[go: up one dir, main page]

TW201042487A - Remote identity authentication method for verification based on biometrics - Google Patents

Remote identity authentication method for verification based on biometrics Download PDF

Info

Publication number
TW201042487A
TW201042487A TW98117214A TW98117214A TW201042487A TW 201042487 A TW201042487 A TW 201042487A TW 98117214 A TW98117214 A TW 98117214A TW 98117214 A TW98117214 A TW 98117214A TW 201042487 A TW201042487 A TW 201042487A
Authority
TW
Taiwan
Prior art keywords
information
user device
user
time
confirmed
Prior art date
Application number
TW98117214A
Other languages
Chinese (zh)
Other versions
TWI398791B (en
Inventor
Jin-Ling Chen
chao-yang Xu
Jin-Ke Zhan
Original Assignee
Univ Chaoyang Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Univ Chaoyang Technology filed Critical Univ Chaoyang Technology
Priority to TW98117214A priority Critical patent/TW201042487A/en
Publication of TW201042487A publication Critical patent/TW201042487A/en
Application granted granted Critical
Publication of TWI398791B publication Critical patent/TWI398791B/zh

Links

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Collating Specific Patterns (AREA)

Abstract

Provided is a remote identity authentication method for verification based on biometrics. The authentication process makes use of biometrics information, hash function operation and exclusive-OR operation to not only reduce the overall system computation and the condition requirement of computing capability, but also satisfy the living convenience for modern people. In addition, when the secret information in the device held by the user is leaked, a complete security can still be kept. Therefore, it is able to resist resending attack, insider attack and denial of service attack, or prevent the verification table from being stolen, and proceed information verification during login.

