Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A biometric-based security verification method and client and server

A biometric, security verification technology, applied in secure communication devices, usage of multiple keys/algorithms, public keys for secure communication, etc. To achieve the effect of preventing replay attacks and enhancing security

Active Publication Date: 2020-01-14
ADVANCED NEW TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because the fingerprint data needs to be transmitted to the server, there is a risk of fingerprint data leakage during the upload process. The fingerprint data is personal privacy data, and the user does not necessarily agree to upload it. At the same time, leakage will cause reputational risks.
Even if the user agrees to upload the fingerprint data, network traffic will be consumed during the fingerprint data upload process, and the server will also need to compare the fingerprint data, which will consume additional computing resources and storage resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A biometric-based security verification method and client and server
  • A biometric-based security verification method and client and server
  • A biometric-based security verification method and client and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0077] Embodiment 1. The opening process of fingerprint verification.

[0078] The fingerprint verification of Internet payment first needs to enable the fingerprint verification function, such as figure 1 shown, including the following steps:

[0079] ①. The client sends an activation request for fingerprint verification to the server.

[0080] When the user activates the fingerprint verification function, he first initiates an activation request to the server.

[0081] ②. After receiving the activation request for activation of fingerprint verification, the server sends an activation request response message to the client.

[0082] ③. After receiving the activation request response message, the client receives the fingerprint image for verification input by the user, and obtains the fingerprint template ID corresponding to the fingerprint image for verification.

[0083] Before fingerprint verification is enabled, multiple fingerprint templates entered by the user are sto...

Embodiment 2

[0117] Embodiment 2, the fingerprint authentication process of the user during use.

[0118] When the user uses the Internet to pay, it is necessary to verify the user's fingerprint, such as figure 2 As shown, perform the following steps:

[0119] (1) The client sends an authentication request to the server, and the server obtains the authentication request from the client.

[0120] (2) After receiving the authentication request, the server sends an authentication request response message to the client.

[0121] (3) After receiving the authentication request response message, the client receives the fingerprint image for verification input by the user, obtains the fingerprint template ID corresponding to the fingerprint image for verification, and stores it in the activation record saved by the client. Compare the ID of the fingerprint template, if they match, go to the next step, otherwise an error will be reported.

[0122] For fingerprint verification during the payment...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a biometric-based security check method, a client and a server. The client sends an authentication request, and after receiving the authentication request, the server returns an authentication request response message. The client receives user-input data for verification. Verify the fingerprint image, obtain the corresponding biometric template ID, compare it with the biometric template ID in the activation record stored locally, generate an authentication response message including the obtained biometric template ID, and send the authentication response message to the server. The server side receives the authentication response message and compares it with the biometric template ID in the corresponding user record stored locally on the server side. If they match, the verification passes, otherwise an error is reported. The present invention also proposes a client and a server corresponding to the above method. The invention can prevent the transmission of personal biometrics on the network, prevent the risk of leakage, reduce the network flow of network transmission, and have higher security.

Description

technical field [0001] The invention belongs to the technical field of identity authentication, and in particular relates to a biometric-based security verification method, a client and a server in the identity authentication process. Background technique [0002] In the traditional password verification process, a password needs to be entered, and every time the password is entered, there is a risk of leakage, such as a keylogging Trojan horse, physical peeping, etc. Due to the characteristics of strong stability, personal uniqueness, and high algorithm accuracy of fingerprints, many devices have begun to use the fingerprint verification function in recent years. For example, online payment can be realized through fingerprint verification, which can improve user experience and increase payment security. [0003] In the prior art, during the online fingerprint verification process, the client sends the user's fingerprint data (fingerprint image or fingerprint feature data) t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0861G06F21/32H04L9/0825H04L9/3231H04L9/3247H04L9/3271G06F21/33G06F21/45G06V40/1365H04L9/0861H04L9/14H04L9/30
Inventor 林钧燧
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products