SG10202000533XA - Security verification method based on biological feature, client terminal, and server - Google Patents

Security verification method based on biological feature, client terminal, and server

Info

Publication number
SG10202000533XA
SG10202000533XA SG10202000533XA SG10202000533XA SG10202000533XA SG 10202000533X A SG10202000533X A SG 10202000533XA SG 10202000533X A SG10202000533X A SG 10202000533XA SG 10202000533X A SG10202000533X A SG 10202000533XA SG 10202000533X A SG10202000533X A SG 10202000533XA
Authority
SG
Singapore
Prior art keywords
server
method based
client terminal
verification method
security verification
Prior art date
Application number
SG10202000533XA
Inventor
Junsui Lin
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Publication of SG10202000533XA publication Critical patent/SG10202000533XA/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1365Matching; Classification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Computing Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Collating Specific Patterns (AREA)
SG10202000533XA 2015-07-02 2016-06-23 Security verification method based on biological feature, client terminal, and server SG10202000533XA (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510394393.3A CN106330850B (en) 2015-07-02 2015-07-02 Security verification method based on biological characteristics, client and server

Publications (1)

Publication Number Publication Date
SG10202000533XA true SG10202000533XA (en) 2020-03-30

Family

ID=57607902

Family Applications (2)

Application Number Title Priority Date Filing Date
SG10202000533XA SG10202000533XA (en) 2015-07-02 2016-06-23 Security verification method based on biological feature, client terminal, and server
SG11201710590XA SG11201710590XA (en) 2015-07-02 2016-06-23 Security verification method based on biological feature, client terminal, and server

Family Applications After (1)

Application Number Title Priority Date Filing Date
SG11201710590XA SG11201710590XA (en) 2015-07-02 2016-06-23 Security verification method based on biological feature, client terminal, and server

Country Status (9)

Country Link
US (2) US10659230B2 (en)
EP (1) EP3319292B1 (en)
JP (1) JP6882254B2 (en)
KR (1) KR102493744B1 (en)
CN (1) CN106330850B (en)
ES (1) ES2818199T3 (en)
PL (1) PL3319292T3 (en)
SG (2) SG10202000533XA (en)
WO (1) WO2017000829A1 (en)

Families Citing this family (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106330850B (en) 2015-07-02 2020-01-14 创新先进技术有限公司 Security verification method based on biological characteristics, client and server
CN107026836B (en) * 2016-10-28 2020-03-06 阿里巴巴集团控股有限公司 Service implementation method and device
CN107092819B (en) * 2017-03-08 2020-04-14 Oppo广东移动通信有限公司 Fingerprint input inspection method and device
CN107133603A (en) * 2017-05-24 2017-09-05 努比亚技术有限公司 Method, mobile terminal and the computer-readable recording medium for preventing fingerprint from leaking
WO2018227471A1 (en) * 2017-06-15 2018-12-20 深圳市汇顶科技股份有限公司 Secure processing method and apparatus for biometric feature data, sensor, and terminal device
US20190349363A1 (en) * 2018-05-14 2019-11-14 GM Global Technology Operations LLC Biometric authentication with enhanced biometric data protection
US11005971B2 (en) * 2018-08-02 2021-05-11 Paul Swengler System and method for user device authentication or identity validation without passwords or matching tokens
CN109272287A (en) * 2018-08-31 2019-01-25 业成科技(成都)有限公司 System control method, electronic approving system, computer and readable storage medium storing program for executing
CN110932858B (en) * 2018-09-19 2023-05-02 阿里巴巴集团控股有限公司 Authentication method and system
CN109561074A (en) * 2018-10-31 2019-04-02 北京中电华大电子设计有限责任公司 A kind of cloud security system and method for finger print identifying
WO2020091434A1 (en) * 2018-11-02 2020-05-07 엘지전자 주식회사 Method and device for performing authentication by using biometric information in wireless communication system
KR102210620B1 (en) * 2018-12-20 2021-02-02 한국스마트인증 주식회사 Method for Storing Secret Information in Server and Restoring it in Client Terminal
US11075763B2 (en) * 2019-02-15 2021-07-27 International Business Machines Corporation Compute digital signature authentication sign with encrypted key instruction
US11303456B2 (en) 2019-02-15 2022-04-12 International Business Machines Corporation Compute digital signature authentication sign instruction
US11108567B2 (en) 2019-02-15 2021-08-31 International Business Machines Corporation Compute digital signature authentication verify instruction
KR20200100481A (en) * 2019-02-18 2020-08-26 삼성전자주식회사 Electronic device for authenticating biometric information and operating method thereof
US10467398B1 (en) * 2019-03-14 2019-11-05 Alibaba Group Holding Limited Authentication by transmitting information through a human body
CN111988267B (en) * 2019-05-24 2023-10-20 阿里巴巴集团控股有限公司 Authentication method and device for computing equipment
US20220318357A1 (en) * 2019-09-12 2022-10-06 Sony Group Corporation Authentication device, authentication method, program, and information processing device
CN110708326A (en) * 2019-10-14 2020-01-17 北京明略软件系统有限公司 Method and device for determining abnormal probability of service request
US11496466B2 (en) 2019-11-15 2022-11-08 Visa International Service Association Using an enrolled biometric dataset to detect adversarial examples in biometrics-based authentication system
TWI720738B (en) * 2019-12-16 2021-03-01 臺灣網路認證股份有限公司 System for combining architectures of fido and pki to identity user and method thereof
CN111489162A (en) * 2020-04-07 2020-08-04 上海优扬新媒信息技术有限公司 Data processing method and device based on biological characteristics
CN111782107A (en) * 2020-06-30 2020-10-16 联想(北京)有限公司 Information processing method, device, computer system and readable storage medium
CN112104657B (en) * 2020-09-17 2022-10-18 中国建设银行股份有限公司 Information checking method and device
CN112968864A (en) * 2021-01-26 2021-06-15 太原理工大学 Credible IPv6 network service process mechanism
CN113297552B (en) * 2021-02-05 2023-11-17 中国银联股份有限公司 Verification method based on biological characteristic ID chain, verification system and user terminal thereof

