assumed that the central point and its direction of resampled finger and certification fingerprint are respectively (xt,yt,θt) and (xq,yq,θq), then with
Machine point setIt can be converted by following formula:
Wherein, Δ θ=θq-θt,It is the random point after Coordinates calibration.By M', certification fingerprint
IRLRD1Feature can be extracted by following formula:
Wherein, o'i,kIt is the direction of certification fingerprint sampling point position.
In order to increase the randomness of key, with algorithm to each fingerprint feature point in the random point set M that originally extracted
A series of translation and rotation are carried out, a series of fingerprint feature information is generated with this.The parameter wherein translate, rotated is by machine
What device randomly generated, from there through random translation and rotation, random fingerprint feature is formed, to be encoded to random fingerprint feature
Data value IRLRD2,
The specific method is as follows:
1. as shown in fig. 6, P points are some fingerprint feature points, T is translation vector, and P' is the point after translation, i.e. P'=P+
T:
2. as shown in fig. 7, P points are a bit after translation, P' is by more postrotational, and θ is the angle of rotation, and R is
Spin matrix:
3. as shown in figure 8, P1And P0It is by translation, postrotational fingerprint feature point, P1' and P0' it is P1And P0By contracting
Point after putting, wherein S are scaled matrix.To simplify the calculation, SxAnd SyValue it is generally identical:
4. the coordinate for each of obtaining putting is stitched together, fingerprint characteristic IRLRD is generated to encode2。
In the process, the topological structure of fingerprint will not change, this makes IRLRD features not only with unpredictable
Property, also there is identity authentication function, to solve the problems, such as the non-repudiation of key and crypticity.In conclusion by fingerprint
IRLRD1Feature and IRLRD2Character code data value connects, and obtains fingerprint IRLRD features, is expressed as:IRLRD=
IRLRD1+IRLRD2.In the algorithm, each random seed is related to description, will be obtained using different random seeds
To entirely different IRLRD features, realize that IRLRD features have defeasibility and changeability.The IRLRD that the algorithm takes the fingerprint
Feature generates key as feature vector, this describes subcharacter has good robustness to rotation and translation, is suitable for fingerprint
It encrypts in frame.
The fingerprint IRLRD characteristic electrons signature, the key signed as fingerprint electron using fingerprint IRLRD features, solution
The certainly concealed problem of " key " and disclosed Self-certified problem.Its schematic diagram is as shown in figure 9, wherein fingerprint IRLRD feature encryptions
Electronic signature use symmetric key encryption algorithm be AES encryption algorithm.Its specific method includes the following steps:
Step 1:Transmitting terminal is converted to message digest (difference by the plaintext that a kind of functional operation (Hash) will be sent
Plaintext correspond to different message digests);
Step 2:Transmitting terminal generates key using fingerprint IRLRD features, and message digest is generated after being encrypted using the key to be referred to
The electronic signature of line IRLRD feature encryptions.Transmitting terminal sends jointly to the electronic signature of plaintext and fingerprint IRLRD feature encryptions
Receiving terminal;
Step 3:The plaintext Hash of reception is first generated new message digest by receiving terminal, then by fingerprint IRLRD feature encryptions
Electronic signature decryption, then by fingerprint electron signature ciphertext data compared with new message digest, if identical, then it represents that
It is not altered in plain text, it otherwise indicates to be tampered in plain text.
The proprietary public affairs of its signature algorithm, certificate are transformed based on digital certificates in fingerprint IRLRD characteristic electron certificates
Key, certificate issuers are opened to the signature of certificate, make digital certificates have can authentication in open and can both concealed " key " it is unified
Function.Wherein, signature algorithm used in certificate is signed by certificate CA fingerprint IRLRD characteristic electrons and is replaced, certificate owner
Public-key cryptography caused by the proprietary fingerprint IRLRD feature keys of certificate public key replace, certificate issuers are to certificate
Signature is signed by the fingerprint IRLRD characteristic electrons of certificate CA responsible person to be replaced.Signature algorithm and certificate issue used in certificate
Person is to the signature of certificate for carrying out fingerprint IRLRD characteristic electron signature authentications to fingerprint electron certificate.The proprietary public affairs of certificate
Key is opened for the cipher-text information of generation side's private key encryption to be decrypted.
Fingerprint IRLRD characteristic electrons certificate is improved X.509 standard certificate, improved fingerprint IRLRD features electricity
Sub- certificate is as shown in Figure 10.
