Biometric-based service key management method, server and system

A biometric and business key technology, applied in the field of information security, can solve problems such as hidden dangers of business key security and inability to effectively manage business keys, and achieve the effect of preventing leakage or illegal use and ensuring security

Active Publication Date: 2022-02-01
BEIJING SENSESHIELD TECH
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But at present, there is no effective way to judge the identity of the user, and the use of the business key cannot be effectively managed, thus causing security risks in the process of using the business key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Biometric-based service key management method, server and system
  • Biometric-based service key management method, server and system
  • Biometric-based service key management method, server and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] Various aspects and features of the present application are described herein with reference to the accompanying drawings.

[0053] It should be understood that various modifications may be made to the embodiments applied for herein. Accordingly, the above description should not be viewed as limiting, but only as exemplifications of embodiments. Those skilled in the art will envision other modifications within the scope and spirit of the application.

[0054] The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the application and, together with the general description of the application given above and the detailed description of the embodiments given below, serve to explain the embodiments of the application. principle.

[0055] These and other characteristics of the present application will become apparent from the following description of preferred forms of embodiment given as non-limiting examp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application discloses a biometric-based business key management method, server and system. The method is applied to the server, including: obtaining the first request information sent by the first client, wherein the first request information is used for Requesting the server to use the stored service key to process the data to be processed, the first request information includes the first biometric feature of the requesting user of the service key; obtaining the license information corresponding to the service key based on the first request information; Analyze with the first biometric feature to determine whether the permission information meets the first preset condition, and whether the first biometric feature meets the second preset condition; In the case of the second preset condition, call the service key corresponding to the first request information. The method can prevent the business key from being leaked or illegally used, and can also perform biometric authentication on requesting users to ensure their legal identities.

Description

technical field [0001] The present application relates to the field of information security, in particular to a biometric-based business key management method, server and system. Background technique [0002] In the field of information security, users need to use business keys to process target tasks, such as using business keys to digitally sign or decrypt data to be processed. However, in a specific usage scenario, once the business key is sent to a specific handler, the use of the business key cannot be effectively controlled. This requires the business key owner to manage the business key effectively, including authenticating the identity of the user of the business key, and granting permission to the corresponding business key if the identity meets the requirements. But at present, there is no effective way to judge the identity of the user, and the use of the service key cannot be effectively managed, thus causing potential safety hazards in the process of using the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32H04L9/40
Inventor 孙吉平念龙龙
Owner BEIJING SENSESHIELD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products