Description

201042487 六、發明說明: 【發明所屬之技術領域】 本發明係與遠端身份認證機制有關,特別是指一種以 生物特徵為驗證基礎之遠端身份認證方法。 【先前技術】 按’在身份§忍證機制的沿革中,Lamport在1981年首 先長:出了一個動態密碼資訊(Dynamic passw〇r(j)的認證機 制其作法係在伺服器儲存一個驗證表(Veriflcati〇n tabie) 來認證用戶裝置是否合法。因此,若當伺服器遭到入侵, 此驗證表可能會有被竊取或是修改的威脅。 現代由於智慧卡(Smart card)擁有記憶功能、邏輯運 算、資料控官以及可攜性等特性,在遠端認證機制的設計 上受到許多學者們所廣泛地採用。然而,智慧卡若是沒有 達到相互5忍證(Mutual authentication)的要求,則可能造成 欺騙攻擊(Server spooflng attack) ; Chien 等人在 2〇〇2 年提 出了一個使用智慧卡系統輔助儲存認證用的機制,採用雜 凑函數(Hash function) (NIST FIB PUB 180-2, 2002)結合智 慧卡的方式來進行遠端認證,其具有以下的優點:⑴用 戶裝置在s主冊時可自由地選擇所要之密碼資訊;(2)在伺 服器端不需使用任何的驗證表來認證合法用戶裝置;(3) 達到了相互認證,令合法用戶裝置與伺服器可以認證彼 此,(4)完全基於雜凑函數運算,降低了整體的運算成本。 不過,前述機制依然會讓伺服器遭受到平行會議攻擊 3 201042487 (Parallel session attack)、反射攻擊(Reflection attack)、内部 攻擊(Insider attack)和密瑪資訊猜測攻擊(Password guessing attack),而產生重要資料被竊取的問題。 僅管許多搭配智慧卡的機制後續被提出,不過皆是假 設智慧卡内的資訊是安全且無法洩露的情況下,但事實 上,在Kocher等人、Messerges等人、以及Yen和j0ye等 人的研究中提到智慧卡内的秘密資訊係可經由截取、分析 導致其内容被洩露破解,因此智慧卡在安全性上遭受到了 質疑。Liao等人首先提出了十個準則來做為評估遠端認證 機制的標準,同時他們也證明所提出的機制即使在智慧卡 遺失的情況下也能夠滿足這十個準則,並且抵擋各種的攻 擊。不過Xiang等人卻指出Liao的機制具有被密碼資訊猜 測攻擊(Password guessing attack)、偽冒攻擊(1〇11)奶〇11如〇11 attack)和阻斷服務攻擊(Denial of service attack)等弱點。然 而Wang等人提出了雙變異雜湊函數(Tw〇_variant池止丨叩 operation)的機制,即使是智慧卡内的秘密資訊都被洩露時 也能抵擋密碼資訊猜測攻擊。可是最近γ〇〇η等人表示 Wang的_仍有安全性上的隱憂,像是沒有献前向秘密 (Forward Secrecy)以及依然遭受到密碼資訊猜測攻擊 (Password guessing attack)之隱憂。 生物辨識(m〇metric)是利用人體生理上(physi〇1〇gicai) 的身體器官組織’例如:指紋、臉部、聲音、虹膜等,及 行為模式(Be—⑽徵,例如:打字按鍵動態辨識,來 識別某人的身份’由於生理上的魏是由DNA所決定, 201042487 除了具有唯一性(Uniqueness),極難被複製或偽造之外,和 傳統的身份認證技術上最大的不同在於它不是認物,例 如·智慧卡,而是認人,並且根據文獻J〇yce和Gupta,Kim 指出將下面三種形態的方法結合在一起有助於提高整體系. 統的安全性:(1)個人所知(s〇methingy〇ukn〇w),例如··密 碼資§fl,(2)個人所有的(s〇methingy〇uhave),例如:智慧 卡’(3)個人所具備的(s〇mething y〇u啦),例如:個人生 理特徵;因此有越來越多人湘這樣的結果來設計遠端認 證協定。201042487 VI. Description of the Invention: [Technical Field] The present invention relates to a remote identity authentication mechanism, and in particular to a remote identity authentication method based on biometrics. [Prior Art] According to the evolution of the identity § forbearance mechanism, Lamport first grew in 1981: a dynamic password information (Dynamic passw〇r (j) authentication mechanism is used to store a verification form on the server. (Veriflcati〇n tabie) to authenticate the user device is legal. Therefore, if the server is compromised, this verification form may be threatened by theft or modification. Modern because smart card has memory function, logic Features such as computing, data controllers, and portability are widely used by many scholars in the design of remote authentication mechanisms. However, if the smart card does not meet the Mutual authentication requirements, it may result in Server spooflng attack; Chien et al. proposed a mechanism for using the smart card system to assist storage authentication in 2002, using a hash function (NIST FIB PUB 180-2, 2002). The smart card method for remote authentication has the following advantages: (1) the user device can freely select the desired password information