Fingerprint authentication method and system
A fingerprint authentication and client-side technology, applied in the field of identity authentication, can solve the problems of being easily stolen or tampered by attackers, unable to authenticate the identity of the server, and unable to guarantee the authenticity and validity of the user server, so as to ensure security and authenticity Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0039] The fingerprint sensor of the bank client system obtains the user's fingerprint information, and the client identity authentication module obtains the user ID, such as figure 1 As shown, the fingerprint authentication method includes the following steps:
[0040] In the authentication step (S101), the client initiates an authentication request to the server, and after receiving the authentication request, the server authentication management module generates a pair of keys, the keys including a public key and a private key;
[0041] Sending step (S102), sending the public key in the secret key to the client;
[0042] In the receiving step (S103), the client identity authentication module receives the public key of the server; the client uses the public key to encrypt user fingerprint information, user ID data and / or time stamp data, and sends the encrypted data to the server. The server-side authentication management module receives the encrypted data;
[0043] In the decryptio...
Embodiment 2
[0046] The fingerprint sensor of the bank client system obtains the user's fingerprint information, and the client identity authentication module obtains the user ID, such as figure 2 As shown, the fingerprint authentication method includes the following steps:
[0047] In the authentication step (S201), the client initiates an authentication request to the server, and the server authentication management module generates a pair of keys after receiving the authentication request, and the keys include a public key and a private key;
[0048] Sending step (S202), sending the public key in the secret key to the client;
[0049] In the receiving step (S203), the client identity authentication module receives the public key of the server; the client uses the public key to encrypt user fingerprint information and user ID data and / or time stamp data, and sends the encrypted data to the server, The server-side authentication management module receives the encrypted data;
[0050] In the decr...
Embodiment 3
[0054] The fingerprint sensor of the bank client system obtains the user's fingerprint information, and the client identity authentication module obtains the user ID, such as image 3 As shown, the fingerprint authentication method includes the following steps:
[0055] In the authentication step (S301), the client initiates an authentication request to the server, and the server authentication management module generates a pair of keys after receiving the authentication request, and the keys include a public key and a private key;
[0056] Sending step (S302), sending the public key in the secret key to the client;
[0057] In the receiving step (S303), the client identity authentication module receives the public key of the server, and generates a user key at the same time. The public key is used to encrypt the user fingerprint information and the generated user key data, and the encrypted fingerprint information, user ID, user key data and / or time stamp data are sent to the server...
PUM
![No PUM](https://static-eureka-patsnap-com.libproxy1.nus.edu.sg/ssr/23.2.0/_nuxt/noPUMSmall.5c5f49c7.png)
Abstract
Description
Claims
Application Information
![application no application](https://static-eureka-patsnap-com.libproxy1.nus.edu.sg/ssr/23.2.0/_nuxt/application.06fe782c.png)
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com