CN104751154A - Fingerprint safe encryption method based on intelligent mobile information device - Google Patents

Fingerprint safe encryption method based on intelligent mobile information device Download PDF

Info

Publication number
CN104751154A
CN104751154A CN201410358210.8A CN201410358210A CN104751154A CN 104751154 A CN104751154 A CN 104751154A CN 201410358210 A CN201410358210 A CN 201410358210A CN 104751154 A CN104751154 A CN 104751154A
Authority
CN
China
Prior art keywords
finger
image
intelligent mobile
fingerprint
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410358210.8A
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Song Baijun
Original Assignee
ZHIMO SCIENCE & TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZHIMO SCIENCE & TECHNOLOGY Co Ltd filed Critical ZHIMO SCIENCE & TECHNOLOGY Co Ltd
Priority to CN201410358210.8A priority Critical patent/CN104751154A/en
Publication of CN104751154A publication Critical patent/CN104751154A/en
Pending legal-status Critical Current

Links

Landscapes

  • Collating Specific Patterns (AREA)

Abstract

The invention relates to the fields of communication safety and biological recognition. A fingerprint safe encryption method based on an intelligent mobile information device comprises the following steps: turning on a camera to collect finger image information by a non-contact manner within a predetermined range; encrypting the collected finger image information for the first time; preprocessing the encrypted finger image; and encrypting the preprocessed finger image. The non-contact fingerprint recognition can be achieved at a cell phone without contacting with a collector end face upon collecting the fingerprint image, accordingly reducing the possibility of propagating pathogenic bacteria. The encryption is started as soon as the fingerprint information is collected; and the encryption can also be performed after the preprocessing, accordingly guaranteeing the safety during the whole process, and solving the safety problem of being stolen by hackers upon recognizing, transmitting and uploading the fingerprint.