when the s main book is located; (2) The server does not need to use any authentication table to authenticate legitimate user devices; (3) mutual authentication is achieved, so that legitimate user devices and servers can authenticate each other, and (4) completely based on hash function operations, reducing overall operations Cost. However, the aforementioned mechanism will still cause the server to suffer from Parallel session attack, Reflection attack, Insider attack, and Password guessing attack. The problem of stealing important data is generated. Although many mechanisms for matching smart cards are subsequently proposed, it is assumed that the information in the smart card is safe and cannot be disclosed, but in fact, in Kocher et al., Messerges et al. And the research of Yen and j0ye et al. mentioned that the secret information in the smart card can be cracked and intercepted through interception and analysis, so the smart card has been questioned in terms of security. Liao et al first proposed ten Guidelines are used as criteria for evaluating remote authentication mechanisms, and they also demonstrate the proposed mechanism even In the case of a lost smart card, the ten criteria can be met, and various attacks can be resisted. However, Xiang et al. pointed out that Liao's mechanism has a password guessing attack and a fake attack (1〇11). 〇11 such as 11 attack) and the damage service (Denial of service attack) and other weaknesses. However, Wang et al. proposed a mechanism for the double-variant hash function (Tw〇_variant pool operation), which can resist password information guessing attacks even when the secret information in the smart card is leaked. However, recently γ〇〇η et al. said that Wang's _ still has security concerns, such as the lack of forward secrets (Forward Secrecy) and the fear of still being subjected to password guessing attack. Biometric (m〇metric) is the use of human body physiology (physi〇1〇gicai) body organ organization 'for example: fingerprint, face, sound, iris, etc., and behavioral patterns (Be-(10) sign, for example: typing button dynamics Identification, to identify someone's identity' Because the physiological Wei is determined by DNA, 201042487 In addition to being unique, it is extremely difficult to be copied or forged, the biggest difference from traditional identity authentication technology is that it It is not a recognition, such as a smart card, but a recognition, and according to the literature J〇yce and Gupta, Kim points out that combining the following three forms of methods helps to improve the safety of the overall system: (1) personal Know (s〇methingy〇ukn〇w), for example, cryptography §fl, (2) personally owned (s〇methingy〇uhave), for example: smart card '(3) possessed by the individual (s〇mething y 〇u 啦), for example: personal physiology; therefore, there are more and more people like this to design a remote authentication protocol.