The WPKI technologies based on CA fingerprint IRLRD feature key certifications, the technology ask other side's public key to CA every time
When by fingerprint IRLRD feature keys come certification, must all overcome the non-repudiation of the authentication in traditional PKI technologies and true
Reality existing defects.As shown in figure 11, concrete operating principle is:
It is assumed that user's first is sender, user's second is recipient.
Step 1:User's first and user's second apply to become public key certificate authentication center CA member, obtain its digital certificates;
Step 2:User's first is registered in fingerprint CA Accreditation Systems, and operation is as follows:
(21) user fingerprints are obtained first, generate user fingerprints IRLRD features;
(22) fingerprint characteristic random generator inputs user fingerprints IRLRD features, generates two fingerprint IRLRD characteristics
According to;
(23) fingerprint IRLRD characteristics are as private key (KA), another fingerprint IRLRD characteristics are as key
Random data (RA), random fingerprint IRLRD feature public keys (K is calculated with thisB=KA×RA)。
Step 3:Register user's second;
Step 4:User's first sends ciphertext to user's second;
(41) user's first uses KAPlaintext encryption is become into ciphertext;
(42) this encrypted ciphertext is sent to user's second by user's first.
Step 5:Ciphertext is sent to user's first by user's second;
Step 6:User's second applies for the public key K of user's first to CAB, to decrypt through user's first private key KAEncrypted ciphertext;
Step 7:The CA digital certificates of user's first are transmitted to user's second by CA by registration management system, to verify user's second
Legitimacy;
Step 8:User's second is to obtain the public key K of wherein user's firstB, carry out CA digital certificates authentications;
Step 9:The public key K of user's first acquired in user's second useB;
Step 10:Ciphertext through user's first private key encryption is decrypted user's second, obtains in plain text.
Because fingerprint characteristic encryption technology to be used in mobile payment platform, therefore need PKI technologies expanding to WPKI technologies.
WPKI technologies are the optimization extensions that traditional PKI technologies are applied to wireless environment.Pacify as shown in figure 12 for the wireless communication of WPKI
Full mechanism.WPKI systems have the bases such as registration body (RA), certificate repository, PKI clients, application interface and certification authority (CA)
This composition part, specific works include the following steps:
(1) as the verifier of certification authority, RA registration bodies are the interfaces between CA and user;
(2) as the authentication center of signing and issuing of digital certificate, CA is the core of entire WPKI systems;
(3) complete WPKI must provide good application interface system, it is ensured that the ease for use of secure network environment and complete
Whole property, it is ensured that WPKI and various applications can it is consistent, credible, be safely completed interaction;
(4) certificate is verified before distribution digital certificate is to requestor, the identity of capture and certification user, to CA
It is proposed that certificate request, the level of trust being set in certificate are determined by the processing quality of certification;
(5) WPKI is encrypted using the X.509 digital certificate of compression and the ECC elliptic curves of optimization.Used ECC
Elliptic curve cipher is as tradition PKI and practical application security intensity, but its Password Length can be 165, with traditional PKI
It is compared with 2048 or 1024 of practical application, operand wants small, and complexity also decreases.
As shown in figure 13, the method for mobile payment based on fingerprint IRLRD feature encryptions of this example, includes the following steps:
1. mobile-payment system brush bank card sends out payment request to bank;
2. bank obtains consumer's public key according to solicited message to third-party trusted authorities authentication center (CA), it is used in combination
Fingerprint IRLRD characteristic electrons signature on the encrypted bank card of the private key of the public key decryptions consumer of consumer;
3. by being authenticated to fingerprint IRLRD characteristic electrons signature, the engaging method is determined.It is held to further confirm that
Block the identity of people, it is desirable that user inputs finger print information on a mobile platform, the fingerprint spy for signing electronically included with user fingerprints
Reference breath is compared;
4. after identity validation, so that it may which the fund to transfer user's request out of user bank card completes mobile payment.
Method of mobile payment through the invention, enterprise and user can both effectively prevent propping up during mobile payment
Pay information it is hacked and destroy, be also possible to prevent distorting for fingerprint characteristic, effectively prevented disbursement letter in mobile payment
The security crises such as be tampered, reveal or fake are ceased, ensure the orderly progress of mobile payment.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention
All any modification, equivalent and improvement etc., should all be included in the protection scope of the present invention made by within refreshing and principle.