Description

Based on the finger print safety encryption method of intelligent mobile information equipment
Technical field
The present invention relates to communication security and technical field of biometric identification, particularly, relate to a kind of finger print safety encryption method based on intelligent mobile information equipment.
Background technology
Apple opens the epoch of touch-screen, and touch-screen mobile phone has become the new lover of people.The terminal of mobile phone development is " machine, at hand, is wandered through the world ".Such as can by mobile phone remote open family water heater, bank transfer business can be carried out, identification etc. can be carried out by mobile phone by mobile phone.Store huge quantity of information in this slight mobile phone, greatly facilitate and simplify the life of people.But potential problem is just following, and that is exactly safety issue.Present mobile phone adopts multi-point touch to unlock or simple numeral setting deciphering mostly, and this mobile phone cipher function is very easily cracked, and can not ensure the security of owner's information.
Fingerprint characteristic is one of feature that people is constant throughout one's life, and the identical possibility of the fingerprint characteristic of different people is almost nil.Somatic fingerprint contains natural encrypted message, and it has as prerequisite three critical natures of encrypted message: popularity, refers to that each normal person has fingerprint; Uniqueness, refers to that everyone fingerprint is all different; Lifelong unchangeability, refers to that non fortuity fingerprint is unchangeable.Therefore, fingerprint identification technology, as the reliable biological identification technology of one, is subject to the people's attention.
Existing fingerprint recognition is all carry out identifying based on the image that obtains by fingerprint capturer, that is a fingerprint capturer must be had, comprise the types such as all kinds of image, CIS, electric capacity, inductance, and be contact collection, existing like this fingerprint identification technology has two deficiencies: one is that cost is higher, must have independent hardware collecting device; Two is that contact gathers finger information, must need to touch collector end face, increase the possibility of the contact transmission of the pathogenic bacteria such as virus, bacterium.
Meanwhile, the fingerprint of user has and is carried out by hacker the possibility stolen in transmission upload procedure, result in the safety problem of especially mobile-phone payment aspect.
Summary of the invention
The object of this invention is to provide a kind of fingerprint identification method based on intelligent mobile information equipment, realize contactless fingerprint identification function by mobile phone terminal, solve the problem that existing fingerprint identification device hardware cost is too high, need contact collection fingerprint image.
Another object of the present invention is after above-mentioned contactless collection finger-image, solves the safety problem stolen by hacker in fingerprint transmission upload procedure.
The object of the invention is to be realized by technical scheme below:
Based on the finger print safety encryption method of intelligent mobile information equipment, described intelligent mobile information equipment has camera, and described method comprises:
In predetermined distance range, open the collection that described camera carries out contactless ground finger-image information;
First time encryption is carried out to obtained finger-image information;
Finger-image after this encryption is carried out pre-service;
Second time encryption is carried out to pretreated finger-image.
Preferably, described method also comprises:
Fingerprint characteristic is extracted from the finger-image after described second time encryption;
Described fingerprint characteristic is carried out third time encryption;
The fingerprint characteristic of described encryption is uploaded to cloud server.
Preferably, after described method also comprises deciphering, obtained fingerprint characteristic is mated with the template prestored, if the match is successful, then perform the corresponding function of setting, otherwise terminate.
Preferably, described cryptographic algorithm is 128 ssl protocols.
Preferably, described cryptographic algorithm is 1024 asymmetric key algorithms.
Preferably, described cryptographic algorithm is selected arbitrarily from 128 ssl protocols and 1024 asymmetric key algorithms.
Another embodiment of the present invention, based on the finger print safety encryption method of intelligent mobile information equipment, described intelligent mobile information equipment has camera, and described method comprises:
In predetermined distance range, open the collection that described camera carries out contactless ground finger-image information;
Obtaining finger-image and carrying out encrypting at least one times before and after pretreated process to described finger-image.
Preferably, described cryptographic algorithm is one or both the combination in 128 ssl protocols or 1024 asymmetric key algorithms.
Another embodiment of the present invention, based on the finger print safety encryption method of intelligent mobile information equipment, described intelligent mobile information equipment has camera, and described method comprises:
In predetermined distance range, open the collection that described camera carries out contactless ground finger-image information;
First time encryption is carried out to obtained finger-image information;
Finger-image after this encryption is carried out pre-service.
Another embodiment of the present invention, based on the finger print safety encryption method of intelligent mobile information equipment, described intelligent mobile information equipment has camera, and described method comprises:
In predetermined distance range, open the collection that described camera carries out contactless ground finger-image information;
Pre-service is carried out to obtained finger-image;
Second time encryption is carried out to pretreated finger-image.
Like this, by above-mentioned technical scheme, just can reach such effect: utilize mobile phone terminal just can realize contactless ground fingerprint recognition, do not need to touch collector end face when gathering fingerprint image, decrease the possibility that pathogenic bacteria are propagated, and do not need the hardware collecting device that extra cost is higher, by the encryption to finger data, the security fingerprint identification of mobile phone terminal highest level can be realized.
Accompanying drawing explanation
Fig. 1 is the finger print safety encryption method schematic flow sheet based on intelligent mobile information equipment of first embodiment of the invention.
Fig. 2 is the finger print safety encryption method schematic flow sheet based on intelligent mobile information equipment of second embodiment of the invention.
Fig. 3 is the finger print safety encryption method schematic flow sheet based on intelligent mobile information equipment of third embodiment of the invention.
Fig. 4 is the finger print safety encryption method schematic flow sheet based on intelligent mobile information equipment of fourth embodiment of the invention.
Embodiment
In order to understand the present invention better, below in conjunction with the description of accompanying drawing reference example, method and system of the present invention is further detailed.
In order to complete understanding the present invention, refer to numerous detail in the following detailed description.But it should be appreciated by those skilled in the art that the present invention can realize without the need to these details.In other embodiments, be not described in detail known method, process, assembly and circuit, in order to avoid unnecessarily make embodiment loaded down with trivial details.
The object of the invention is to be realized by technical scheme below:
As shown in Figure 1, first embodiment of the invention, based on the finger print safety encryption method of intelligent mobile information equipment, described intelligent mobile information equipment has camera, and described method comprises:
Step S101: camera contactless collection finger-image information, particularly, in predetermined distance range, open the camera of described intelligent mobile information equipment (specifically adopting the smart mobile phone of smart mobile phone especially capacitive touch screen to carry out example in the present invention to illustrate), particularly utilize the front-facing camera of described smart mobile phone to carry out the collection of contactless ground finger-image information;
Step S102: first time encryption is carried out to obtained finger-image information;
Step S103: the finger-image after this encryption is carried out pre-service;
Step S104: second time encryption is carried out to pretreated finger-image.
Preferred in the present embodiment, described method also comprises:
Step S105: extract fingerprint characteristic from the finger-image after described second time encryption;
Preferred in the present embodiment, also comprise the finger-image after by described second time encryption and rotate to proper angular position, so that the extraction of fingerprint characteristic.