Lee等人提出了一個基於指紋辨識並且搭配智慧卡的 遠端認證機制,在這方法中,感知H會將用戶裝置註冊時 的指紋處理成-個數錢階影像,軟體通常會記錄指紋上 的數個特徵點’然後運算主要特徵點之間的距離和角度, 定義出一個「模板」;再利用演算法將幾何關係轉換成-組 獨特的數字,絲識別指紋,藉以識別制者。—旦將前 述使用者模板登錄在智慧卡的記紐内,日後,該使用奢 ,手指放到生物特徵取得裝置上的時候,系統只會再次運 ,他的模板’然後與原先儲存的模板進行比對,判斷兩奢 是否正確’獨此種系_财著些許的漏叫致遭受到 【發明内容】 本發明之主要目的在於提供一種以生物特徵為驗證基 礎之遠端身份認證方法,其*但可以_上述衫攻擊形 5 201042487 式,滿足現代人生活上的資訊便利性與安全性,即使是在 系統内的㈣資訊都被茂露時,也能抵擋密碼資訊猜測攻 擊。 為了達成前述目的,依據本發明所提供之一種以生物 特徵為驗證基礎之遠端身份認證方法,包含有:註冊一 使用者經由i戶裝置[舰器註冊後產生—註冊資 訊;該用戶裝置包含-生物特徵取得裝置;該使用者提供 該用戶裝置至少-綠資訊、一㈣f訊和—生物特徵模 板’該用戶裝置提供-第-亂數值,該伺服器具有一私密 金錄;該生物舰模板_㈣讀由該生物特徵取得裝 置將自己的生物特徵所轉換而成;該註冊資訊包含一秘密 資訊和-比對錄,該秘密資訊和紐數係由該私密 金錄、,第-亂數值、贿碼#訊、錢該身份資訊經過 至少-單向運算所產生;該伺服器係將該註冊資訊傳送至 該用戶裝置並且儲存於制戶裝置;登人及驗證:在該使 用者經由剌戶裝置請求登人該恤科,係由該使用者 對該用戶裝置輸人-待確認身份資訊、—待確認密碼資訊 以及-待確認生物特徵模板,該用戶裝置即以該待確認身 份資訊、該待確認密碼資訊、該待確認生物特徵模板、以 及該第-亂數值為已知因數來對該秘密資訊施以該單向運 算’來求得-待轉參數’將該待tb對參數與該 進行比對;比對結果如果不正確,則中斷該用戶裝置的登 入動作;比對結果如果正確,則該用戶裝置即將一第二亂 數值傳送至該伺服器,該伺服器即依該第二亂數值取代該 201042487 卜爾L數值,且產生一新秘密資訊,並再將該新秘密資訊 傳送至顧戶裝置取代該秘密資訊;其中該新秘密資訊是 配口 ”亥第一 iL數值的改變而重新經過該單向運算取得的。 【實施方式】 為了詳細說明本發明之技術及特點所在,兹舉以下之 較佳實施例並配合圖式說明如后: Ο 〇 明參閲第-至四圖’本發明一較佳實施例所提供之— 以生物特徵為驗證基礎之遠端身份紐方法,包含 ^置ί/彳伺服器P該用戶裝置V包含—生物特徵取得 該生物特徵取得裝置則系用以擷取使用者之生物 用徵2 ’並1運算獲得一生物特徵模板F;該伺服器5,係 二接受齡後,輸H存取以及運算處理資訊。該以 生物特徵為紐基叙遠端㈣認證方法之說明如 一、註冊階段 · 如第-圖所示’使用者想要取得該伺服^的服務 時’他必須得先經由制戶裝置㈣該他器,行社冊, 而後該飼服便會運算使用者所提交的資訊,並將運算 後所仔之-註冊資tfUZ)透過安全通道轉至該肖 並儲存於該用戶裝置"中,細節敘述如下: " 步驟-:使用者輸入-身份資訊仍和一密竭資訊挪, 而該用戶裝置ί/隨機產生之-第一亂數值觸,並且以該 碼資訊挪和該第一亂數值·丨為因數,先進行互 ^ 以雜凑運算出-第-參數。其運算如下列第i式所示异再 第1式) 7 201042487 另外使用者將手指放置該生物特徵取得裴置肪 指紋特徵值並運算獲得該生物難F ;在本實 以指紋為例,事實上射以是視_、腳趾紋或臉部特徵复 中之-或上述生物特徵的混合;最後,將該身份資訊仍、ς 第-參數β和該生物特徵模板,傳送給該舰^進行註冊:乂 步驟二··當該伺服^收到步驟—中該用戶裝置哨傳 來的訊息時’該伺服器緣行下列運算產生—第—密碼雜凑 Vw。该第-密碼雜凑值_係以該密碼資訊哪和該第、 ,鑛:先進行互斥或運算後進行_運算,接著再和該生 特徵模板F共同為因數地進行互斥或運算所得, 列第2式所示: ,、咬㈣卜 hpw^hiPW®!^)®!^ (第2式) 該註冊資訊奶包含有一秘密資訊作一比對參數户其 2該秘密資訊讀由該身份資訊時—該舰器崎具有的 ^金^先進行互斥或運算再進行雜凑函數運算,接著再盥 2戶 =碼雜凑值—進行互斥或運算所得,其運算如下列第 及-厶(仍㊉文)㊉Α/λψ / 上 (第3式) 該比=參數\係由該身份資訊,時該私密金鑰X先進行 斥,運异再與該生物賴模板續過祕函數運算所得 ®,其運鼻如下列第4式所示: (第 4式) =驟三:當該飼服器續算並產生該註冊資訊讀 傳至顧戶裝如,並且儲存於該用外置 步驟四.當用戶裝置α收到該註冊資訊奶係先將其儲存 201042487 至該用戶裝置ί/内,而後使用者再將該第一亂數值ΛΑ%輸入該 用戶裝置内,以解決日後所需記憶的麻煩。 二、登入階段 在第二圖中表示了整個登入階段的流程。當註冊完成之 後,若使用者欲登入該伺服器S取得服務或是存取資源,係先 輸入一待確認身份資訊/仏„及一待確認密碼資訊至該用戶 裝置中,再將使用者手指放至該生物特徵取得裝置55上掃描 Ο Ο 取得一待確認生物特徵模板之後該用戶裝置^執行下 驟: 訊/D, 步驟一:該用戶裝置_用使用者所輸入該待確認身份資 .、該待確認密石馬資訊…和該待確認生 得 二”雜凑值其運算過轉由該 凑運算’接著再和該待確認生物特徵模板f 雜 行互斥或得出,其糖如下咐5 ^所;^翻數地進 = A(尸 I ㊉游G|) φ & 再運用該秘密資訊,和該待確認第 (第5式) 行互斥或運算得出1二參數Ρ2,/麵凑值㈣,進 P2=R®hPwid„ 、 下列第6式所示: 最後,該用戶震置"藉由該第二參數 (第6式) 徵模板匕經過雜凑函數運算出 2該待確認生物特 對參數L比對,其運算和判別式如下列,~ ’並與該比Lee et al. proposed a remote authentication mechanism based on fingerprint identification and with a smart card. In this method, the perception H will process the fingerprint of the user device into a number of money images, and the software usually records the fingerprint. Several feature points 'then operate the distance and angle between the main feature points to define a "template"; then use the algorithm to convert the geometric relationship into a unique set of numbers, and the silk recognizes the fingerprint to identify the maker. Once the user template is registered in the smart card's note, in the future, when the luxury is used and the finger is placed on the biometric acquisition device, the system will only be shipped again, and his template 'and then the template stored previously. Alignment, judging whether the two luxurys are correct or not. The main purpose of the present invention is to provide a remote identity authentication method based on biometrics verification, which* However, it can be used to meet the information