Supercharge Your Innovation With Domain-Expert AI Agents!

A method and system for unified identity authentication of the whole network based on biometric identification

A biometric identification and identity authentication technology, which is applied in the field of the whole network unified identity authentication method and system based on biometric identification, can solve the problems of increasing user-side usage overhead, complex process, and increased maintenance overhead.

Active Publication Date: 2020-10-30
BEIJING INFORMATION SCI & TECH UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, PKI introduces a trusted third-party CA, which brings the cost of certificate management, storage, and calculation: first, the process of issuing, issuing, obtaining, verifying, and revoking certificates is relatively complicated; The certificate directory provides users with certificate download and status query services at any time, which increases the maintenance cost; third, if the user communicates with many objects, the user must store and manage these certificates locally, which increases the use cost of the user end; fourth, large-scale encryption The problem of key management is generally to use the method of physically adding CA, and there are also problems of cross-certification and trust management among users of each CA

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for unified identity authentication of the whole network based on biometric identification
  • A method and system for unified identity authentication of the whole network based on biometric identification
  • A method and system for unified identity authentication of the whole network based on biometric identification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0027] figure 1 For the schematic structural diagram of the whole network unified identity authentication system based on biometric identification provided by the embodiment of the present invention, see figure 1 , the whole network unified identity authentication system based on biometric identification provided by the embodiment of the present invention includes:

[0028] Trust anchor subsystem: used to manage the biometric collection information of each terminal and other network devices, generate user ID identification information, identification address information of each terminal, and provide query services and other functions for network devices.

[0029] Authentication end: The authenticating party needs to log in to the device at the authenticating end to perform the authentication of the authenticated end. The authenticated end can only be ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a whole-network unified identity authentication method and system based on biological feature recognition, and the method comprises the steps: enabling an authenticated end to collect the biological features of a user, and sending an authentication request to the authentication end; the authenticated end sends the first collection information to a local trust server of the authenticated end; if the local trust server of the authenticated terminal inquires the user ID identification information, comparing whether the to-be-authenticated biological characteristic information of the user is consistent with the user authentication biological characteristic information or not, obtaining a comparison result and sending the comparison result to the authentication terminal;if the local trust server of the authenticated terminal does not inquire the user ID identification information; if yes, inquiring user ID identification information from the trust anchor subsystem, sending the user authentication biological characteristic information to an authenticated end local trust server by an authority trust server in the trust anchor subsystem, obtaining a comparison result by the authenticated end local trust server, and sending the comparison result to an authentication end; And the authentication end judges whether the authentication is passed or not according to the authentication request and the comparison result.

Description

technical field [0001] The invention relates to the communication field, in particular to a method and system for unified identity authentication of the whole network based on biometric feature identification. Background technique [0002] Biological characteristics are unique and permanent. Each person's biological characteristics are quite fixed and difficult to change. It is possible to match a person with his biological characteristics by comparing the biological characteristics with the pre-saved biological characteristics. , you can verify its true identity. It can be seen that biometric identification technology is currently the most convenient and reliable biometric identification technology solution, and has great potential in large-scale applications. In a broad sense, biometric identification devices can be applied to systems and products that require identity authentication, and are currently widely used in many fields such as finance, access control, and househ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/32
Inventor 蒋文保史博轩
Owner BEIJING INFORMATION SCI & TECH UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More