Family Cites Families (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6535622B1 (en) * 1999-04-26 2003-03-18 Veridicom, Inc. Method for imaging fingerprints and concealing latent fingerprints
JP2001256191A (en) * 2000-03-09 2001-09-21 Mitsubishi Electric Corp Network fingerprint authentication system
KR20030097847A (en) * 2001-05-02 2003-12-31 시큐젠 코포레이션 Authenticating user on computer network for biometric information
DE60237833D1 (en) * 2001-07-18 2010-11-11 Daon Holdings Ltd DISTRIBUTED NETWORK SYSTEM WITH BIOMETRIC ACCESS TESTING
US7400749B2 (en) * 2002-07-08 2008-07-15 Activcard Ireland Limited Method and apparatus for supporting a biometric registration performed on an authentication server
US20070016777A1 (en) * 2005-07-08 2007-01-18 Henderson James D Method of and system for biometric-based access to secure resources with dual authentication
JPWO2007094165A1 (en) * 2006-02-15 2009-07-02 日本電気株式会社 Identification system and program, and identification method
JP4616335B2 (en) * 2006-04-21 2011-01-19 三菱電機株式会社 Authentication server device, terminal device, authentication system, and authentication method
JP2008176407A (en) * 2007-01-16 2008-07-31 Toshiba Corp Biometrics system, device, and program
JP5028194B2 (en) * 2007-09-06 2012-09-19 株式会社日立製作所 Authentication server, client terminal, biometric authentication system, method and program
CN101330386A (en) * 2008-05-19 2008-12-24 刘洪利 Authentication system based on biological characteristics and identification authentication method thereof
JP5147673B2 (en) * 2008-12-18 2013-02-20 株式会社日立製作所 Biometric authentication system and method
JP2010244365A (en) * 2009-04-07 2010-10-28 Sony Corp Device and method for providing service, server and method for authenticating biometric information, program, and service providing system
CN101958792A (en) * 2009-07-17 2011-01-26 华为技术有限公司 Method and device for authenticating finger print of user
US20110083018A1 (en) * 2009-10-06 2011-04-07 Validity Sensors, Inc. Secure User Authentication
US8566904B2 (en) * 2009-12-14 2013-10-22 Ceelox Patents, LLC Enterprise biometric authentication system for a windows biometric framework
JP5309088B2 (en) * 2010-06-21 2013-10-09 株式会社日立製作所 Biometric information registration method, template usage application method, and authentication method in biometric authentication system
EP2624160B1 (en) * 2010-09-30 2018-12-26 Panasonic Corporation Biometric authentication system, communication terminal device, biometric authentication device, and biometric authentication method
WO2012081126A1 (en) * 2010-12-17 2012-06-21 富士通株式会社 Biometric authentication device, biometric authentication method, and computer program for biometric authentication
CN102646190B (en) * 2012-03-19 2018-05-08 深圳市腾讯计算机系统有限公司 A kind of authentication method based on biological characteristic, apparatus and system
CN102916968B (en) * 2012-10-29 2016-01-27 北京天诚盛业科技有限公司 Identity identifying method, authentication server and identification authentication system
EP2813961B1 (en) * 2013-05-13 2016-08-24 Ira Konvalinka Biometric verification with improved privacy and network performance in client-server networks
CN103368745A (en) * 2013-07-19 2013-10-23 江南大学 User identity strong authentication method for educational information resource guarantee
CN105474573B (en) * 2013-09-19 2019-02-15 英特尔公司 For synchronizing and restoring the technology of reference template
CN104639517B (en) * 2013-11-15 2019-09-17 阿里巴巴集团控股有限公司 The method and apparatus for carrying out authentication using human body biological characteristics
CN106330850B (en) 2015-07-02 2020-01-14 创新先进技术有限公司 Security verification method based on biological characteristics, client and server

