Check patentability & draft patents in minutes with Patsnap Eureka AI!

Biological recognition authentication system and method, equipment and medium

A biometric identification and authentication system technology, applied in digital data authentication, digital data protection, etc., can solve problems such as poor user experience, does not support multiple devices synchronous cache, undefined implementation methods, etc.

Pending Publication Date: 2021-10-08
SHANGHAI TRUSTKERNEL INFORMATION TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the disadvantage of the existing technology is that since the challenge data that needs to be signed is different each time, each business application needs to request a separate signature, that is, the user needs to re-enter the biometrics for each operation, and the user experience is poor.
Although this prior art saves power and increases the time interval between battery charging, it still has the disadvantage of requiring a separate request for a signature for each business application, that is, each operation requires the user to re-input biometrics, and the user poor experience
At the same time, the caching process of this prior art only defines an interactive flow design that records the user's recent authentication status locally and does not repeatedly prompt the user in a short period of time. It does not define any specific implementation method, and does not support multiple Synchronize cached results between devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Biological recognition authentication system and method, equipment and medium
  • Biological recognition authentication system and method, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] Step 1: The authentication initiating unit judges whether there is a cached authentication result locally, if yes, go to step 8, and if not, go to step 2.

[0060] Step 2: The authentication initiation unit requests the trusted time from the trusted time server.

[0061] Step 3: The trusted time server signs the current time; the trusted time server obtains the local time of the server, signs its UNIX timestamp format with its own private key, and returns it to the authentication initiating unit.

[0062] Step 4: The authentication initiation unit uses the biometric-protected key to perform a secondary signature; the application on the authentication initiation unit combines the credible time (time stamp and signature of the time stamp) with other control information (such as the validity period of this certification, The business scope of this certification, other certification certificates) splicing, and request to call the key for signature.

[0063] Step 5: The sys...

Embodiment 2

[0070] Based on Example 1, step 3 is split into:

[0071] Step 3.1: The trusted time server checks the cache; the trusted time server checks the local cache, and if the trusted time is generated within X hours, then directly returns the trusted time to the authentication initiation unit, otherwise proceed to step 3.2.

[0072] Step 3.2: Generating trusted time, the trusted time server signs the current time to generate trusted time.

[0073] Step 3.3: Cache the trusted time, and the trusted time server adds the trusted time to the cache.

[0074] Embodiment 2 introduces a maximum error of X hours into the system, that is, the validity period of the final biometric authentication result may be advanced by X hours as a whole. However, Embodiment 2 reduces the pressure on the trusted time server, so that the trusted time server does not need to sign each time request.

Embodiment 3

[0076] Based on Example 1, step 4 is split into:

[0077] Step 4.1: Generate a temporary key, and the authentication initiation unit generates a pair of temporary public and private keys and saves them in a safe environment.

[0078] Step 4.2: Perform a secondary signature, the authentication initiation unit splices the trusted time, other control information and the public key of the temporary key, and requests to use the key with biometric protection for signature.

[0079] After step 10 add:

[0080] Step 11: Generate a challenge request, the authentication accepting unit generates a random number, and sends it to the authentication initiating unit.

[0081] Step 12: Generate a challenge response, the authentication initiating unit uses the temporary private key to sign the concatenation of the random number and the business data (optional) of this request, and returns it to the authentication accepting unit.

[0082] Step 13: Verifying the challenge response, the authent...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a biological recognition authentication system. The biological recognition authentication system comprises a credible time server, wherein the server issues trusted timestamps with signatures required by the authentication initiating unit and the authentication receiving unit; an authentication initiating unit which is used for providing a user interface and a user interaction service, enabling a user to complete biological feature recognition and cache a biological feature authentication result, and completing authentication with the authentication receiving unit; and an authentication receiving unit which receives the authentication request sent by the authentication initiating unit and verifies the authentication initiating unit to provide the biological feature authentication result and the validity period thereof. The invention aims to realize caching of the biological characteristic result on the premise of not reducing the system security, so that a user only needs to carry out biological characteristic authentication once within a certain time period, and the use convenience of the user is improved.

Description

technical field [0001] The present invention relates to the technical field of biometric identification, in particular to a biometric authentication system, method, equipment, and medium. Background technique [0002] Biometric identification is a commonly used authentication technology on mobile devices. It uses the user's fingerprint, iris, face and other biological characteristics as credentials to authenticate the user's subsequent operations. Since human biometrics cannot be modified, the storage and processing of biometrics on devices need to be strictly protected. At present, mobile phone operating systems generally use TEE (Trust Execution Environment) technology to protect the biometric identification function, and expose the authentication capability to the application in the form of signature calculation. Specifically, the application can create a biometric-protected key, and request to use the key to sign the data specified by the application at any time. The o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/32G06F21/45G06F21/64
CPCG06F21/32G06F21/45G06F21/64
Inventor 李子男利文浩
Owner SHANGHAI TRUSTKERNEL INFORMATION TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More