Described feature extraction be exactly to refinement after fingerprint image extract the operation of information representing its feature.Aforementioned fingerprint Image semantic classification object is exactly for the feature extraction of fingerprint and final identification set up a good basis, higher to ensure whole system discrimination.
Algorithms most in use for feature point extraction is a lot, as:
(1) based on the feature extracting method of binaryzation: this algorithm carries out binaryzation for obtaining fingerprint image after pre-service and enhancing, and then extract minutiae.
(2) based on the feature extracting method of direct gray scale: this method directly from gray level image, by texture properties and the topological structure extract minutiae of analysis chart picture.
(3) based on the feature extracting method of refined image: this method obtains refined image by after fingerprint image process, by refined image extract minutiae.
, extract fingerprint characteristic and specifically comprise in described step in the present embodiment preferably: carry out refinement to described pretreated finger-image, by refined image extract minutiae, described fingerprint characteristic is fingerprint minutiae.
Whether identical in order to compare two fingerprints, need from fingerprint image, extract the feature that can represent fingerprint uniqueness.Described fingerprint minutiae is feature the most frequently used in artificial fingerprint matching.Fingerprint is alternately made up of crestal line and valley line, and at most places streakline continuously and be parallel to each other, and the place of some partial discontinuous constitutes minutiae point.Described fingerprint minutiae has uniqueness, may be used for fingerprint matching.
, described fingerprint minutiae comprises bifurcation, end points, ring, island in the present embodiment preferably, or the combination of end points and bifurcation.
In the present embodiment further alternatively, the unique point extracted, also through the removal of pseudo-random numbers generation, gets rid of the pseudo-random numbers generation that thinning processing process is introduced.The unique point extracted also has to pass through the removal of pseudo-random numbers generation, gets rid of the pseudo-random numbers generation due to the introducing of the process such as binaryzation, thinning processing as much as possible.Finally determine the type of unique point, position, direction.
Step S106: described fingerprint characteristic is carried out third time encryption;
Step S107: the fingerprint characteristic of described encryption is uploaded to cloud server.
Preferred in the present embodiment, described method also comprises step S108: mated with the template prestored by obtained fingerprint characteristic after deciphering, if the match is successful, then performs the corresponding function of setting, otherwise terminates.
What described fingerprint matching will solve is compare to the feature mode of two width given finger print images, judges this two width image whether from the same finger of same person.
Concrete, described fingerprint image coupling aspect, mainly contains based on image, the method for crestal line structure and unique point.The matching algorithm of distinguished point based has simply, fast, the advantage such as robustness.Method the most conventional is at present that minutiae point coordinate model is to do details description.It utilizes the end points on crestal line and these two kinds of key points of bifurcation to identify fingerprint.By minutiae point is expressed as dot pattern, a fingerprint recognition problem can be converted into a Point Pattern Matching problem.Point matching algorithm is by some conversion, as translation transformation, rotates change, stretching, the corresponding point matching that two points are concentrated can be got up.From template fingerprint and input fingerprint, choose a node as with reference to node pair, first utilize when carrying out node matching reference point by fingerprint alignment, and then assess the matching degree of other node.
Preferably, to the present embodiment the fingerprint matching in described step the minutiae point in the fingerprint minutiae collected and template compared, and completes fingerprint matching.
In the embodiment of the present invention preferably, the central point of picture is selected.Can obtain reference point shows from being identified the bit stream obtained in any bit stream of obtaining image and registration image close, then likely draw the result that two images are identical; Being identified image is another different images completely not have reference point to show.Be when they meet certain condition that the match is successful, do not meet and be considered as not mating.Whether mate and return by success value.The match is successful to return 1 explanation, and it fails to match to return 0.
Above-mentioned some Rule of judgment be an artificial fault-tolerant estimated value inherently, and very little makeing mistakes can not affect final matching result.The method process information is few, although want certain pre-service, quickness and high efficiency, makes mistakes little, is applicable to the application scenarios in the present invention, namely mates one to one.
In the present embodiment preferably, also comprise in described step and preset matching number of times is set, when reaching preset matching number of times within a predetermined period of time also the match is successful, the user then giving tacit consent to current finger is not the owner of this intelligent mobile information equipment, close this finger identifying operation process within a certain period of time, such as, if within half an hour same user finger carry out logging in for 5 times identify all failed, then this intelligent mobile phone system gives tacit consent to this user is not owner, thus this finger identification login is automatically closed on backstage, unless this user has further certification or unlocks after 24 hours.
In the present embodiment preferably, the corresponding function of described setting to comprise in unblock, login, mobile payment any one or its combination function.
Carry out finger-image collection based on the smart mobile phone with camera and identify, particularly utilize the front-facing camera of mobile phone, under suitable distance, automatic unlatching camera carries out finger-image acquisition of information and analysis, obtain finger print information, and carry out Characteristic Contrast with the template prestored, judge whether that there is identical fingerprint characteristic, in order to ensure the security in whole processing procedure, by camera obtain data and to be all through in either phase after treatment and to have encrypted.After by Image Acquisition finger print information, namely get started encryption, also can be encrypted after carrying out pre-service.
Preferred in the present embodiment, described cryptographic algorithm is 128 ssl protocols.
Concrete, SSL (Secure Socket Layer) is researched and developed by Netscape, in order to ensure the safety of data transmission on internet, utilize data encryption (Encryption) technology, can guarantee can not be intercepted and eavesdrop in the transmitting procedure of data on network.As long as I.E. more than 3.0 versions or netscape browser can support SSL.It has been widely used in authentication between server and encrypted data transmission.SSL adopts public key technique.Its target is the confidentiality and reliability that ensure to communicate between two methods, can realize supporting at server end and user side simultaneously.At present, utilize the ssl protocol of public key technique, become the industrial standard of secure communication on Internet.
Ssl protocol between ICP/IP protocol and various application layer protocol, for data communication provides safe support.Ssl protocol can be divided into two-layer: SSL record protocol (SSL Record Protocol): it is based upon on reliable host-host protocol (as TCP), provides the support of the basic functions such as data encapsulation, compression, encryption for upper-layer protocol.Ssl handshake protocol (SSL Handshake Protocol): it is based upon on SSL record protocol, for before the data transmission of reality starts, communication two party carries out authentication, consulted encryption algorithm, exchange encryption keys etc.
The service that ssl protocol provides mainly contains:
1) authenticated and server, guarantees that data are sent to correct client and server;
2) enciphered data is stolen to prevent data midway;
3) integrality of service data, guarantees that data are not changed in transmitting procedure.
Preferred in the present embodiment, described cryptographic algorithm is 1024 asymmetric key algorithms.
Concrete, verify to cloud server after described fingerprint image, pretreated image or fingerprint characteristic data are converted into 128 with certain algorithm, the password that namely cloud server stores is 128, can prevent Brute Force again.
In cryptography, two kinds of common cryptographic algorithms are symmetric cryptographic algorithm (Symmetric cryptography) and asymmetric cryptographic algorithm (public key algorithm).