Claims (6)
1. a kind of mobile-payment system based on fingerprint IRLRD feature encryption methods, it is characterised in that:Including ARM control modules,
Data memory module, fingerprint collecting circuit, human-computer interaction circuit, communication interface circuit, relay control output circuit and to be upper
The power circuit of circuit power supply is stated, the ARM control modules are by ARM fingerprint IRLRD feature encryptions, realizing fingerprint IRLRD
The authentication of feature encryption.
2. a kind of mobile-payment system based on fingerprint IRLRD feature encryption methods according to claim 1, feature exist
In:The human-computer interaction circuit includes liquid crystal display and touch screen and its peripheral circuit, is realized by touch interactive device
It is interacted with the mobile-payment system.
3. a kind of mobile-payment system based on fingerprint IRLRD feature encryption methods according to claim 1, feature exist
In:The control of mobile payment platform product of the relay control output interface circuit for realizing fingerprint IRLRD feature encryptions
System output.
4. a kind of mobile-payment system based on fingerprint IRLRD feature encryption methods according to claim 1, feature exist
In:The signal output end of the ARM control modules is electric with the data memory module, the fingerprint collecting circuit, human-computer interaction respectively
Road, the communication interface circuit, relay control output circuit electrical connection, the communication interface circuit are RS-232 serial line interface electricity
Road.
5. a kind of mobile-payment system based on fingerprint IRLRD feature encryption methods according to claim 1, feature exist
In:The IRLRD features of the fingerprint are what the fingerprint singularity based on the field of direction extracted, and it is special to describe son using random regional area
It levies to determine fingerprint characteristic, specifically comprises the following steps:
(61) random to generating one in fingerprint foreground area according to any one random seed s in the fingerprint image of acquisition
Point set, and a corresponding random direction is generated to each random point, it obtains random point set and is expressed as:
N is the number of random point;
(62) the fingerprint IRLRD sampled according to the field of direction feature extraction of fingerprint regional area1Feature, if random point miIt is corresponding
Sampled point is classified as { oi,1,oi,2,…,oi,k, wherein K is sampling number,
miCorresponding description:{φ(oi,1,θi),φ(oi,2,θi),…,φ(oi,k,θi),For sampled point oi,kPhase
For θiAngle, be connected in turn corresponding description of all random points to obtain fingerprint IRLRD1Feature;
(63) a series of translation and rotation are carried out according to each fingerprint feature point in the random point set M of step (61) extraction
Turn, generate a series of fingerprint feature information, forms random fingerprint feature, be encoded to random fingerprint characteristic data value IRLRD2
(64) the fingerprint IRLRD that step (62) obtains1The IRLRD that feature and step (63) obtain2Character code data value connects
Come, obtains fingerprint IRLRD features:IRLRD=IRLRD1+IRLRD2。
6. based on a kind of any mobile branch of the mobile-payment system based on fingerprint IRLRD feature encryptions of claim 1-5
The method of paying, it is characterised in that:Include the following steps:
(71) mobile-payment system brush bank card sends out payment request to bank;
(72) bank obtains consumer's public key according to solicited message to third-party trusted authorities authentication center, and consumer is used in combination
Fingerprint IRLRD characteristic electrons signature on the encrypted bank card of the private key of public key decryptions consumer;
(73) by being authenticated to fingerprint IRLRD characteristic electrons signature, the engaging method is determined;It is required that user is in mobile platform
Upper input finger print information, included fingerprint feature information is compared with user fingerprints electronic signature;
(74) identity validation, the fund that user's request is transferred out of user bank card complete mobile payment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810468697.3A CN108764897A (en) | 2015-04-21 | 2015-04-21 | A kind of mobile-payment system and method based on fingerprint IRLRD feature encryptions |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510191625.5A CN104899737B (en) | 2015-04-21 | 2015-04-21 | Fingerprint IRLRD feature encryptions method and the mobile-payment system based on this method and method |
CN201810468697.3A CN108764897A (en) | 2015-04-21 | 2015-04-21 | A kind of mobile-payment system and method based on fingerprint IRLRD feature encryptions |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510191625.5A Division CN104899737B (en) | 2015-04-21 | 2015-04-21 | Fingerprint IRLRD feature encryptions method and the mobile-payment system based on this method and method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108764897A true CN108764897A (en) | 2018-11-06 |
