Mobile equipment, system and method for carrying out banking business transaction on the basis of palmprint recognition

A technology of mobile device and palmprint recognition, which is applied in the field of banking business transactions based on palmprint recognition on mobile devices. Merchants or users themselves and other issues, to achieve the effect of good discrimination ability and high discrimination ability

Inactive Publication Date: 2015-07-01
上海方付通科技服务股份有限公司
8 Cites 6 Cited by

AI-Extracted Technical Summary

Problems solved by technology

[0008] 1. Once the user's password is stolen, it is difficult to effectively protect the fund security of the user account;
[0009] 2. Since it is impossible to determine whether the operator who provided the password information of the user account is the own...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Method used

In summary, the mobile device, system and method for carrying out banking transactions based on palmprint recognition of the present invention verify the identity information of the transaction requester through the palmprint of the user, thereby ensuring the security of the user's account; a...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Abstract

The invention provides mobile equipment, a system and a method for carrying out banking business transaction on the basis of palmprint recognition. A palmprint acquisition prompt module in the mobile equipment is firstly adopted to prompt a user that the user needs to collect a verification palmprint used for verification; after the user carries out confirmation, a palmprint acquisition module in the mobile terminal collects the characteristic information of the verification palmprint; after the characteristic information is processed by a transaction processing module in the mobile equipment, the characteristic information is sent into a receiving and dispatching module of the mobile equipment and is sent to a bank transaction server; after the bank transaction server decrypts the received information, the obtained characteristic information of the verification palmprint and user identity information are transmitted to a bank verification server and are stored; subsequently, when a transaction applicant initiates a transaction request, the transaction processing module encrypts transaction request information, the characteristic information of the transaction palmprint and the identity information of the transaction applicant and sends the encrypted information to the bank transaction server; the bank transaction server processes the transaction information of the transaction applicant on the basis of a verification result of the verification server so as to guarantee transaction safety.

Application Domain

Technology Topic

Business transactionsProcess module +5

Image

  • Mobile equipment, system and method for carrying out banking business transaction on the basis of palmprint recognition
  • Mobile equipment, system and method for carrying out banking business transaction on the basis of palmprint recognition
  • Mobile equipment, system and method for carrying out banking business transaction on the basis of palmprint recognition

Examples

  • Experimental program(1)