So-called symmetric key algorithm refers to if the encryption key of a cryptographic algorithm is identical with decruption key, although or not identical, can derive another easily by wherein any one, namely key is that both sides share.
Asymmetric key algorithm refers to that the encryption key of a cryptographic algorithm and decruption key are different, can not go out another key in other words by one of them key derivation.These two keys one of them be called PKI, for encryption, disclosed in being, another is called private key, for deciphering, be secret.Wherein calculating private key by PKI is that calculating is upper infeasible.
The difference of these two kinds of cryptographic algorithms mainly contains following several aspect:
The difference of the key 1, adopted during encryption and decryption: the same key that symmetric key encryption and decryption uses, or can be easy to release decruption key from encryption key; And the different keys that asymmetric key algorithm encryption and decryption uses, one of them is difficult to release another key.
2, algorithm is distinguished: the block encryption technology that symmetric key algorithm adopts, by pending plaintext according to fixed length packets, and utilize key to carry out the iteration coding of several to grouping, finally obtain ciphertext.The process of deciphering is same, under regular length cipher controlled, is grouped into unit carries out several iterative decoding with one, obtains expressly.And asymmetric key algorithm adopts a kind of special mathematical function, trap-door one-way function (one way trapdoor function), be namely easy from a direction evaluation, and its reverse calculating is very difficult, or perhaps calculates infeasible.To expressly utilizing PKI to be encrypted conversion during encryption, obtain ciphertext.Utilize private key to be decrypted conversion to ciphertext during deciphering, obtain expressly.
3, the difference of key management security: symmetric key algorithm is disclosed in its algorithm is, its confidentiality depends on maintaining secrecy to key.Due to encryption and decryption both sides adopt key be identical, therefore key distribution, change difficulty.And asymmetric key algorithm distributes in advance due to key, without the need to transmission security key in communication process, security improves greatly, also solves cipher key management considerations.Therefore, preferably have employed asymmetric key algorithm in embodiments of the present invention.
4, security: symmetric key algorithm is disclosed in its algorithm is, its security depends on the length of grouping and the length of key, normal attack method comprises: exhaustive key search method, dictionary attack, attack of tabling look-up, differential cryptanalysis, Linear Cryptanalysis, wherein the most effectively surely belongs to differential cryptanalysis, it by analyze expressly on ciphertext on the impact of difference recover some key bit.Asymmetric key algorithm security is based upon in the intractability of adopted one-way function, and as elliptic curve cryptography, many cryptographists think that it is exponential difficulty.
Preferred in the present embodiment, described cryptographic algorithm is selected arbitrarily from 128 ssl protocols and 1024 asymmetric key algorithms.
Three specific embodiment ultimate principles are identical with the first embodiment below, identical comprises the steps such as fingerprint image acquisition, fingerprint image preprocessing, Finger print characteristic abstract, fingerprint matching, the concrete cryptographic algorithm adopted is also identical, difference is the position of step in whole method of number of times and the encryption of encrypting, and no longer specifically describes therefore.
As shown in Figure 2, second embodiment of the invention, based on the finger print safety encryption method of intelligent mobile information equipment, described intelligent mobile information equipment has camera, and described method comprises:
Step S201: in predetermined distance range, opens the collection that described camera carries out contactless ground finger-image information;
Step S202: obtaining finger-image and carrying out encrypting at least one times before and after pretreated process to described finger-image.
Preferred in the present embodiment, described pre-service comprises carries out convergent-divergent to obtained image, consistent with the template size ratio ensured and prestore.
In the present embodiment preferably, described image scaling process adopts object of reference to be that benchmark is to determine scaling.
In the present embodiment preferably, described object of reference is the length between two dactylus.Such as, the length between the finger tip of middle finger and first segment.
In the present embodiment preferably, described object of reference is the patterned feature of finger.
In another embodiment alternatively, described object of reference is the width of finger.
In another embodiment alternatively, described object of reference can be can determine arbitrarily clap in the image got and point any object of reference of area occupied in the ratio of the whole display screen total area.Because the template size prestored is a value determined, as long as this area ratio is zoomed to same value.
Above-mentioned convergent-divergent is carried out to obtained finger-image, can ensure that finger to be identified is consistent with the size of template, thus ensure that the consistance identifying structure.
Preferred in the present embodiment, described cryptographic algorithm is one or both the combination in 128 ssl protocols or 1024 asymmetric key algorithms.
As shown in Figure 3, third embodiment of the invention, based on the finger print safety encryption method of intelligent mobile information equipment, described intelligent mobile information equipment has camera, and described method comprises:
Step S301: in predetermined distance range, opens the collection that described camera carries out contactless ground finger-image information;
Preferably, described preset distance is pre-set or User Defined by described intelligent mobile information equipment the present embodiment.Because the distance of described distance can have influence on size and the sharpness of finger-image, and the introducing of ambient background noise, described preset distance can according to concrete smart mobile phone front-facing camera pixel height and recognizer precision be come automatically to adjust or user is manually arranged, as long as meet can clear collection finger-image can carry out identifying for it.
Alternatively, the present invention is before collection finger-image, also need whether be previously stored with finger characteristic template to described smart mobile phone this locality to judge, if had, directly carry out the collection of finger-image to be identified, if no, then by the current finger-image collected by after feature extraction or directly carry out mobile phone this locality to this image and store, certainly, also can carry out now the identification in high in the clouds, so corresponding template finger is also stored in high in the clouds.Secondly, this template finger also can be external unit transmission.
Step S302: first time encryption is carried out to obtained finger-image information;
Step S303: the finger-image after this encryption is carried out pre-service.
In the present embodiment preferably, described pre-service comprises image enhaucament.
In actual applications, the quality of quite a few fingerprint image to be processed is had to be poor.In the present embodiment preferably, in described step, pre-service comprises image enhaucament.For the image of poor quality, if without special enhancing process, be difficult to correctly carry out feature extraction.
In the embodiment of the present invention alternatively, Fingerprint Image Segmentation is a part for described Image semantic classification.The most basic foundation of fingerprint segmentation is some characteristic sum characteristic set of image.Characteristics of image is the build-in attribute of fingerprint image, as gray-scale value, and neighborhood relationships, the degreeof tortuosity etc. of streakline.Characteristic set is then several combination.By extracting characteristics of image, original image can be mapped to feature space, make characteristics of image in feature space, present certain distribution.Therefore according to above gray-scale value Domain relation, the degreeof tortuosity of streakline, Fingerprint Image Segmentation is roughly divided into three classes: based on the Iamge Segmentation of pixel, the Iamge Segmentation based on block feature and the Iamge Segmentation based on the overall situation.
The described Fingerprint Image Segmentation based on block feature is that multiple piece essential characteristic is as integrated uses such as gray average, block gray variance, block directed graphs with redefine block feature.Wherein block refers to and divides an image block that one-tenth is little one by one by image.Image average is exactly get average to the gray-scale value of each units chunk, and variance then reflects the deviation of each point and average in this block, and this can well reflect the variation tendency of texture.It is under utilizing orthogonal coordinate system, and the angle of the directed line segment of the coordinate points that initial point forms to them and the positive axis of X can represent the Block direction of this sub-block.The maximum advantage of this method is easy realization, embodies texture very well.The realization of the method is utilization orientation wave filter.
