Method and system for generating private key of blockchain electronic wallet based on fingerprint information
A fingerprint information and electronic wallet technology, applied in the field of information security, can solve the problems of inability to effectively avoid the risk of theft, weak correlation of fingerprint feature information, and theft of private keys, so as to avoid the risk of theft and illegal use , strong correlation, and strengthen the effect of decentralization
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0075] figure 1 It is a flowchart of a method for generating a private key of a blockchain electronic wallet based on fingerprint information provided by an embodiment of the present application. Such as figure 1 As shown, the private key generation method of the blockchain electronic wallet based on fingerprint information includes the following steps:
[0076] S1. Collect images of user fingerprints.
[0077] S2. Perform binarization processing on the fingerprint image to obtain a binarized fingerprint image.
[0078] S3. Extract fingerprint feature points from the binary fingerprint image, and construct a feature point set according to all the extracted fingerprint feature points. The specific process is:
[0079] It should be noted that the fingerprint feature points include the endpoints and bifurcation points of the fingerprint ridges. Wherein, the endpoint refers to the end of the ridge, and the bifurcation point refers to the intersection of three ridges.
[0080]...
Embodiment 2
[0114] Such as figure 2 As shown, on the basis of the above private key generation method of blockchain electronic wallet based on fingerprint information, the application also provides a private key generation system of blockchain electronic wallet based on fingerprint information, which includes an image acquisition module 1. Binarization processing module 2, set construction module 3, normalization matrix module 4 and generation module 5.
[0115] Wherein, the image collection module 1 is used for collecting the fingerprint information of the user.
[0116] The binarization processing module 2 is used for performing binarization processing on the fingerprint image to obtain a binarized fingerprint image.
[0117] The set construction module 3 is used to extract fingerprint feature points from the binary fingerprint image, and construct a set of feature points according to all the extracted fingerprint feature points.
[0118] The normalization matrix module 4 uses each e...
Embodiment 3
[0145] Such as image 3 As shown, the present application also provides a block chain-based personal electronic wallet, which includes a private key, the private key is generated by any of the above private key generation methods, and the private key generation method is stored on the block chain as a smart contract. When the user needs to obtain the private key, he only needs to call the smart contract from the blockchain, and use the private key generation method to regenerate the private key corresponding to the user's fingerprint.
[0146] By adopting the private key generation method of the blockchain electronic wallet based on fingerprint information in this application, the private key no longer needs to be recorded, and the risk of being stolen and illegally used can be avoided. This method can strengthen the decentralized characteristics of the blockchain personal electronic wallet. No storage medium is required, and when the private key is lost or forgotten to carry...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