Example Embodiment

[0056] The following describes the implementation of the present invention through specific specific examples, and those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific embodiments, and various details in this specification can also be modified or changed based on different viewpoints and applications without departing from the spirit of the present invention.
[0057] See Figure 1 to Figure 4. It should be noted that the illustrations provided in this embodiment only illustrate the basic idea of ​​the present invention in a schematic way, and the figures only show the components related to the present invention instead of the number, shape, and shape of the components in actual implementation. For size drawing, the type, quantity, and proportion of each component can be changed at will during actual implementation, and the component layout type may also be more complicated.
[0058] Such as figure 1 As shown, the present invention provides a mobile device for bank business transactions based on palmprint recognition technology. The mobile device 1 includes a mobile device body, and at least includes a palm print collection prompt module 11, a palm print collection module 12, and a transaction processing module 13.
[0059] The palmprint collection prompting module 11 is used to prompt the user to collect verification palmprints for verification and the transaction palmprints of the transaction requester, and output an activation signal.
[0060] Specifically, when the palmprint collection prompt module 11 detects that the bank client in the mobile device to which it belongs has been activated by a user who has not collected and verified palmprints, the palmprint collection prompt module 11 outputs and asks whether the user is It is necessary to collect the prompt information of the verification palmprint for verification, and when the user determines that it is necessary, the start signal is output.
[0061] Wherein, the mobile device includes any mobile device installed with a bank client, preferably, including but not limited to: smart phones, tablet computers, etc.
[0062] The palmprint collection module 12 is configured to collect feature information of the palmprint based on the activation signal from the palmprint collection prompt module 11.
[0063] Wherein, the feature information of the palmprint includes any information that can embody the features of the palmprint, preferably, including but not limited to multiple of line feature information, point feature information, texture feature information, and geometric feature information.
[0064] Because palm lines are composed of three lines: mastoid lines, wrinkles and flexor lines. Papillary lines are small concave-convex lines displayed on the surface of the palm skin tissue. They are unique and basically unchanged for life; wrinkles are small grooves formed by loose skin activity, although they are horizontally pressed on the mastoid lines, But it does not damage the structure of the mastoid lines; the flexor line is an inherent groove formed on a certain position during the long-term flexion and extension of the palm joint. The distribution and shape of the main line of the line is not easy to change for life. One palm may have multiple flexor lines, but more than 80% of people’s palms have three main flexor lines, namely the first flexor line a, the second flexor line b, and the third flexor line c. The stability of the line makes the starting points of the first flexor line a and the third flexor line c have good stability and rotation invariance. Therefore, this embodiment uses two starting points as the reference points of the palm prints, and their midpoints It is the center of the palm print. Since the reference point is stable, in this embodiment, the reference point line and its mid-perpendicular line are used to divide the palm into three areas: finger root (also called upper part) I, medial part II, and lateral part III, such as figure 2 Shown. The mastoid pattern in the palm print can locally form a triangle like a fingerprint. At the root of the finger I, the root of each finger has a set of horizontal arcs protruding toward the center of the palm, often converging into a triangle with the lines between the fingers on both sides. In the outer part III, there is a set of horizontal mastoid lines above the wrist flexor line. The inner side of the line supports the lines flowing inward from the inner side, and the outer side supports the lines flowing out from the outer side. Converge into a triangle near the center of the wrist.
[0065] Specifically, the palmprint collection module 12 first captures palmprint image information, and then extracts palmprint line feature information, point feature information, texture feature information, triangle feature information, etc. from the image information, and stores them .
[0066] The transaction processing module 13 is used to encrypt the collected characteristic information of the verification palmprint so as to be sent to the bank verification server for storage, and also used to encrypt the transaction request information and the characteristic information of the transaction palmprint so as to be sent to the bank transaction server.
[0067] Specifically, the transaction processing module 13 first disperses the predetermined symmetric key based on a random number to obtain the session key, and then performs the MAC signature operation on the information based on the first part of the session key, for example, the left 8 bits. Based on the second part of the session key, such as the right 8 bits and the first encryption algorithm such as 3DES, perform an encryption operation to obtain the encrypted information, and then pair it based on the asymmetric key and the second encryption algorithm such as RSA or SHA1 The encrypted information, random numbers, and user identity information, such as certificate number, mobile phone number and other related information are signed to form the information to be sent, and the information to be sent is sent to the bank transaction server via wifi or GPRS networks.
[0068] Such as image 3 As shown, the present invention also provides a transaction authentication system for bank business transactions based on palmprint recognition technology. The transaction authentication system 2 at least includes: a mobile device 21, a bank verification server 22, and a bank transaction server 23.
[0069] The mobile device 21 is the same as or similar to the aforementioned mobile device 1 and is included here by reference, and will not be detailed here.
[0070] The bank verification server 22 is used to store the characteristic information of the verification palmprint of the user, and to verify the transaction palmprint based on the characteristic information of the verification palmprint.
[0071] Specifically, the bank verification server 22 associates the characteristic information of the verification palmprint provided by the bank transaction server 23 with the user's identity information and stores it, and requests the transaction based on the verification request of the bank transaction server 23 The palmprint of the person is verified and the verification result is output.
[0072] The bank transaction server 23 is used to output the characteristic information of the verified palmprint of the user of the mobile device 21 to the bank verification server 22, and process the data from the mobile device 21 based on the verification result of the bank verification server 22 Transaction request.
[0073] Specifically, the bank transaction server 23 first obtains the corresponding symmetric key algorithm from the encryption machine according to the user information of the mobile device 21, and then performs key distribution according to the submitted random number to obtain the current session key, and then use it The left 8 bits of the session key are used to perform MAC verification on the received information, and then the right 8 bits of the session key are used to perform 3DES decryption operations on the received information to obtain the communication information from the mobile device 21. If the communication information is verified The characteristic information of the palm print is output to the bank verification server 22; if the communication information is transaction information, the identity information of the transaction requester and the characteristic information of the transaction palm print are output to the bank verification server 22 for palm print verification , And perform the corresponding transaction processing when the verification is passed.
[0074] The working process of the above transaction authentication system 2 is as follows Figure 4 Shown:
[0075] In step S1, the palmprint collection prompt module in the mobile device 21 prompts the user to collect verification palmprints for verification, and outputs a start signal after the user confirms.
[0076] Specifically, when the palmprint collection prompt module detects that the bank client in the mobile device 21 to which it belongs has been activated by a user who has not collected and verified palmprints, the palmprint collection prompt module outputs and asks whether the user needs Collect the prompt information for verifying palmprints for verification, and output a start signal when the user determines the need.
[0077] In step S2, the palmprint collection module in the mobile device 21 collects and verifies feature information of the palmprint based on the activation signal.
[0078] Specifically, the palmprint collection module in the mobile device 21 first captures the image information of the user's palmprint, and then extracts the line feature information, point feature information, texture feature information, and triangle feature of the palmprint from the image information. Information etc.
[0079] In step S3, the transaction processing module in the mobile device 21 encrypts the collected characteristic information of the verified palmprint and user identity information, and then sends it to the transceiver module of the mobile device 21 to send to the bank transaction server 23.
[0080] Specifically, the transaction processing module in the mobile device 21 first disperses a predetermined symmetric key based on a random number to obtain the session key, and then based on the first part of the session key, such as the left 8 digits to verify the palmprint After the characteristic information is subjected to the MAC signature operation, it is then encrypted based on the second part of the session key, such as the right 8 bits and the first encryption algorithm such as 3DES, to obtain the encrypted palmprint sequence, and then based on the asymmetric key And a second encryption algorithm such as RSA or SHA1 to sign the encrypted palmprint sequence, random number and user identity information, for example, certificate number, mobile phone number and other related information to form the information to be sent, and pass the information to be sent The network such as wifi or GPRS is sent to the bank transaction server 23.
[0081] In step S4, after the bank transaction server 23 decrypts the received information, it outputs the characteristic information of the verification palmprint and the user identity information to the bank verification server 22, and the bank verification server 22 verifies the characteristics of the palmprint Information is stored after associating with user identity information.
[0082] In step S5, the palmprint collection prompting module of the mobile device 21 prompts the transaction requester to collect his transaction palmprints, and outputs an activation signal.
[0083] Specifically, when the transaction requester initiates a transaction request through the mobile device 21, the palmprint collection prompt module prompts the transaction requester to collect his transaction palmprint, and outputs an activation signal.
[0084] Then, in step S6, the palmprint collection module of the mobile device 21 collects characteristic information of the transaction palmprint based on the activation signal.
[0085] Wherein, the method for the palmprint collection module of the mobile device 21 to collect the characteristic information of the transaction palmprint is the same or similar to the method for collecting and verifying the characteristic information of the palmprint, and will not be detailed here.
[0086] Then, in step S7, the transaction processing module of the mobile device 21 encrypts the collected transaction request information, the characteristic information of the transaction palmprint, and the identity information of the transaction requester, and then sends them to the mobile device 21 The module is sent to the bank transaction server 23.
[0087] Specifically, the transaction processing module of the mobile device 21 first disperses the predetermined symmetric key based on a random number to obtain the session key of this transaction, and then based on the first part of the session key, for example, the left 8 digits pair transaction After the characteristic information of the palm print is subjected to the MAC signature operation, it is then encrypted based on the second part of the session key, such as the right 8 bits and the first encryption algorithm such as 3DES, to obtain the encrypted palm print sequence. A symmetric key and a second encryption algorithm such as RSA or SHA1 are used to sign the encrypted palmprint sequence, random number, transaction information, and user identity information, such as certificate number, mobile phone number and other related information to form transaction information to be sent. The transaction information to be sent is sent to the bank transaction server 23 via the network.
[0088] Then, in step S8, after the bank transaction server 23 decrypts the received information, it sends the characteristic information of the transaction palmprint and the identity information of the transaction requester to the bank verification server 22 for verification.
[0089] Next, in step S9, the verification server 22 verifies the transaction palmprint based on the characteristic information of the verification palmprint associated with the identity information of the transaction requester, and outputs the verification result.
[0090] Next, in step S10, the bank transaction server 23 processes the transaction information of the transaction requester based on the verification result.
[0091] Specifically, after the verification server 22 passes the verification, the bank transaction server 23 processes the transaction information based on the request of the transaction requester; if the verification server 22 fails the verification, the bank transaction server 23 feeds back Information about transaction failure.
[0092] In summary, the mobile device, system and method for banking transactions based on palmprint recognition of the present invention verifies the identity information of the transaction requester through the palmprint of the user, thereby ensuring the security of the user’s account; The feature of pattern is easier to identify than fingerprint, so it is especially suitable for mobile devices such as mobile phones. Therefore, the present invention effectively overcomes various shortcomings in the prior art and has high industrial value.
[0093] The above-mentioned embodiments only exemplarily illustrate the principles and effects of the present invention, and are not used to limit the present invention. Anyone familiar with this technology can modify or change the above-mentioned embodiments without departing from the spirit and scope of the present invention. Therefore, all equivalent modifications or changes made by those with ordinary knowledge in the technical field without departing from the spirit and technical ideas disclosed in the present invention should still be covered by the claims of the present invention.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Similar technology patents

