Identity Authentication Based on Fingerprint Recognition and PKI in E-Commerce

Article Preview

Abstract:

In this paper, the related concepts of fingerprint recognition technology and PKI are introduced at first. In the traditional identity authentication based on PKI, the shortage of "password + certificate" which is used to perform the identity authentication is analyzed. And combined with the process of fingerprint recognition, an E-commerce identity authentication system based on fingerprint recognition and PKI is put forward. This system performs the identity authentication with the method of "fingerprint + certificate". Then the trust chain with the personal source spot is established and solves the credibility problem of the users’ identity in E-commerce.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

214-217

Citation:

Online since:

June 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Feng Jing. The Application of Security Technology in Electronic Commerce. Group Economics Research, 2007, 30: 311.

Google Scholar

[2] Tian Jie, Chen Xinjian, Zhang Yangyang. New Progress in fingerprint recognition technology. Progress in Natural Science, 2006, (04): 400-408.

Google Scholar

[3] Nian Rende. Biological Identification Technology in E-commerce. Commercial Research, 2006, (14): 194-197.

Google Scholar

[4] Li Xiongjun, Su Tingbi. Automated Biometric Personal Identification and Verification—BioID. Computer Engineering and Applications, 2002, 16: 86-89.

Google Scholar

[5] Guo Sheng. The Application of Fingerprint Recognition Technology in Electronic Commerce. Market Modernization, 2007, (19): 109.

Google Scholar

[6] Fan Linxiu, Chen Shuya, Wang Xijin. PKI- based Authentication in E- commerce Study. Computer Knowledge and Technology, 2007, 22: 979-980.

Google Scholar

[7] Liu Chun, Zhang Qishang. The Application of Smart Card in the PKI System. Journal of Telemetry, Tracking, and Command, 2006, 05: 62-65.

Google Scholar