Unlock instant, AI-driven research and patent intelligence for your innovation.
A biometric-based security verification method and client and server
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A biometric, security verification technology, applied in secure communication devices, usage of multiple keys/algorithms, public keys for secure communication, etc. To achieve the effect of preventing replay attacks and enhancing security
Active Publication Date: 2020-01-14
ADVANCED NEW TECH CO LTD
View PDF4 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
Because the fingerprint data needs to be transmitted to the server, there is a risk of fingerprint data leakage during the upload process. The fingerprint data is personal privacy data, and the user does not necessarily agree to upload it. At the same time, leakage will cause reputational risks.
Even if the user agrees to upload the fingerprint data, network traffic will be consumed during the fingerprint data upload process, and the server will also need to compare the fingerprint data, which will consume additional computing resources and storage resources
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0077] Embodiment 1. The opening process of fingerprint verification.
[0078] The fingerprint verification of Internet payment first needs to enable the fingerprint verification function, such as figure 1 shown, including the following steps:
[0079] ①. The client sends an activation request for fingerprint verification to the server.
[0080] When the user activates the fingerprint verification function, he first initiates an activation request to the server.
[0081] ②. After receiving the activation request for activation of fingerprint verification, the server sends an activation request response message to the client.
[0082] ③. After receiving the activation request response message, the client receives the fingerprint image for verification input by the user, and obtains the fingerprint template ID corresponding to the fingerprint image for verification.
[0083] Before fingerprint verification is enabled, multiple fingerprint templates entered by the user are sto...
Embodiment 2
[0117] Embodiment 2, the fingerprint authentication process of the user during use.
[0118] When the user uses the Internet to pay, it is necessary to verify the user's fingerprint, such as figure 2 As shown, perform the following steps:
[0119] (1) The client sends an authentication request to the server, and the server obtains the authentication request from the client.
[0120] (2) After receiving the authentication request, the server sends an authentication request response message to the client.
[0121] (3) After receiving the authentication request response message, the client receives the fingerprint image for verification input by the user, obtains the fingerprint template ID corresponding to the fingerprint image for verification, and stores it in the activation record saved by the client. Compare the ID of the fingerprint template, if they match, go to the next step, otherwise an error will be reported.
[0122] For fingerprint verification during the payment...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention discloses a biometric-based security check method, a client and a server. The client sends an authentication request, and after receiving the authentication request, the server returns an authentication request response message. The client receives user-input data for verification. Verify the fingerprint image, obtain the corresponding biometric template ID, compare it with the biometric template ID in the activation record stored locally, generate an authentication response message including the obtained biometric template ID, and send the authentication response message to the server. The server side receives the authentication response message and compares it with the biometric template ID in the corresponding user record stored locally on the server side. If they match, the verification passes, otherwise an error is reported. The present invention also proposes a client and a server corresponding to the above method. The invention can prevent the transmission of personal biometrics on the network, prevent the risk of leakage, reduce the network flow of network transmission, and have higher security.
Description
technical field [0001] The invention belongs to the technical field of identity authentication, and in particular relates to a biometric-based security verification method, a client and a server in the identity authentication process. Background technique [0002] In the traditional password verification process, a password needs to be entered, and every time the password is entered, there is a risk of leakage, such as a keylogging Trojan horse, physical peeping, etc. Due to the characteristics of strong stability, personal uniqueness, and high algorithm accuracy of fingerprints, many devices have begun to use the fingerprint verification function in recent years. For example, online payment can be realized through fingerprint verification, which can improve user experience and increase payment security. [0003] In the prior art, during the online fingerprint verification process, the client sends the user's fingerprint data (fingerprint image or fingerprint feature data) t...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.