Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Private key generation method and system based on fingerprint identification

A fingerprint identification and generation system technology, applied in character and pattern recognition, image data processing, editing/combining graphics or text, etc., can solve problems such as private key forgetting and loss, and achieve the effect of solving private key forgetting and loss

Active Publication Date: 2020-01-07
本无链科技(深圳)有限公司
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The present invention aims to propose a private key generation method and system based on fingerprint identification, which realizes the use of fingerprints as private keys and solves the problem of private keys being forgotten and lost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Private key generation method and system based on fingerprint identification
  • Private key generation method and system based on fingerprint identification
  • Private key generation method and system based on fingerprint identification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061]The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted here that the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute conflicts with each other.

[0062] In order to solve the problem of easy memory, the present invention adopts the idea that the private key does not need to be memorized; in order to solve the problem of discarding the private key, the idea adopted is to prevent the private key from being lost; and the characteristics of the password need to be different for everyone. The idea to solve this problem is to find something that everyone has but is not the same; the solution that combines the above two ideas to solve the problem is to use fingerprints instead of private keys, but fingerprints cannot be used as private keys, so the core of the present ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a private key generation method based on fingerprint identification. The method includes collecting and processing the fingerprint information; extracting a fingerprint ridge line of the image and calculating the curvature of the fingerprint ridge line; extracting fingerprint lines of the image and calculating the frequency of the fingerprint lines; generating fingerprint feature seed, generating a password by using the fingerprint feature seed, keeping the private key and the public key by the user, the user using the private key to encrypt data and other users using the public key to verify the encrypted dada; the invention further discloses a private key generation system based on fingerprint identification, the private key generation system comprises a fingerprint identifier, a fingerprint restorer, a fingerprint feature device and a fingerprint private key device, the effect of using the fingerprint as the private key is achieved, and the problem that the private key is forgotten and lost is solved.

Description

technical field [0001] The invention relates to the technical field of blockchain encryption, in particular to a method and system for generating a private key based on fingerprint identification. Background technique [0002] Cryptography based on mathematics has been developed for a long time, and encryption applications based on cryptography have also been widely used in social activities. The application of the most widely used asymmetric encryption algorithm is even more extensive, and the more widely used it is, the more critical it is to protect the key in its asymmetric encryption. At present, the protection of the key often uses mnemonics Or U-shield method, the first method makes the private key easy to be remembered by the human brain, and the second method makes the private key not easy to be cracked, but both of these two private keys have the problem of easy loss, such as forgetting after not using it for too long Yes, the U-shield wallet was stolen by a thief...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00G06T11/60G06K9/34G06T9/20
CPCG06T11/60G06T9/20G06V40/1359G06V40/13G06V10/267
Inventor 杨税令
Owner 本无链科技(深圳)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products