Family
ID=54032390
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510191625.5A Expired - Fee Related CN104899737B (en) | 2015-04-21 | 2015-04-21 | Fingerprint IRLRD feature encryptions method and the mobile-payment system based on this method and method |
CN201810469567.1A Withdrawn CN108665268A (en) | 2015-04-21 | 2015-04-21 | Fingerprint IRLRD feature encryptions method and the payment system based on this method |
CN201810468697.3A Withdrawn CN108764897A (en) | 2015-04-21 | 2015-04-21 | A kind of mobile-payment system and method based on fingerprint IRLRD feature encryptions |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510191625.5A Expired - Fee Related CN104899737B (en) | 2015-04-21 | 2015-04-21 | Fingerprint IRLRD feature encryptions method and the mobile-payment system based on this method and method |
CN201810469567.1A Withdrawn CN108665268A (en) | 2015-04-21 | 2015-04-21 | Fingerprint IRLRD feature encryptions method and the payment system based on this method |
Country Status (1)
Country | Link |
---|---|
CN (3) | CN104899737B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105373924B (en) * | 2015-10-10 | 2022-04-12 | 豪威科技(北京)股份有限公司 | System for providing safe payment function for terminal equipment |
CN105893819B (en) * | 2016-03-30 | 2019-04-05 | 深圳市德沃尔实业有限公司 | A kind of follow-on fingerprint identification method and system based on redundancy incorrect order permutation algorithm |
CN107181598B (en) * | 2017-07-05 | 2020-03-10 | 四川无声信息技术有限公司 | Fingerprint key processing method and device |
JP6970588B2 (en) * | 2017-11-09 | 2021-11-24 | キヤノン株式会社 | Management systems, terminals, control methods, and programs |
CN109919635A (en) * | 2019-02-26 | 2019-06-21 | 河北泊松信息科技有限公司 | A kind of article method for authenticating and device |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103873244B (en) * | 2012-12-13 | 2017-05-10 | 航天信息股份有限公司 | Identity authentication method and system in mobile payment based on fingerprint identification |
CN204189208U (en) * | 2014-10-24 | 2015-03-04 | 宁波乐品视讯科技有限公司 | A kind of multifunctional terminal device |
-
2015
- 2015-04-21 CN CN201510191625.5A patent/CN104899737B/en not_active Expired - Fee Related
- 2015-04-21 CN CN201810469567.1A patent/CN108665268A/en not_active Withdrawn
- 2015-04-21 CN CN201810468697.3A patent/CN108764897A/en not_active Withdrawn
Also Published As
Publication number | Publication date |
---|---|
CN108665268A (en) | 2018-10-16 |
CN104899737A (en) | 2015-09-09 |
CN104899737B (en) | 2018-10-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11803633B1 (en) | Method and system for securing user access, data at rest and sensitive transactions using biometrics for mobile devices with protected, local templates | |
US11855983B1 (en) | Biometric electronic signature authenticated key exchange token | |
CN110674523B (en) | Method for confirming electronic contract signer by combining digital signature with handwritten signature | |
JP4638990B2 (en) | Secure distribution and protection of cryptographic key information | |
US11436597B1 (en) | Biometrics-based e-signatures for pre-authorization and acceptance transfer | |
CN104899737B (en) | Fingerprint IRLRD feature encryptions method and the mobile-payment system based on this method and method | |
US20020186838A1 (en) | System and method of user and data verification | |
US20040059924A1 (en) | Biometric private key infrastructure | |
US20030163687A1 (en) | Method and system for key certification | |
JP2009533742A (en) | Noisy low power PUF certification without database | |
US11070378B1 (en) | Signcrypted biometric electronic signature tokens | |
CN101398915A (en) | Electronic stamp platform system based on internet | |
WO2018133674A1 (en) | Method of verifying and feeding back bank payment permission authentication information | |
US11405387B1 (en) | Biometric electronic signature authenticated key exchange token | |
TW201911145A (en) | License management system and method using blockchain | |
CN102769623A (en) | Two-factor authentication method based on digital certificate and biological identification information | |
JP2003044436A (en) | Authentication processing method, information processor, and computer program | |
KR20090019576A (en) | Certification method and system for a mobile phone | |
JPH10135943A (en) | Portable information storage medium, verification method and verification system | |
JPH10336172A (en) | Managing method of public key for electronic authentication | |
Lin et al. | Research on security and performance of blockchain with innovation architecture technology | |
Deswarte et al. | A Proposal for a Privacy-preserving National Identity Card. | |
CN112699395A (en) | Attribute-based anonymous authentication method capable of tracing responsibility for fine-grained access control | |
Li et al. | E-passport EAC scheme based on Identity-Based Cryptography | |
CN110505063B (en) | Method and system for ensuring security of financial payment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20181106 |