The described Iamge Segmentation based on the overall situation is then the utilization of according to circumstances particularly some special occasions, as incomplete fingerprint.The Iamge Segmentation of the overall situation can be process according to the feature of the overall situation after artificial selected several specified point again, and this method also can apply to fingerprint matching.
In the present embodiment preferably, also comprise and automatic segmentation and background are carried out to finger to be identified peel off.
In the present embodiment preferably, mean-variance is used to carry out background stripping.
Described mean-variance is little in background area gray variance, and the thought that fingerprint region variance is large, fingerprint image being divided into block, calculating the variance of each block, if it is background that the variance of this block is less than threshold value, otherwise is prospect.Concrete steps divide following three steps:
(1) low frequency figure is divided into the zero lap square of M × M size, the size of square is advisable with paddy one ridge.
(2) average and the variance of each block is calculated.
If the size of fingerprint image I is H × L, I (i, j) is the gray scale of pixel (i, j), AVE and VAR is respectively average and the variance of former fingerprint image, AVE and VAR can pass through formula (1) and (2) calculate.
AVE = 1 H × L Σ i = 0 H - 1 Σ j = 0 L - 1 I ( i , j ) - - - ( 1 )
VAR = 1 H × L Σ i = 0 H - 1 Σ j = 0 L - 1 ( I ( i , j ) - AVE ) 2 - - - ( 2 )
(3) if the variance calculated almost just thinks background close to 0, Threshold Segmentation Algorithm is carried out again in the region non-vanishing for variance, and whether this algorithm mainly decides it according to the variance calculated is background area.
In the present embodiment alternatively, before described mean-variance, also by normalization method, described finger-image is become low frequency figure.
Before use mean-variance, normalization method also to be used will to attempt to change as low frequency figure.Normalized object is that the contrast of different original image and gray scale are adjusted in a fixing rank, for subsequent treatment provides a comparatively unified picture specification.The normalization formula of fingerprint image such as formula shown in (3), when being greater than mean value for adding.
I ( x , y ) = AVE 0 + VAR 0 ( I ( x , y ) - AVE ) 2 VAR AVE 0 - VAR 0 ( I ( x , y ) - AVE ) 2 VAR - - - ( 3 )
Wherein AVE 0and VAR 0for gray average and the variance of expectation.
Both be applicable to rounder and more smooth fingerprint with above-mentioned mean-variance segmentation, be suitable for again the fingerprint image that streakline alters a great deal.Normalized frequency reducing and by regional average value variance after the image clear-cut texture that obtains, sharp outline, is very helpful to refinement later and coupling.The method is quick, and damaged condition is low.
As shown in Figure 4, fourth embodiment of the invention, based on the finger print safety encryption method of intelligent mobile information equipment, described intelligent mobile information equipment has camera, and described method comprises:
Step S401: in predetermined distance range, opens the collection that described camera carries out contactless ground finger-image information;
Step S402: pre-service is carried out to obtained finger-image;
In the present embodiment preferably, described pre-service comprises illumination pretreatment.
In the embodiment of the present invention alternatively, an illumination pretreatment process can also be comprised, for removing the impact of different illumination intensity on image intensity value.In the mobile phone shooting head portrait of reality, illumination effect is comparatively large, due to factor impacts such as high lights, needs increase illumination pretreatment step.The gray-scale value of picture is mainly subject to the impact of illumination and local surface reflectance, can be reduced its impact by discrete illumination.Substantially remove shade and different illumination intensity to the impact of image intensity value through illumination pretreatment, remain information useful in identification simultaneously.
Step S403: second time encryption is carried out to pretreated finger-image.
In the specific embodiment of said method, although be the execution providing step in order, but in actual implementation procedure, this order can change arbitrarily and combine, as long as it meets image acquisition, image procossing, feature extraction, fingerprint matching, encrypts at least one times, specifically order wherein does not successively affect the realization of the object of the invention.
The present invention can be realized by the combination of hardware, software or hardware-software, also can be that in mobile phone, panel computer, a preassembled APP realizes.
According to the example of said method, a concrete application scenarios can be such: smart phone user stores image or the fingerprint characteristic of its finger-image after feature extraction of its arbitrary finger in advance at mobile phone, such as, can be thumb.When described smart mobile phone screen locking, this user stretches out palm, be placed on the place of general 20cm under the front-facing camera of this smart mobile phone, automatic shooting or user point and trigger this shooting of a certain button such as power key and manual triggers operation, thereafter this cell phone processor obtains the finger-image of this user, first time encryption can be started immediately after obtaining information in fingerprint, according to object of reference (being the length between thumb finger tip to first segment two dactylus here) for after benchmark determines scaling, obtained image is zoomed to consistent with the thumb template size ratio prestored, thus ensure that the consistance identifying structure.Because now have the ground unrest of many fingers and non-user finger in the initial finger-image obtained, need the segmentation to not needing the finger identified to carry out automatic segmentation and background image, leave and take thumb image to be identified, pre-treatment step here can comprise more many-sided image processing algorithm, also the encryption of the second time after Image semantic classification can be carried out here, (it should be understood that, to " for the first time " in the present invention, " for the second time ", " for the third time " explanation is not exponential quantity and order, can be understood as noun) binaryzation and refinement are carried out to this thumb image to be identified, and automatically by position suitable for this thumb image rotation to, its rotation can be determined according to the central point of coordinate system, then the fingerprint minutiae in refined image is extracted, optionally, here third time encryption can be carried out to the fingerprint characteristic extracted, afterwards these fingerprint characteristics encrypted are uploaded to cloud server, after taking corresponding decryption step and decipherment algorithm, described fingerprint minutiae is mated with the fingerprint template prestored, if the match is successful, then return a response signal, screen automatic unlocking.Certainly, here, if because some reason, the reasons such as the hand shaking of such as illumination, shooting angle, user is dynamic cause finger-image recognition failures, the identification number of times in certain hour can be preset, in this preset time period, carry out the shooting of preset times and again identify, there is no that the match is successful for such as 5 times, then automatically can close this recognition function certain time length, give tacit consent to the owner that this user is not this smart mobile phone.Like this, the privacy of owner can be protected.
Like this, by above-mentioned technical scheme, just can reach such effect: the standard configuration camera utilizing existing smart mobile phone, when not needing to add high cost of hardware collecting device, the fingerprint identification method based on intelligent mobile information equipment that the present invention proposes achieves in the contactless fingerprint recognition of mobile phone terminal, identify as identification at realization finger, while safety certification, reduce cost and greatly reduce the diffusibility of pathogenic bacteria simultaneously, upload again after at least one times described fingerprint being encrypted simultaneously, utilize mobile phone terminal just can realize the security fingerprint identification of highest level.
Here only illustrate the preferred embodiments of the present invention, but its meaning not limits the scope of the invention, applicability and configuration.On the contrary, those skilled in the art can be made to be implemented the detailed description of embodiment.Will be understood that without departing from the spirit and scope as defined in the invention, can make the appropriate changes and modifications some details.

