Fingerprint authentication method and system

A fingerprint authentication and client-side technology, applied in the field of identity authentication, can solve the problems of being easily stolen or tampered by attackers, unable to authenticate the identity of the server, and unable to guarantee the authenticity and validity of the user server, so as to ensure security and authenticity Effect

Inactive Publication Date: 2015-12-30
CHINA STANDARD SOFTWARE
View PDF7 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the fingerprint data obtained by the existing fingerprint authentication technology in the authentication process is not encrypted during the transmission process, it is easy to be stolen or tampered by the attacker during the transmission process, the security of the fingerprint data cannot be guaranteed, and the client cannot verify the fingerprint data of the server. Identity authentication does not guarantee that the server accessed by the user is authentic and valid

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fingerprint authentication method and system
  • Fingerprint authentication method and system
  • Fingerprint authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] The fingerprint sensor of the bank client system obtains the user's fingerprint information, and the client identity authentication module obtains the user ID, such as figure 1 As shown, the fingerprint authentication method includes the following steps:

[0040] In the authentication step (S101), the client initiates an authentication request to the server, and after receiving the authentication request, the server authentication management module generates a pair of keys, the keys including a public key and a private key;

[0041] Sending step (S102), sending the public key in the secret key to the client;

[0042] In the receiving step (S103), the client identity authentication module receives the public key of the server; the client uses the public key to encrypt user fingerprint information, user ID data and / or time stamp data, and sends the encrypted data to the server. The server-side authentication management module receives the encrypted data;

[0043] In the decryptio...

Embodiment 2

[0046] The fingerprint sensor of the bank client system obtains the user's fingerprint information, and the client identity authentication module obtains the user ID, such as figure 2 As shown, the fingerprint authentication method includes the following steps:

[0047] In the authentication step (S201), the client initiates an authentication request to the server, and the server authentication management module generates a pair of keys after receiving the authentication request, and the keys include a public key and a private key;

[0048] Sending step (S202), sending the public key in the secret key to the client;

[0049] In the receiving step (S203), the client identity authentication module receives the public key of the server; the client uses the public key to encrypt user fingerprint information and user ID data and / or time stamp data, and sends the encrypted data to the server, The server-side authentication management module receives the encrypted data;

[0050] In the decr...

Embodiment 3

[0054] The fingerprint sensor of the bank client system obtains the user's fingerprint information, and the client identity authentication module obtains the user ID, such as image 3 As shown, the fingerprint authentication method includes the following steps:

[0055] In the authentication step (S301), the client initiates an authentication request to the server, and the server authentication management module generates a pair of keys after receiving the authentication request, and the keys include a public key and a private key;

[0056] Sending step (S302), sending the public key in the secret key to the client;

[0057] In the receiving step (S303), the client identity authentication module receives the public key of the server, and generates a user key at the same time. The public key is used to encrypt the user fingerprint information and the generated user key data, and the encrypted fingerprint information, user ID, user key data and / or time stamp data are sent to the server...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a fingerprint authentication method and a system. The method comprises an authentication step of generating a pair of keys according to the authentication request of a client, wherein the keys comprise a public key and a private key, a sending step of sending the public key to the client, a receiving step of receiving the encrypted data which is generated and sent by the client according to the public key, a decryption step of using the private key to decrypt the encrypted data to obtain decrypted data, and a matching step of matching the locally stored data information and the decrypted data. According to the fingerprint authentication method and the system, the stealing or interpolating of user data in a network transmission process can be prevented, and the safety and reliability of the user data in system certification are ensured.

Description

Technical field [0001] The invention relates to the field of identity authentication, in particular to a fingerprint authentication method and system. Background technique [0002] Under the current situation, when governments, enterprises, and individuals use various systems, they pay more and more attention to system security issues. Identity authentication is the most important issue in system security. Only on the basis of safe and reliable identity authentication can various systems be Play the most effective role in safety protection. [0003] The current common identity authentication technologies include: traditional static password authentication technology, dynamic password authentication technology, USBKEY authentication technology, biometric authentication technology, smart card authentication technology, etc. However, these technologies have more or less drawbacks. For example, the traditional static password authentication technology is only based on the confidential...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06G06F21/32
Inventor 鹿朋汤福
Owner CHINA STANDARD SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products