Identity Authentication Based on Fingerprint Recognition and PKI in E-Commerce

2011 ◽  
Vol 63-64 ◽  
pp. 214-217
Author(s):  
Li Juan Zheng ◽  
Hong Wei Wang ◽  
Pei Yin

In this paper, the related concepts of fingerprint recognition technology and PKI are introduced at first. In the traditional identity authentication based on PKI, the shortage of "password + certificate" which is used to perform the identity authentication is analyzed. And combined with the process of fingerprint recognition, an E-commerce identity authentication system based on fingerprint recognition and PKI is put forward. This system performs the identity authentication with the method of "fingerprint + certificate". Then the trust chain with the personal source spot is established and solves the credibility problem of the users’ identity in E-commerce.

2021 ◽  
Vol 1804 (1) ◽  
pp. 012144
Author(s):  
Hesham Hashim Mohammed ◽  
Shatha A. Baker ◽  
Ahmed S. Nori

2020 ◽  
Vol 2020 ◽  
pp. 1-16
Author(s):  
Xinman Zhang ◽  
Kunlei Jing ◽  
Guokun Song

The security problems of online transactions by smartphones reveal extreme demand for reliable identity authentication systems. With a lower risk of forgery, richer texture, and more comfortable acquisition mode, compared with face, fingerprint, and iris, palmprint is rarely adopted for identity authentication. In this paper, we develop an effective and full-function palmprint authentication system regarding the application on an Android smartphone, which bridges the algorithmic study and application of palmprint authentication. In more detail, an overall system framework is designed with complete functions, including palmprint acquisition, key points location, ROI segmentation, feature extraction, and feature coding. Basically, we develop a palmprint authentication system having user-friendly interfaces and good compatibility with the Android smartphone. Particularly, on the one hand, to guarantee the effectiveness and efficiency of the system, we exploit the practical Log-Gabor filter for feature extraction and discuss the impact of filtering direction, downsampling ratio, and discriminative feature coding to propose an improved algorithm. On the other hand, after exploring the hardware components of the smartphone and the technical development of the Android system, we provide an open technology to extend the biometric methods to real-world applications. On the public PolyU databases, simulation results suggest that the improved algorithm outperforms the original one with a promising accuracy of 100% and a good speed of 0.041 seconds. In real-world authentication, the developed system achieves an accuracy of 98.40% and a speed of 0.051 seconds. All the results verify the accuracy and timeliness of the developed system.


Sensors ◽  
2019 ◽  
Vol 19 (7) ◽  
pp. 1664 ◽  
Author(s):  
Haiping Huang ◽  
Linkang Hu ◽  
Fu Xiao ◽  
Anming Du ◽  
Ning Ye ◽  
...  

With the continuous increment of security risks and the limitations of traditional modes, it is necessary to design a universal and trustworthy identity authentication system for intelligent Internet of Things (IoT) applications such as an intelligent entrance guard. The characteristics of EEG (electroencephalography) have gained the confidence of researchers due to its uniqueness, stability, and universality. However, the limited usability of the experimental paradigm and the unsatisfactory classification accuracy have so far prevented the identity authentication system based on EEG to become commonplace in IoT scenarios. To address these problems, an audiovisual presentation paradigm is proposed to record the EEG signals of subjects. In the pre-processing stage, the reference electrode, ensemble averaging, and independent component analysis methods are used to remove artifacts. In the feature extraction stage, adaptive feature selection and bagging ensemble learning algorithms establish the optimal classification model. The experimental result shows that our proposal achieves the best classification accuracy when compared with other paradigms and typical EEG-based authentication methods, and the test evaluation on a login scenario is designed to further demonstrate that the proposed system is feasible, effective, and reliable.


2020 ◽  
Vol 160 ◽  
pp. 411-422
Author(s):  
Jui-Chan Huang ◽  
Ming-Hung Shu ◽  
Bi-Min Hsu ◽  
Chien-Ming Hu

Sign in / Sign up

Export Citation Format

Share Document