Computational selection of probes for localizing chromosome breakpoints

InactiveUS20080044916A1Good resolutionPrevent and reduce cross hybridizationSugar derivativesMicrobiological testing/measurementGenomic intervalHybridization probe
Owner:ROGAN PETER +1

Flexographic printing original plate capable of being laser-engraved

ActiveUS20110083571A1Good ink transfer and printing durabilityGood resolutionPlate printingFoil printingFlexographyChemistry
Owner:TOYO TOYOBO CO LTD

Capacitor appearance detection device and method based on artificial intelligence technology

PendingCN112083002AReduce difficultyGood resolutionOptically investigating flaws/contaminationSortingCapacitance meterArtificial neuronal network
Owner:SUZHOU CASIA ALL PHASE INTELLIGENCE TECH CO LTD

Classification and recommendation of technical efficacy words

  • Improve identification
  • Good resolution

Tape cartridge format identification in a single reel tape handling device

InactiveUS6918554B2Improve identificationReduce damagePicture changing apparatusAccessories for auxillary signalsEngineeringMagnetic tape
Owner:QUANTUM CORP

System for medical examination or treatment

ActiveUS20050101859A1Good resolutionWell checkUltrasonic/sonic/infrasonic diagnosticsSurgeryIntravascular ultrasoundFiber
Owner:SIEMENS HEALTHCARE GMBH

Diamond marking

InactiveUS6391215B1Good resolutionControl depthBranding equipmentCellsElectrically conductiveGemstone
Owner:DE BEERS UK LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products