Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for identity authentication by finger print USBkey

A technology of identity verification and fingerprint verification, which is applied in the network field, can solve the problems of PIN code leakage security risks, etc., and achieve the effect of solving Trojan horse attacks, preventing being forgotten or leaked, and improving the safety factor

Inactive Publication Date: 2009-01-07
ZHEJIANG MIAXIS TECH CO LTD
View PDF1 Cites 101 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0034] The purpose of the present invention is to provide a method and system for identity verification using a fingerprint USBkey to solve the technical problem that the PIN code is leaked and there are potential safety hazards in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for identity authentication by finger print USBkey
  • Method and system for identity authentication by finger print USBkey
  • Method and system for identity authentication by finger print USBkey

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] The present invention will be described in detail below in conjunction with the accompanying drawings.

[0075] see Figure 5 , which is a schematic structural diagram of the system principle of using fingerprint USBkey for identity verification in the present invention. It includes client end, CA center 32 and processing platform 31 .

[0076] The user terminal further includes a personal terminal 33 and a fingerprint USBkey34. The personal terminal 33 may be a personal computer, or other devices with processing capability and provided with a USB interface, such as PDA and the like. The user terminal 33 is connected to the CA center 32 and the processing platform 31 through the network. The client can connect the CA center 32 and the processing platform 31 through a wireless network or the Internet. Connecting via a wired or wireless network is a well-known technology, and it is necessary to set up corresponding interface devices on both sides of the communication ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity authentication method by a fingerprint USBkey and includes the following steps: (1) the fingerprint information of users is recorded into the fingerprint USBkey and the information is saved in advance; (2) at least a digital certificate generated, which comprises the following steps: firstly, a pair of private and public keys are generated in the fingerprint USBkey; the relevant information of the public keys and the digital certificate is sent to a CA center and generating the digital certificate by the CA center; (3) each digital certificate and corresponding private keys stored and encrypted on the fingerprint USBkey; (4) when a user terminal communicates with a processing platform, the fingerprint USBkey at the user terminal firstly checks the fingerprints, digital signature is carried out on the data to be sent by the corresponding private keys and the data is transmitted to the processing platform for identity authentication. The method permits the digital signature after the fingerprints authentication succeeds; the loophole of PIN code input and transmission does not exist in the whole interactive process, which improves the transaction security to the utmost extent.

Description

technical field [0001] The invention relates to the network field, in particular to a method and a system for using a fingerprint USB key for identity verification when using biometric technology to conduct online transaction operations. Background technique [0002] With the vigorous development of domestic e-commerce, online transactions have also developed rapidly due to its advantages of low transaction costs, convenience and speed, and the number of users using online transactions has also increased sharply. However, the security problem of online transactions has become increasingly prominent, and it has become a major bottleneck hindering the development of online transactions. This has caused most users to pay more attention to the safety of the entire transaction process in addition to the convenience and speed of online transactions. In particular, when important information (such as account numbers and passwords) is leaked or tampered with during a transaction, i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06Q30/00
Inventor 贺晓明梁敏李健康惠海任良斌
Owner ZHEJIANG MIAXIS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products