Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Security verification method, device, terminal device and server

A technology for terminal equipment and security verification, applied in transmission systems, electrical components, etc., can solve problems such as weak security, and achieve the effect of security verification.

Active Publication Date: 2021-09-03
深圳达闼科技机器人有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be seen that the security of the existing iris verification method is weak

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security verification method, device, terminal device and server
  • Security verification method, device, terminal device and server
  • Security verification method, device, terminal device and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0074] The security verification method is applied to the access control system of XX company, and the terminal device is the mobile phone of user A. When user A passes the security verification of the access control system, for example, the following process can be followed.

[0075] 1. User A can use the mobile phone to swipe NFC outside the door of the access control system to obtain the destination network address (that is, the address of the iris server, which can be an encrypted address).

[0076] 2. User A scans the iris through the mobile phone. For example, it can scan through the application program pre-installed in the mobile phone. Set iris information for comparison.

[0077] 3. When the mobile phone compares the iris information of user A with the preset iris information, it sends the collected iris information of user A to the iris server corresponding to the destination network address, and a confirmation message with a time stamp encryption duration of, for ex...

Embodiment 2

[0080] The security verification method is applied to the access control system of XX company. The terminal device is the mobile phone of user A, and the address of the iris server can be pre-stored in the mobile phone, that is, the address of the destination network. When user A passes the security verification of the access control system, for example, the following process may be performed.

[0081] 1. User A scans the iris through the mobile phone, for example, through an application program installed in the mobile phone.

[0082] 2. During the iris scanning process, the mobile phone performs liveness detection on user A, and compares the collected iris information of user A with the preset iris information stored in the mobile phone. When comparing and matching, set the mobile phone to open the door The NFC information of the virtual door card is available, and the collected iris information of user A is sent to the destination network address; when the comparison does no...

Embodiment 3

[0086] The security verification method is applied to electronic payment, and the terminal device is the mobile phone of user A.

[0087] 1. User A swipes the NFC of his mobile phone when he wants to pay, and obtains the transaction information (including transaction number, transaction amount, etc.) provided by the merchant.

[0088] 2. User A scans the iris through the mobile phone, for example, through a special application program (the application program used for payment can enter the user's iris information and bind it with the payment card when it is used for the first time), and the mobile phone scans the iris during the iris scanning process. Liveness detection is performed on user A, and the collected iris information of user A is compared with the preset iris information stored in the mobile phone (the comparison can be performed in trustzone to improve security). When comparing and matching, the mobile phone sends information such as iris information, payment card ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The disclosure relates to a security verification method, device, terminal equipment and server, which are used to improve the security of iris verification. The method includes: at the terminal device: detecting whether the iris information collected by the terminal device matches the preset iris information; when the iris information matches the preset iris information, sending the iris information to Set the destination network address to further verify the iris information.

Description

technical field [0001] The present disclosure relates to the communication field, and in particular to a security verification method, device, terminal equipment and server. Background technique [0002] Iris recognition technology is a biometric technology based on the texture of the iris of a person. Because the use of iris recognition technology to identify user identities has the characteristics of high uniqueness, high stability, and strong collectability, etc., iris recognition technology is widely used. Applied to various scenarios, such as iris payment, iris access control, etc. [0003] At present, the iris verification method is usually that the terminal device collects the user's iris and performs verification. If the verification is passed, the terminal device will send the verified information to the server, and the server can directly complete the corresponding functions after receiving the information, such as payment , open the door, and so on. However, in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/0861H04L63/12
Inventor 骆磊张涛郭宁王振凯
Owner 深圳达闼科技机器人有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products