Claims (10)

1., based on the finger print safety encryption method of intelligent mobile information equipment, described intelligent mobile information equipment has camera, and described method comprises:
In predetermined distance range, open the collection that described camera carries out contactless ground finger-image information;
First time encryption is carried out to obtained finger-image information;
Finger-image after this encryption is carried out pre-service;
Second time encryption is carried out to pretreated finger-image.
2., as claimed in claim 1 based on the finger print safety encryption method of intelligent mobile information equipment, it is characterized in that: described method also comprises:
Fingerprint characteristic is extracted from the finger-image after described second time encryption;
Described fingerprint characteristic is carried out third time encryption;
The fingerprint characteristic of described encryption is uploaded to cloud server.
3. as claimed in claim 2 based on the finger print safety encryption method of intelligent mobile information equipment, it is characterized in that: after described method also comprises deciphering, obtained fingerprint characteristic is mated with the template prestored, if the match is successful, then perform the corresponding function of setting, otherwise terminate.
4., as the finger print safety encryption method based on intelligent mobile information equipment as described in arbitrary in claim 1-3, it is characterized in that: described cryptographic algorithm is 128 ssl protocols.
5., as the finger print safety encryption method based on intelligent mobile information equipment as described in arbitrary in claim 1-3, it is characterized in that: described cryptographic algorithm is 1024 asymmetric key algorithms.
6., as the finger print safety encryption method based on intelligent mobile information equipment as described in arbitrary in claim 1-3, it is characterized in that: described cryptographic algorithm is selected arbitrarily from 128 ssl protocols and 1024 asymmetric key algorithms.
7., based on the finger print safety encryption method of intelligent mobile information equipment, described intelligent mobile information equipment has camera, and described method comprises:
In predetermined distance range, open the collection that described camera carries out contactless ground finger-image information;
Obtaining finger-image and carrying out encrypting at least one times before and after pretreated process to described finger-image.
8. as claimed in claim 7 based on the finger print safety encryption method of intelligent mobile information equipment, it is characterized in that: described cryptographic algorithm is one or both the combination in 128 ssl protocols or 1024 asymmetric key algorithms.
9., based on the finger print safety encryption method of intelligent mobile information equipment, described intelligent mobile information equipment has camera, and described method comprises:
In predetermined distance range, open the collection that described camera carries out contactless ground finger-image information;
First time encryption is carried out to obtained finger-image information;
Finger-image after this encryption is carried out pre-service.
10., based on the finger print safety encryption method of intelligent mobile information equipment, described intelligent mobile information equipment has camera, and described method comprises:
In predetermined distance range, open the collection that described camera carries out contactless ground finger-image information;
Pre-service is carried out to obtained finger-image;
Second time encryption is carried out to pretreated finger-image.
CN201410358210.8A 2014-07-25 2014-07-25 Fingerprint safe encryption method based on intelligent mobile information device Pending CN104751154A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410358210.8A CN104751154A (en) 2014-07-25 2014-07-25 Fingerprint safe encryption method based on intelligent mobile information device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410358210.8A CN104751154A (en) 2014-07-25 2014-07-25 Fingerprint safe encryption method based on intelligent mobile information device