Also Published As

Publication number Publication date
US10659230B2 (en) 2020-05-19
US20200280445A1 (en) 2020-09-03
US20180145833A1 (en) 2018-05-24
WO2017000829A1 (en) 2017-01-05
KR20180026508A (en) 2018-03-12
PL3319292T3 (en) 2020-12-28
SG11201710590XA (en) 2018-01-30
JP6882254B2 (en) 2021-06-02
US10892896B2 (en) 2021-01-12
EP3319292A4 (en) 2018-06-27
CN106330850A (en) 2017-01-11
CN106330850B (en) 2020-01-14
ES2818199T3 (en) 2021-04-09
KR102493744B1 (en) 2023-01-30
EP3319292B1 (en) 2020-08-26
EP3319292A1 (en) 2018-05-09
JP2018521417A (en) 2018-08-02

Similar Documents

Publication Publication Date Title
SG10202000533XA (en) Security verification method based on biological feature, client terminal, and server
SG10202108677WA (en) Trusted login method, server, and system
EP3489877A4 (en) Risk identification method, client device, and risk identification system
HK1221795A1 (en) Method and device for identity authentication, terminal and server
EP3407562A4 (en) Coflow recognition method and system, and server using method
EP3393086A4 (en) Security processing method and server
HK1215766A1 (en) Method and system for verifying identity, method for processing server data and server
PT3148112T (en) Information processing method, network node, authentication method and server
HK1208971A1 (en) Method, device and system for verifying client device identity by using social relationship data
EP3258642A4 (en) Security authentication system for online website member login and method thereof
SG11201706345WA (en) System and method for user identity verification, and client and server by use thereof
EP3499836A4 (en) Authentication method, device and authentication client
EP3316544A4 (en) Token generation and authentication method, and authentication server
EP3101645A4 (en) Secret calculation method, secret calculation system, secret calculation server, registrant terminal, user terminal and program
HK1254160A1 (en) Information processing system, information processing method, program, server, and information processing terminal
HK1213384A1 (en) Verification method, verification system, server and terminal
EP3206329A4 (en) Security check method, device, terminal and server
HK1221345A1 (en) Method, client, server-side and system for identity verification
HK1217802A1 (en) Payment processing server, payment system and payment method
HK1213706A1 (en) Method for processing password, server and system
IL265408A (en) Authentication server, authentication system and method
HK1221570A1 (en) Method, system, client and server for verifying information
EP3334086A4 (en) Online authentication method based on smart card, smart card and authentication server
EP3376709A4 (en) Authentication control system, server device, client device, authentication control method, authentication method, and program
HK1204852A2 (en) An e-tag and authentication method, device and system