convenience and security of modern people's life. Even when the information in the system is exposed, it can resist the password information guessing attack. In order to achieve the foregoing objective, a remote identity authentication method based on biometrics provided by the present invention includes: registering a user via an i-home device [generated after registration of a ship-registering information; the user device includes a biometric acquisition device; the user providing the user device at least - green information, one (four) f message, and - biometric template 'the user device provides a - chaotic value, the server has a private record; the bioship template _ (4) reading by the biometric acquisition device to convert its own biometrics; the registration information includes a secret information and a comparison record, the secret information and the number of the key is recorded by the private record, the first-random value The bribe code #讯, money the identity information is generated by at least a one-way operation; the server transmits the registration information to the user device and is stored in the user device; the person and the verification: at the user via the user The user device requests to board the user, and the user inputs the user device to be confirmed - the identity information to be confirmed, the password information to be confirmed, and the biometric model to be confirmed a user equipment that applies the one-way operation to the secret information by using the identity information to be confirmed, the password information to be confirmed, the biometric template to be confirmed, and the first chaotic value as a known factor. The parameter to be transferred is compared with the parameter of the parameter to be tb; if the result of the comparison is incorrect, the login action of the user device is interrupted; if the comparison result is correct, the user device is about to obtain a second random value. Transmitting to the server, the server replaces the 201042487 Boer L value according to the second chaotic value, and generates a new secret information, and transmits the new secret information to the account device to replace the secret information; The new secret information is obtained by re-passing the one-way operation with the change of the first iL value of the haikou. [Embodiment] In order to explain the technology and features of the present invention in detail, the following preferred embodiments are combined with the drawings. The following is a description of the following: Ο 参阅 参阅 第 第 ' ' ' ' ' ' ' ' ' ' ' ' ' ' 远端 远端 远端 远端 远端 远端 远端 远端 远端 远端 远端 远端 远端 远端 远端 远端 远端 远端 远端The user device V of the server P includes a biometric feature acquisition device for capturing the biometric feature of the user 2' and 1 to obtain a biometric template F; the server 5, the second receiving age After that, the H access and the operation processing information are input. The description of the biometrics as the remote (4) authentication method is as follows: the registration phase · as shown in the figure - 'when the user wants to obtain the service of the servo ^' He must first pass the manufacturer's device (4) to the other device, and then the book will be processed. Then the feeding service will calculate the information submitted by the user, and then transfer the calculated-registered tfUZ to the xiao through the safe passage. And stored in the user device ", the details are as follows: " Step-: User input - identity information is still with a exhausted information, and the user device ί / randomly generated - the first random value touch, and With the code information and the first chaotic value 丨 as a factor, first perform a hash-computation-first parameter. The calculation is as shown in the following formula i.) 7 201042487 In addition, the user places the finger on the biometric feature to obtain the fat fingerprint feature value and obtains the biological difficulty F. In this case, the fingerprint is taken as an example. The upper shot is a mixture of visual _, toe pattern or facial features - or a mixture of the above biological features; finally, the identity information is still transmitted, the ς-parameter β and the biometric template are transmitted to the ship for registration. :乂Step 2··When the servo^ receives the message from the user device in the step--the server generates the following operation--the password hash Vw. The first-password hash value _ is obtained by using the cipher information and the first, and the mutated or mutated operation, and then performing the _ operation with the ciphertext F, and then mutually exclusive or contiguous with the biometric template F. , column 2 shows: ,, bite (four) hpw^hiPW®!^)®!^ (Type 2) The registration information milk contains a secret information for a comparison parameter 2 of which the secret information is read by Identity information—the ship’s ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ -厶(still ten) tenΑ/λψ / on (3rd type) The ratio=parameter\ is the identity information, when the private key X is first repudiated, and then the same function is continued with the biological template. The calculated result is as shown in the following formula: (Form 4) = Step 3: When the feeding device continues to calculate and the registration information is generated, it is transmitted to the household and is stored in the application. Step 4: When the user device α receives the registration information, the milk system first stores it in 201042487 to the user device ί/, and then the user The first arbitrary value ΛΑ% within the user input means to solve the problems in the future need to remember. Second, the login phase In the second figure, the process of the entire login phase is shown. After the registration is completed, if the user wants to log in to the server S to obtain a service or access a resource, the user first enters a confirmation identity information/仏 and a pending password information to the user device, and then the user's finger. After the biometric feature acquisition device 55 scans Ο 取得 to obtain a biometric template to be confirmed, the user device performs the following step: message/D, step 1: the user device _ inputs the identity to be confirmed by the user. The tombstone information to be confirmed... and the to-be-confirmed 2" hash value is calculated by the "complex operation" and then reconciled with the biometric template f to be confirmed, and the sugar is as follows: 5 ^所;^翻数地进= A (尸I 十游G|) φ & and then use the secret information, and the to-be-confirmed (5th) line mutually exclusive or operate to obtain a two-parameter Ρ2, / face value (four), into P2 = R ® hPwid „, the following formula 6: Finally, the user is shocked " by the second parameter (type 6) levy template 匕 through the hash function operation 2 The biometric pair to be confirmed is aligned with the parameter L, and its operation and discriminant are as follows, ~ And the ratio of