Publications (1)

Publication Number Publication Date
CN104751154A true CN104751154A (en) 2015-07-01

Family

ID=53590811

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410358210.8A Pending CN104751154A (en) 2014-07-25 2014-07-25 Fingerprint safe encryption method based on intelligent mobile information device

Country Status (1)

Country Link
CN (1) CN104751154A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106067002A (en) * 2016-05-27 2016-11-02 广东欧珀移动通信有限公司 A kind of finger print information processing method and user terminal
CN106108950A (en) * 2016-07-14 2016-11-16 宁波美童智能科技有限公司 A kind of intelligent wireless ultrasonic fetal imaging screen method
CN106214183A (en) * 2016-07-14 2016-12-14 宁波美童智能科技有限公司 A kind of intelligent wireless ultrasonic fetal imaging shielding harness
CN107147850A (en) * 2017-05-27 2017-09-08 广东小天才科技有限公司 Shooting method based on mobile device and mobile device
CN107590026A (en) * 2017-08-23 2018-01-16 深圳市优品壹电子有限公司 A kind of data back up method and device
CN109977879A (en) * 2019-03-28 2019-07-05 山东省计算中心(国家超级计算济南中心) A kind of acquisition of fingerprint on site matches control methods and system with long-range
EP3525470A1 (en) * 2018-02-12 2019-08-14 Samsung Display Co., Ltd Display device
CN110147665A (en) * 2019-05-13 2019-08-20 Oppo广东移动通信有限公司 Information processing method and relevant device
WO2020207189A1 (en) * 2019-04-08 2020-10-15 腾讯科技(深圳)有限公司 Method and device for identity authentication, storage medium, and computer device
CN112380060A (en) * 2020-11-16 2021-02-19 福建多多云科技有限公司 Application backup recovery method based on cloud mobile phone

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1328309A (en) * 2000-03-24 2001-12-26 松下电器产业株式会社 Apparatus, system card and method for identify evaluation based on biological testing
CN101169810A (en) * 2006-10-27 2008-04-30 环达电脑(上海)有限公司 Electronic device possessing fingerprint identification system and its usage method
CN101174953A (en) * 2007-03-27 2008-05-07 兰州大学 Identity authentication method based on S/Key system
CN201765630U (en) * 2010-06-28 2011-03-16 杭州晟元芯片技术有限公司 Payment device based on fingerprint identification
US8312290B2 (en) * 2007-11-26 2012-11-13 Industrial Technology Research Institute Biometric method and apparatus and biometric data encryption method thereof

