Authentication system based on biological characteristics and identification authentication method thereof

A biometric and biometric authentication technology, applied in the field of security authentication systems, can solve problems such as personal privacy troubles, biometric authentication server downtime, and biometric authentication server idle

Inactive Publication Date: 2008-12-24
刘洪利
View PDF2 Cites 90 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although in the prior art, some application servers and biometric authentication servers are separated and run on different servers to separate business processing and biometric authentication processing, it is difficult for users to generate sudden biometric authentication data during the peak period of centralized request login. The biometric authentication server is faced with the risk of crashing (downtime); and in the middle of the night, the number of user requests for biometric authentication is relatively small, and the biometric authentication server may be relatively idle
Moreover, from an application level, biometric authentication is different from password authentication—users can control and change passwords at any time (one of the disadvantages of password authentication is that it is difficult for users to remember long passwords that are frequently changed, and short passwords are very uncomfortable. Security), the use of biometric data for identity authentication requires users to leave their constant biometric data templates in all merchants, which will bring trouble to the user's personal privacy and also bring danger to the authentication system. A certain user's biometric data templates are kept in many merchants, because all the biometric characteristics of a person are constant, and some of their biometric data should also be consistent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication system based on biological characteristics and identification authentication method thereof
  • Authentication system based on biological characteristics and identification authentication method thereof
  • Authentication system based on biological characteristics and identification authentication method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0115] combine figure 2 A biometric authentication system illustrating one embodiment of the invention:

[0116] The user uses the biometric authentication system based on the palmprint biosensor 11-7 and the keyboard alphanumeric input device 11-5 held in the personal computer terminal 11; the biometric authentication system includes,

[0117] (1) A limited-use machine with a domain name URL (for example, www.EMBbiz.net) based on palmprint biometrics, i.e. an e-commerce server 1, at least with a memory 1-2, an authentication module 1-4 and an encryption / decryption module 1-7; where,

[0118] Memory 1-2, used to store the ID identification number of each user, and the mobile phone number of the smart phone 2 that is bound to each user ID identification number one-to-one, for example, Table 1 represents www.EMBbiz.net Detailed data stored on the memory of the e-commerce server 1;

[0119] ID number for each user

The mobile phone number of the smart phone 2 ...

Embodiment 2

[0153] The biometric authentication system of another embodiment of the present invention is illustrated below in conjunction with Fig. 3:

[0154] The user uses the biometric authentication system based on the fingerprint sensor held by the POS machine terminal 11 of the merchant, the bank card reader, and the keyboard input device; it includes,

[0155] (1) Banks with domain name URLs (such as www.chinaunionpay.com) based on fingerprint characteristics

[0156] account server 1,

[0157] (2) Smartphone 2 and

[0158] (3) public proxy analysis device 3,

[0159] in,

[0160] (1) A bank account server (that is, a limited-use machine) 1 with a domain name URL based on fingerprint features, with a memory 1-2, an authentication module 1-4, a communication forwarding module 1-5, and an encryption / decryption module 1-7 ;in,

[0161] The memory 1-2 is used to pre-store the card number of each bank card of the user, and the mobile phone number of the smart phone 2 that is bound ...

Embodiment 3

[0198] An embodiment of the biometric authentication method of the present invention is described in conjunction with the steps in FIG. 4 .

[0199] (401a) From the frontier inspection client terminal computer 11 of the border inspection and law enforcement department equipped with iris sensors and keyboards, the foreign entry personnel to be authenticated input their visa numbers and collect the iris biometric data to be authenticated, and perform detailed feature points after preprocessing Extract, obtain the effective representation data of the iris biometric feature, send it to the visa server 1 with a fixed IP address (limited use machine) through the communication line or with the device 100, request authentication to log in to the visa server 1 with the fixed IP address or use its resources for specific authentication, such as records showing the visa information of the immigrant,

[0200] The above communication data are encrypted / digitally signed or decrypted / verified...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an authentication system and an authentication method based on biological features. The method comprises the steps of conducting centralized storage and biological feature comparison operation for a large quantity of user biological feature templates according to user ID identifiers stored on a memory on a limited use machine and corresponding biding ID identifiers thereof on a biological authentication device of a digital processing terminal; separating the biological feature templates from the authentication function of the limited use machine; allocating to digital processing terminals (including PCs, notebooks or mobile phones, PDAs of users)of users as biological authentication device-storing the biological feature templates with decentralization and operating and processing biological features to be authenticated with decentralization so as to conduct comparison with the biological feature templates pre-stored on the respective digital processing terminals; feeding back comparison and verification results to the limited use machines; authorizing to conduct equal authentication of the biological authentication device ID identifier on the digital processing terminal for the corresponding binding user ID identifiers by the centralized authentication of the limited use machine according to the comparison verification result data.

Description

technical field [0001] The invention generally belongs to the category of security authentication systems, and relates to an authentication system based on biometric features and an identity authentication method thereof. Background technique [0002] Generally, the security scope of an information system is defined in five categories of security technologies, namely: identity authentication, access control, data confidentiality, data integrity, and non-repudiation. Identity authentication is the most basic security requirement of an application system. The traditional identity identification and authentication method is to use passwords or user interface module (PIM) artifacts (such as user cards) or their combination. These methods are all through the authentication of passwords or other artifacts, and users indirectly identify and authenticate the identity of the holder through the control of these objects, rather than the identification of the user's "self". The disadva...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06F21/00G06K9/00G06F21/32
Inventor 刘洪利
Owner 刘洪利
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products