Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Biological feature based safety certification method and device

A technology of biometrics and security authentication, applied in secure communication devices, user identity/authority verification, instruments, etc., can solve problems such as identity authentication security risks and achieve the effect of ensuring security

Inactive Publication Date: 2016-09-21
CHINA UNIONPAY
View PDF5 Cites 52 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a biometric-based security authentication method and device to solve the problem of security risks in existing identity authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Biological feature based safety certification method and device
  • Biological feature based safety certification method and device
  • Biological feature based safety certification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are only some embodiments of the present invention, rather than all embodiments . Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0023] The terminals involved in the present invention may include handheld devices with biometric authentication functions, vehicle-mounted devices, wearable devices, computing devices or other processing devices connected to wireless modems, and various forms of user equipment (User Equipment, referred to as UE ), mobile station (Mobile station, referred to as MS), terminal (terminal), terminal equipment (Terminal Equipment) and so on. F...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a biological feature based safety certification method and device. The method comprises that a terminal obtains a first biological feature according to a received biological feature certification request; the terminal matches the first biological feature and a preset second biological feature to generate a matching result; the terminal uses a secrete key of a safety certificate, which corresponds to the terminal uniquely, of the terminal to encrypt the matching result to obtain first cryptograph data; and the terminal sends the first cryptograph data and a public key certificate of the safety certificate to a certification end which is a server or the terminal. The method and device of the invention can solve the problem that present identity certification has hidden safety troubles.

Description

technical field [0001] The invention relates to the field of computer application technology, in particular to a biometric-based security authentication method and device. Background technique [0002] With the continuous development and utilization of smart terminals such as smartphones, tablet computers, and smart TVs, people use smart terminal devices to conduct transactions and obtain services more and more, but identity authentication will inevitably be involved. For example, in the process of conducting online transactions, the user needs to submit the user's payment information to the server to realize the payment function. For example, when the user obtains a certain service online, the user needs to submit the user account information to the server to realize the login. and service acquisition. [0003] Regarding the specific process of identity authentication, take the existing fingerprint authentication technology as an example: when the user needs to be authenti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32G06Q20/38G06Q20/40
CPCG06Q20/38215G06Q20/3825G06Q20/3829G06Q20/40145H04L9/3231H04L9/3247H04L9/3263H04L63/0442H04L63/0823H04L63/0861H04L9/32
Inventor 丁林润李春欢回春野彭蔚蔚
Owner CHINA UNIONPAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products