Client based on biometric feature recognition and working method thereof

A biometric data and client-side technology, applied in the field of information security, can solve problems such as user information security threats, achieve the effect of improving security and reducing the risk of being attacked

Inactive Publication Date: 2017-03-29
FEITIAN TECHNOLOGIES
View PDF4 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, biometric information belongs to the user's private information. If the biometric information is stolen by an attacker, the attacker can use the user's biometric information to impersonate the user's identity, and the user's information security will face a great threat

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Client based on biometric feature recognition and working method thereof
  • Client based on biometric feature recognition and working method thereof
  • Client based on biometric feature recognition and working method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] This embodiment provides a client working method based on biometric identification, wherein the client includes a client application program module and a client identity authentication module, and its working method is specifically as follows: figure 1 shown, including the following steps:

[0036] Step S1: The client application module initiates a preset request to the server, and receives the request data returned by the server;

[0037] Specifically, the preset request may be a registration request, an authentication / transaction request;

[0038] When the preset request is a registration request, the request data is specifically registration data, and the registration data includes an application ID, a user name parameter, a challenge value parameter and an authentication policy parameter;

[0039] When the preset request is an authentication request, the request data is specifically authentication data, and the authentication data includes an application ID, a chal...

Embodiment 2

[0052] Embodiment 2 of the present invention provides a registration method based on biometric identification, which is suitable for a system composed of a server and a client, wherein the client includes a client application module and a client identity authentication module, such as figure 2 As shown, when the user initiates a registration operation to the client application module, the following steps are performed:

[0053] Step 1: The client application module sends a registration request to the server;

[0054] For example, the registration request sent is as follows:

[0055] {"userName":"test","method":"registStart","uafResponse":""}.

[0056] Step 2: The server generates registration data including application ID, user name parameters, challenge value parameters and authentication policy parameters;

[0057] For example, the generated registration data is as follows:

[0058] [{"header":{"upv":{"major":1,"minor":0},"op":"Reg","appID":"https: / / uafmagdc.cloudentify....

Embodiment 3

[0111] Embodiment 3 of the present invention provides an authentication / transaction method based on biometric identification, which is suitable for a system composed of a server and a client, wherein the client includes a client application module and a client identity authentication module, such as image 3 As shown, when the user initiates an authentication / transaction operation to the client application module, the following steps are performed:

[0112] Step 1: The client application module sends an authentication / transaction request to the server;

[0113] Step 2: The server generates authentication / transaction data;

[0114] Step 3: the server returns the authentication / transaction data to the client application module;

[0115] Step 4: The client application module obtains the client ID, and composes an identity verification request according to the client ID and the received authentication / transaction data;

[0116] Step 5: the client application module sends the ident...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a client based on biometric feature recognition and a working method thereof, and belongs to the field of information security. The client comprises a client application program module and a client identity authentication module, wherein the client application program module generates an identity authentication request according to a client identifier and request data acquired from a server, and sends the identity authentication request to the client identity authentication module; the client identity authentication module reminds the user to input biometric feature data for authentication after the condition that the client identifier and the request data are legal is determined, works out assertion data according to a registration identifier, a secret key and a private key if the authentication is successful, the assertion data is sent to the server via the client application program module, and the client identity authentication module receives and displays a request result returned by the server. According to the client provided by the invention, authentication of the biometric feature information of the user is completed in the client identity authentication module, the risk that the biometric feature information of the user is attacked is reduced, and user online register and login security are improved.

Description

technical field [0001] The invention relates to the field of information security, in particular to a client based on biological feature identification and a working method thereof. Background technique [0002] With the development of Internet technology, users can conveniently log in to the application program (app) anytime and anywhere through the network to conduct various online businesses such as shopping, and because many online businesses currently involve user property information, such as bank card numbers, etc., therefore , how to ensure the security of user information is a hot issue in current research. [0003] At present, although most client providers use account numbers and passwords (including character passwords, gesture passwords, etc.) The risk of misappropriation, so the method of using the user's biometric information to register when registering to use the application emerged as the times require, wherein the biometrics can be fingerprints, faces, ir...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0861H04L63/0853
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products