Biological characteristic-based security verification method, client and server

A biometric and security verification technology, applied in secure communication devices, usage of multiple keys/algorithms, public keys for secure communications, etc., can solve problems such as leakage of reputation, risk, fingerprint data leakage, etc., to prevent re-use prevent attacks and enhance security

Active Publication Date: 2017-01-11
ADVANCED NEW TECH CO LTD
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because the fingerprint data needs to be transmitted to the server, there is a risk of fingerprint data leakage during the upload process. The fingerprint data is personal privacy data, and the user does not necessarily agree to upload it. At the same time, leakage will cause reputational risks.
Even if the user agrees to upload the fingerprint data, network traffic will be consumed during the fingerprint data upload process, and the server will also need to compare the fingerprint data, which will consume additional computing resources and storage resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Biological characteristic-based security verification method, client and server
  • Biological characteristic-based security verification method, client and server
  • Biological characteristic-based security verification method, client and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0077] Embodiment 1. The opening process of fingerprint verification.

[0078] The fingerprint verification of Internet payment first needs to enable the fingerprint verification function, such as figure 1 shown, including the following steps:

[0079] ①. The client sends an activation request for fingerprint verification to the server.

[0080] When the user activates the fingerprint verification function, he first initiates an activation request to the server.

[0081] ②. After receiving the activation request for activation of fingerprint verification, the server sends an activation request response message to the client.

[0082] ③. After receiving the activation request response message, the client receives the fingerprint image for verification input by the user, and obtains the fingerprint template ID corresponding to the fingerprint image for verification.

[0083] Before fingerprint verification is enabled, multiple fingerprint templates entered by the user are sto...

Embodiment 2

[0117] Embodiment 2, the fingerprint authentication process of the user during use.

[0118] When the user uses the Internet to pay, it is necessary to verify the user's fingerprint, such as figure 2 As shown, perform the following steps:

[0119] (1) The client sends an authentication request to the server, and the server obtains the authentication request from the client.

[0120] (2) After receiving the authentication request, the server sends an authentication request response message to the client.

[0121] (3) After receiving the authentication request response message, the client receives the fingerprint image for verification input by the user, obtains the fingerprint template ID corresponding to the fingerprint image for verification, and stores it in the activation record saved by the client. Compare the ID of the fingerprint template, if they match, go to the next step, otherwise an error will be reported.

[0122] For fingerprint verification during the payment...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a biological characteristic-based security verification method, a client and a server. The method includes the following steps that: a client sends an authentication request to a server; after receiving the authentication request, the server returns an authentication request reply message; the client receives a fingerprint image for verification inputted by a user, obtains a corresponding biometric characteristic template ID, compares the biometric characteristic template ID with a locally-stored biometric characteristic template ID in an enabling record, generates an authentication response message containing the acquired biometric characteristic template ID, and sends the authentication response message to the server; the server receives the authentication response message and compares the biometric characteristic template ID in the authentication response message with a locally-stored biometric characteristic template ID in a corresponding user record; if the biometric characteristic template ID in the authentication response message is matched with the locally-stored biometric characteristic template ID in the corresponding user record, verification is successful, otherwise, an error is reported. The present invention also provides a client and a server corresponding to the above method. With the biological characteristic-based security verification method, the client and the serve of the invention adopted, the risk of personal biological characteristic leakage when personal biological characteristics are uploaded to a network can be avoided, and the network traffic of network transmission can be decreased, and therefore, higher security can be achieved.

Description

technical field [0001] The invention belongs to the technical field of identity authentication, and in particular relates to a biometric-based security verification method, a client and a server in the identity authentication process. Background technique [0002] In the traditional password verification process, a password needs to be entered, and every time the password is entered, there is a risk of leakage, such as a keylogging Trojan horse, physical peeping, etc. Due to the characteristics of strong stability, personal uniqueness, and high algorithm accuracy of fingerprints, many devices have begun to use the fingerprint verification function in recent years. For example, online payment can be realized through fingerprint verification, which can improve user experience and increase payment security. [0003] In the prior art, during the online fingerprint verification process, the client sends the user's fingerprint data (fingerprint image or fingerprint feature data) t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0861G06F21/32H04L9/0825H04L9/3231H04L9/3247H04L9/3271G06F21/33G06F21/45G06V40/1365H04L9/0861H04L9/14H04L9/30
Inventor 林钧燧
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products