Unlock instant, AI-driven research and patent intelligence for your innovation.

Personal information infringement prevention method and system, in which biometric authentication and phase division of authentication process are combined

A biometric authentication and prevention method technology, applied in transmission systems, digital transmission systems, digital data authentication, etc., can solve the problems of high infrastructure costs, and the knowledge base is not easily infringed and damaged by others, so as to eliminate theft or loss, and exclude individuals. The status of information theft and the effect of reducing the risk of infringement

Inactive Publication Date: 2019-09-06
RENOMEDIA CO LTD
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The knowledge-based authentication method is the most common authentication system based on the user name (ID) and password (Password), which has low security, relies on the user's memory, is easy to be invaded, and needs to be recreated if it is lost.
[0004] In addition, all basic authentication methods are authenticated by a specific method owned by them. The security is ordinary, but OTP or security card is used, so it is not easy for others to infringe on the knowledge base, but corresponding additional costs will be incurred, and it will also need to be replaced when lost. means of creation
[0005] In addition, the bio-based authentication method is based on biometric information processing authentication of body tissues such as iris, fingerprint, and face, and has high security due to the application of biometric information. most severely damaged
[0006] If we explain more specifically the representative authentication method, that is, the knowledge-based authentication method, most Internet services are formed by users (Person), media (PC, Mobile) and service agents (Server), especially in the case of network services These three types of units can all be robbed individually, and there is a fatal problem that only one intrusion will directly lead to the leakage of the entire personal information, so a fundamental solution to this kind of information piracy is needed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Personal information infringement prevention method and system, in which biometric authentication and phase division of authentication process are combined
  • Personal information infringement prevention method and system, in which biometric authentication and phase division of authentication process are combined
  • Personal information infringement prevention method and system, in which biometric authentication and phase division of authentication process are combined

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings. However, in the description of the embodiments of the present invention, if it is judged that the gist of the present invention may be unnecessarily obscured, corresponding detailed description will be omitted. In addition, for the purpose of explanation, the size of each component in the drawings may be shown enlarged, and does not mean the actual size.

[0033] figure 1 It is a figure for explaining the personal information infringement prevention system which combines the stage classification of an authentication procedure and biometrics authentication which concerns on one embodiment of this invention.

[0034] The following reference figure 1 A personal information infringement prevention system that combines staging of authentication procedures and biometric authentication is described as an embodiment of the present invention.

[0035] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a personal information infringement prevention method and system, in which biometric authentication and phase division of an authentication process are combined. A personal information infringement prevention system in which biometric authentication and phase division of an authentication process are combined according to the present invention comprises: a portableterminal in which an application capable of photographing a QR code and performing biometric recognition is installed, wherein when biometric recognition provided through the application is completed, the portable terminal stores input personal information and encrypts the personal information by using a value included in the QR code so as to transmit the encrypted personal information, or loadsand transmits a previously stored ID; a service server for storing the encrypted personal information, generating a user ID, and transmitting the user ID to the portable terminal for storage, or notifying the portable terminal of completion of logging-in when the ID received from the portable terminal is a valid ID; and a key server for generating a key value for encryption and decryption of the encrypted personal information, classifying and storing the key value for each user, and providing the key value to the service server.

Description

technical field [0001] Embodiments of the present invention relate to a personal information infringement prevention method and system that combine authentication program stage division and biometric authentication. Background technique [0002] The authentication methods used in the user authentication function are divided into knowledge-based, ownership-based, and biological-based authentication methods, and each authentication method differs in terms of convenience, cost, and security. [0003] The knowledge-based authentication method is the most common authentication system based on the user name (ID) and password (Password), which has low security, relies on the user's memory, is easy to be invaded, and needs to be recreated if it is lost. . [0004] In addition, all basic authentication methods are authenticated by a specific method owned by them. The security is ordinary, but OTP or security card is used, so it is not easy for others to infringe on the knowledge bas...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/32G06F21/60G06K19/06H04L29/06H04L9/14H04L9/08H04L9/32
CPCG06F21/32G06F21/62G06F21/6245H04L9/0861H04L63/0861H04W12/06H04L63/0428H04W12/77G06K7/10722G06K7/1417G06K19/06037H04L9/0866H04L9/0894H04L9/3231H04L2209/80
Inventor 金相演
Owner RENOMEDIA CO LTD