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1328309A (en) * 2000-03-24 2001-12-26 松下电器产业株式会社 Apparatus, system card and method for identify evaluation based on biological testing
CN101169810A (en) * 2006-10-27 2008-04-30 环达电脑(上海)有限公司 Electronic device possessing fingerprint identification system and its usage method
CN101174953A (en) * 2007-03-27 2008-05-07 兰州大学 Identity authentication method based on S/Key system
US8312290B2 (en) * 2007-11-26 2012-11-13 Industrial Technology Research Institute Biometric method and apparatus and biometric data encryption method thereof
CN201765630U (en) * 2010-06-28 2011-03-16 杭州晟元芯片技术有限公司 Payment device based on fingerprint identification

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106067002A (en) * 2016-05-27 2016-11-02 广东欧珀移动通信有限公司 A kind of finger print information processing method and user terminal
CN106067002B (en) * 2016-05-27 2019-06-11 Oppo广东移动通信有限公司 A kind of finger print information processing method and user terminal
CN106108950A (en) * 2016-07-14 2016-11-16 宁波美童智能科技有限公司 A kind of intelligent wireless ultrasonic fetal imaging screen method
CN106214183A (en) * 2016-07-14 2016-12-14 宁波美童智能科技有限公司 A kind of intelligent wireless ultrasonic fetal imaging shielding harness
CN107147850A (en) * 2017-05-27 2017-09-08 广东小天才科技有限公司 Shooting method based on mobile device and mobile device
CN107590026A (en) * 2017-08-23 2018-01-16 深圳市优品壹电子有限公司 A kind of data back up method and device
KR20190098290A (en) * 2018-02-12 2019-08-22 삼성디스플레이 주식회사 Display device
EP3525470A1 (en) * 2018-02-12 2019-08-14 Samsung Display Co., Ltd Display device
KR102421774B1 (en) * 2018-02-12 2022-07-18 삼성디스플레이 주식회사 Display device
US10810294B2 (en) 2018-02-12 2020-10-20 Samsung Display Co., Ltd. Display device
CN109977879A (en) * 2019-03-28 2019-07-05 山东省计算中心(国家超级计算济南中心) A kind of acquisition of fingerprint on site matches control methods and system with long-range
WO2020207189A1 (en) * 2019-04-08 2020-10-15 腾讯科技(深圳)有限公司 Method and device for identity authentication, storage medium, and computer device
US11936647B2 (en) 2019-04-08 2024-03-19 Tencent Technology (Shenzhen) Company Limited Identity verification method and apparatus, storage medium, and computer device
US20210344675A1 (en) * 2019-04-08 2021-11-04 Tencent Technology (Shenzhen) Company Limited Identity verification method and apparatus, storage medium, and computer device
CN110147665A (en) * 2019-05-13 2019-08-20 Oppo广东移动通信有限公司 Information processing method and relevant device
CN112380060A (en) * 2020-11-16 2021-02-19 福建多多云科技有限公司 Application backup recovery method based on cloud mobile phone

Similar Documents

Publication Publication Date Title
CN104751154A (en) Fingerprint safe encryption method based on intelligent mobile information device
CN1860724B (en) Method for identification
CN104751040A (en) Fingerprint detection method based on intelligent mobile information equipment
CN104751113A (en) Fingerprint recognition method based on intelligent mobile information device
CN101420301A (en) Human face recognizing identity authentication system
CN104598870A (en) Living fingerprint detection method based on intelligent mobile information equipment
EP3121991B1 (en) System and method of user authentication using digital signatures
CN102567686A (en) Security authentication method of application software of mobile terminal based on human body stable characteristics
CN102412970B (en) Pervasive-network-oriented remote identity authentication system and method
CN105635099A (en) Identity authentication method, identity authentication system, terminal and server
EP3655874B1 (en) Method and electronic device for authenticating a user
CN202444500U (en) Remote identity authentication system for pervasive network
CN106936775A (en) A kind of authentication method and system based on fingerprint recognition
CN103297237B (en) Identity registration and authentication method, system, personal authentication apparatus and certificate server
CN103618611A (en) Identity verification method based on challenge responses and fingerprint identification
CN101206714A (en) Fingerprint identification method and fingerprint payment system based on DSP
CN104009973A (en) Fingerprint detail information hiding and recovering method based on set polynomial conversion and harmonics
CN110619228B (en) File decryption method, file encryption method, file management system and storage medium
CN209881821U (en) Intelligent identity recognition system based on 5G network
CN109450878B (en) Biological feature recognition method, device and system
CN107077558B (en) Authentication method and authentication device based on biological characteristics and electronic equipment
WO2020077626A1 (en) Method and device for recognizing finger vein information
CN113034139A (en) Block chain multi-currency wallet based on living body biological feature authentication and implementation method thereof
CN203243360U (en) Identity registration system
CN104601333A (en) Two-dimensional code remote authentication method based on man-machine features

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20160516

Address after: 102208 Beijing, Huoying, Hualong, Changping District Beiyuan 12-601

Applicant after: Song Baijun

Address before: 100085 No. 2, building 2, international pioneer garden, No. 2 information road, Beijing, Haidian District, 17A

Applicant before: ZHIMO SCIENCE & TECHNOLOGY CO., LTD.

WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150701

WD01 Invention patent application deemed withdrawn after publication