Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Service key management method, server and system based on biological characteristics

A biometric and business key technology, applied in the field of information security, can solve the hidden dangers of business key security, cannot effectively manage business keys and other problems, and achieve the effect of preventing leakage or illegal use and ensuring security.

Active Publication Date: 2021-04-16
BEIJING SENSESHIELD TECH
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But at present, there is no effective way to judge the identity of the user, and the use of the business key cannot be effectively managed, thus causing security risks in the process of using the business key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Service key management method, server and system based on biological characteristics
  • Service key management method, server and system based on biological characteristics
  • Service key management method, server and system based on biological characteristics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] Various aspects and features of the present application are described herein with reference to the accompanying drawings.

[0053] It should be understood that various modifications may be made to the embodiments applied for herein. Accordingly, the above description should not be viewed as limiting, but only as exemplifications of embodiments. Those skilled in the art will envision other modifications within the scope and spirit of the application.

[0054] The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the application and, together with the general description of the application given above and the detailed description of the embodiments given below, serve to explain the embodiments of the application. principle.

[0055] These and other characteristics of the present application will become apparent from the following description of preferred forms of embodiment given as non-limiting examp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a service key management method, server and system based on biological characteristics, and the method is applied to a server, and comprises the steps: obtaining first request information sent by a first client, the first request information being used for requesting the server to use a stored service key to process to-be-processed data, wherein the first request information comprises a first biological characteristic of a request user of the service key; obtaining permission information corresponding to the service key based on the first request information; analyzing the permission information and the first biological characteristic respectively, and determining whether the permission information meets a first preset condition and whether the first biological characteristic meets a second preset condition; and when it is determined that the permission information meets a first preset condition and the first biological feature meets a second preset condition, calling a service key corresponding to the first request information. According to the method, the service key can be prevented from being leaked or illegally used, biological characteristic authentication can be carried out on the request user, and the legal identity of the request user is guaranteed.

Description

technical field [0001] The present application relates to the field of information security, in particular to a biometric-based business key management method, server and system. Background technique [0002] In the field of information security, users need to use business keys to process target tasks, such as using business keys to digitally sign or decrypt data to be processed. However, in a specific usage scenario, once the business key is sent to a specific handler, the use of the business key cannot be effectively controlled. This requires the business key owner to manage the business key effectively, including authenticating the identity of the user of the business key, and granting permission to the corresponding business key if the identity meets the requirements. But at present, there is no effective way to judge the identity of the user, and the use of the service key cannot be effectively managed, thus causing potential safety hazards in the process of using the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L29/06
Inventor 孙吉平念龙龙
Owner BEIJING SENSESHIELD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products