Biological recognition authentication system and method, equipment and medium
A biometric identification and authentication system technology, applied in digital data authentication, digital data protection, etc., can solve problems such as poor user experience, does not support multiple devices synchronous cache, undefined implementation methods, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0059] Step 1: The authentication initiating unit judges whether there is a cached authentication result locally, if yes, go to step 8, and if not, go to step 2.
[0060] Step 2: The authentication initiation unit requests the trusted time from the trusted time server.
[0061] Step 3: The trusted time server signs the current time; the trusted time server obtains the local time of the server, signs its UNIX timestamp format with its own private key, and returns it to the authentication initiating unit.
[0062] Step 4: The authentication initiation unit uses the biometric-protected key to perform a secondary signature; the application on the authentication initiation unit combines the credible time (time stamp and signature of the time stamp) with other control information (such as the validity period of this certification, The business scope of this certification, other certification certificates) splicing, and request to call the key for signature.
[0063] Step 5: The sys...
Embodiment 2
[0070] Based on Example 1, step 3 is split into:
[0071] Step 3.1: The trusted time server checks the cache; the trusted time server checks the local cache, and if the trusted time is generated within X hours, then directly returns the trusted time to the authentication initiation unit, otherwise proceed to step 3.2.
[0072] Step 3.2: Generating trusted time, the trusted time server signs the current time to generate trusted time.
[0073] Step 3.3: Cache the trusted time, and the trusted time server adds the trusted time to the cache.
[0074] Embodiment 2 introduces a maximum error of X hours into the system, that is, the validity period of the final biometric authentication result may be advanced by X hours as a whole. However, Embodiment 2 reduces the pressure on the trusted time server, so that the trusted time server does not need to sign each time request.
Embodiment 3
[0076] Based on Example 1, step 4 is split into:
[0077] Step 4.1: Generate a temporary key, and the authentication initiation unit generates a pair of temporary public and private keys and saves them in a safe environment.
[0078] Step 4.2: Perform a secondary signature, the authentication initiation unit splices the trusted time, other control information and the public key of the temporary key, and requests to use the key with biometric protection for signature.
[0079] After step 10 add:
[0080] Step 11: Generate a challenge request, the authentication accepting unit generates a random number, and sends it to the authentication initiating unit.
[0081] Step 12: Generate a challenge response, the authentication initiating unit uses the temporary private key to sign the concatenation of the random number and the business data (optional) of this request, and returns it to the authentication accepting unit.
[0082] Step 13: Verifying the challenge response, the authent...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com


