Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Verification code authentication method and system based on biological characteristics

A biometric, authentication method technology, applied in the field of identity authentication, can solve the problems of card maintenance, limited data transmission, and no separation of man and machine.

Active Publication Date: 2020-08-28
UNIV OF JINAN
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Or store the user name and password in a card called a password manager, and the user logs in with the "user name + password" method, and then the system uses the card for secondary identity authentication; but this method requires card maintenance and password change. key inconvenient
Furthermore, based on the OMS mobile phone platform identity authentication, that is, use a hardware-based specific dynamic password for identity authentication, and integrate the USB-Key function on the mobile phone, and use the SIM card inside the mobile phone to realize the USB-Key function. In electronic password authentication, it is not necessary to carry hardware with you, reducing unnecessary troubles; however, this method has limited data transmission capacity, and does not realize the separation of man and machine. When the user's mobile phone is lost, criminals can pretend to be legitimate users for identity authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification code authentication method and system based on biological characteristics
  • Verification code authentication method and system based on biological characteristics
  • Verification code authentication method and system based on biological characteristics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] The verification code authentication method based on biometrics provided by this embodiment can be applied: when using mobile phone payment software to pay online, the third-party payment company uses the SMS verification code of the mobile phone message as the carrier to confirm the user's identity; or when the user forgets the login password , the third-party server sends a text message containing a verification code to the mobile phone number registered by the user, and the user enters the verification code into the prompt dialog box within the specified time and sends it to the remote server to verify the authenticity of the user's identity.

[0042] According to this embodiment, a biometric-based verification code authentication method is provided, such as figure 1As shown, the method is executed by the client, and it should be noted that the steps shown in the flowchart of the accompanying drawings can be executed in a computer system such as a set of computer-exec...

Embodiment 2

[0064] This embodiment provides a biometric-based verification code authentication method, which is executed by a client, and specifically includes:

[0065] S21: Send an authentication request and receive a verification code;

[0066] S22: Generate a first private key and a first public key according to the acquired biological characteristics; perform a hash operation on the biological characteristics to obtain a first private key, and perform elliptic curve encryption on the first private key to obtain a first public key;

[0067] S23: Transmit the generated first private key and first public key to the server using a key transmission rule;

[0068] S24: Sign the verification code according to the first private key, and send the verification code and signature information, so as to obtain a verification result verified by the first public key.

[0069] The step S21 corresponds to the step S11 of the first embodiment, and will not be repeated here.

[0070] The step S22 cor...

Embodiment 3

[0089] This embodiment provides a biometric-based verification code authentication method, which is executed by a server, and specifically includes:

[0090] S31: Receive a verification code and signature information obtained by signing the verification code with the first private key; the verification code is generated according to the received verification request, and the first private key carries biometric features;

[0091] S32: Verify the verification code and signature information according to the received first public key obtained through elliptic curve encryption with the first private key.

[0092] In the step S31, the obtaining of the first private key and the first public key and the signing process of the first private key correspond to the first embodiment, and will not be repeated here.

[0093] In the step S32, as Figure 6 As shown, the specific process of verifying the verification code and signature information according to the first public key includes:

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a verification code authentication method and system based on biological characteristics, and the method comprises the steps: transmitting an authentication request, and receiving a verification code; generating a first private key and a first public key according to the acquired biological characteristics; performing hash operation on the biological characteristics to obtain a first private key, and performing elliptic curve encryption on the first private key to obtain a first public key; and signing the verification code according to the first private key, and sending the verification code and the signature information, so as to obtain an authentication result that authentication is completed by the first public key. The biological characteristic value of the user is taken as a private key, thedigital signature is performed on the verification code of the remote server, and the verification code is returned to the remote server; and the remote server authenticates the verification code and the signature information according to the user public key. The biometric features have uniqueness and non-reproducibility, network transmission and key management arenot needed, and the verification code is signed, so that the verification code has authentication, integrity and non-repudiation, and the security of the verification code is improved.

Description

technical field [0001] The invention relates to the technical field of identity authentication, in particular to a verification code authentication method and system based on biometric features. Background technique [0002] The statements in this section merely provide background information related to the present invention and do not necessarily constitute prior art. [0003] When using third-party software for online payment, third-party payment companies widely use SMS verification codes as carriers to confirm user identities; A text message containing a verification code, the user enters the verification code into the prompt dialog box within the specified time and sends it to the remote server to verify the authenticity of the user. Through the identity authentication mode of the verification code, the user can directly use the SMS verification code to log in without a password, which brings convenience to the user. [0004] However, the inventor believes that there ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04L9/32H04L9/30G06Q20/38G06Q20/40H04W4/14
CPCH04L63/18H04L9/0866H04L63/083H04L9/3247H04L9/3066G06Q20/3829G06Q20/40145H04W4/14
Inventor 李保珠王萍张霞王震
Owner UNIV OF JINAN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products