Pid» = hPi(Fldn) 和 8 式所示: pi^ = pc (第 7式) 若是比對的結果一致,則繼續 (第8式) 讀仃下個步驟;否則立即結 9 201042487 束這次的登入請求。 步驟二:該用戶裝置"產生與該第一亂數值/WG,不重覆的 一第二亂數值’並產生下列一亂數確認資訊(:咖以及— 時間雜湊值Cr詢問該伺服器s ;其中,該亂數確認資 由該第二亂數值/與該第二參數A進行互斥或運算求得,農 運算如下列第9式所示: 、 :/WG20/>2 (第9式) 該時間雜湊值cr則係由該第二亂數值進行雜凑函 數運算後再與-用戶裝置時戳進行互斥或運算再進行雜凑 函數運算所求得,其運算如下列第1〇式所示: '、 (第ίο式) CT = Ap2 (h(RNG2 )@TU) >步驟三:該用戶震置r將該待破認身份資訊仍‘、該亂數 確認資訊〇_、該時間雜凑值心和該用戶裝置時戳[傳 該伺服器s。 u 、 三、驗證階段 在第三圖中表示了整個驗證階段的流程。當該伺服器$ 收到該用戶裝置t/所發送的該待確認身份資訊I、該亂數確 認資訊C·、該時間雜凑值Cr和該用户裝置時觀該词服 器对進行下面的驗證步驟’‘然後決枝否允許該用戶襄如 登入至該伺服H讀存取其#源。糾,#則戶裝置"驗證 為合法後’該伺服器s會回應該用戶裝置r,讓其同樣地可確 認該伺服器s的正確與否。 步驟-:該飼服&首先確認該待確認身份資訊%”的格 式是否正確。若是錯合’服絕財的登入請求。 步驟二:該伺服器5產生—伺服器時戳7;,該伺服器時戳Γ 10 201042487 係從該伺服器5收到前一階段之步驟三 下時間所得。該伺服器_伺服器時戳心 ,:間的差值,來判斷是否在一預定的時間差㈣,該S 差ΔΓ表示傳輸延遲的合理時間區間, w f曰1 △Τ'則 驟 拒絕這次的登人請求,關進行下大於鱗間差 鑰X,來驗證所收到的 步驟二:該伺服器S利用該私密金 訊息,過程如下: Ο Ο 首先,該伺服器續用該待確認身份資訊仏與該私密金 細爾_算,接_該亂數確 互斥或轉得到—第三參心,其· 11式所示: P3 = C祕 ® h(lDidn ® X、 ^ (第11式) 接者,該舰imx該第三參數“因數算出其雜凑函數 值’再和觸戶裝置時進行互斥或運算,_與該待初 身份資訊I與難密金I進㈣㈣數運算,得出一待比 對時間雜湊值‘,然後將該待__雜凑值^與該時間 雜湊值Q比對’其運算和判別式如下列第12和13式所示:Pid» = hPi(Fldn) and 8: pi^ = pc (7th) If the result of the comparison is the same, continue (8th) and read the next step; otherwise, immediately 9 201042487 Login request. Step 2: The user device " generates a second chaotic value with the first chaotic value / WG, does not repeat 'and generates the following random number confirmation information (: coffee and - time hash value Cr asks the server s Wherein, the random number confirmation is obtained by mutually exclusive or calculating the second random number/the second parameter A, and the agricultural operation is as shown in the following formula: 9, :WG20/>2 (9th Equation) The time hash value cr is obtained by performing the hash function operation on the second random number and then mutually exclusive or computing with the user device time stamp and then performing the hash function operation, and the operation is as follows: As shown in the formula: ', (第ίο式) CT = Ap2 (h(RNG2)@TU) > Step 3: The user shakes r to confirm the identity information to be broken, and the random number confirms the information 〇_, The time hash value and the user device timestamp [pass the server s. u, three, the verification phase in the third figure shows the flow of the entire verification phase. When the server $ receives the user device t / The sent identity information I to be sent, the random number confirmation information C·, the time hash value Cr, and the user device view the word service Do the following verification step '' and then decide whether to allow the user to log in to the servo H to access its # source. Correct, #的户装置" Verify that it is legal after the server s will respond to the user The device r can be similarly confirmed whether the server s is correct or not. Step-: The feeding service & first confirms that the format of the identity information to be confirmed is "" correct. If it is a mismatched login request Step 2: The server 5 generates a server time stamp 7; the server time stamp Γ 10 201042487 is obtained from the server 5 after receiving the third step of the previous stage. The server _ server time Poke the heart, the difference between the two, to determine whether it is a predetermined time difference (four), the S difference ΔΓ indicates a reasonable time interval of the transmission delay, wf曰1 △Τ' then rejects the request for the arrival, and the closing is greater than The difference key X between the scales is used to verify the received step 2: the server S uses the private gold message as follows: Ο Ο First, the server continues to use the identity information to be confirmed and the private key _ Count, the _ the chaos is mutually exclusive or transferred - The third sacred, its 11 formula: P3 = C secret ® h (lDidn ® X, ^ (11th)), the ship imx the third parameter "factor calculates its hash function value" Mutual exclusion or operation with the touch device, _ with the initial identity information I and the difficult gold I enter (four) (four) number operation, get a waiting time cumbersome value ', and then the __ hash value ^ Compared with the time hash value Q, its operation and discriminant are as shown in the following 12th and 13th formulas:

Cw = ’)(办⑺)㊉ 7;) (第 12 气)Cw = ’) (do (7)) 10 7;) (12th gas)

Ct 士 Ct (第 13 式) 若是其比對結果不-致,則結束這次的登人請求;否_ 伺服器s相信該用戶裝置^;為合法的用戶裝置並允許其登入^ 以及進行下-個轉,並且暫雜地將鱗確認身份資訊% 記錄起來,直到雙方溝通結束為止。 咖 步驟四:當該伺服器s·驗證該用戶装置^為合法用戶裝置 201042487 後’該伺服運算產生—回應訊息^給該用戶裝置"。該用 戶裝置"係由該待確認身份資訊I與該私密金鑰,互斥或運 算之後^行雜凑函數運算’再與該第三參私及_服器時戮Ct Ct (13th) If the result of the comparison is not correct, the request for the arrival is terminated; no _ the server s believes that the user device ^; is a legitimate user device and allows it to log in ^ and proceed - Turn around, and temporarily record the scale identification information % until the end of the communication. Step 4: When the server s• verifies that the user device is a legitimate user device 201042487, the servo operation generates a response message to the user device. The user device " is mutually exclusive or operated by the identity information I to be confirmed, and the hash function operation is performed after the third privilege and the server.

=進灯串接相運算,柄求魏喃訊息〜,其運算 第14式所示·· J Q =顺/%”㊉叫| />3 |丨[) (第J 4式) >步驟五.當該用戶裝置陳到自該舰&所傳回的該回 應》fU、c„p ’便執行下_運算來確雛値&是否正確: 〜步=五之-:運用—用戶即時時敗與鋪服器時戮『運 异’右疋_戶即時時戳L與軸服器時歡間之差值大於該 時間差τ ’則中斷連線’否則進行下—個步驟。 步驟五之二: 、運用該第一參數A、該第二亂數值騰2和該飼服器時戳^ 進行串接連結運算,再以其值朗數進行雜凑函數運算,並比 對該回應訊息Q,其·式如下列第I5式所示:=Incoming lamp series phase operation, the handle is Wei Wei message~, its operation is shown in the formula 14·· JQ = 顺/%" 十叫| />3 |丨[) (J4) > 5. When the user device arrives at the response "fU, c„p ' returned by the ship & and then performs the next _ operation to determine whether the 値 &; is correct: ~ step = five - - use - user When the time is lost and the shop is 戮 运 运 运 疋 right 疋 _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Step 5 bis: using the first parameter A, the second chaotic value Teng 2, and the feeding device time stamp ^ to perform a tandem connection operation, and then performing a hash function operation with the value of the value, and comparing In response to the message Q, the formula is as shown in the following formula I5:

Kparng.wt^^c^ (第15式) 、μ右疋不一致,則中斷連線結束與該伺服器$的交談;否則 運鼻下面冑祕⑨資訊,以及糊先前所產生的第二亂數 值取代原先該用戶裝置ν裡的該秘密資訊*和該第一亂數 勒t,讓該用戶裝置時每—次登人^成之後,會動態地改 :敦置内的秘③、資訊π。該用戶裝置u運用該待確認密碼資 和該第二亂數值鑛2互斥或運算後㈣用雜湊函數運 算丄接著再與該待確認生物特徵模板匕”互斥《運算出-新第 费碼雜湊值;,其運算如下列第16式所示: 12 201042487 娜Wdn (第16式) 該新秘«訊um由該秘密資•、該第—密碼雜凑 t以及該新第—密碼雜凑值k進行互斥或運算 運异如下列第17式所示: 及new =及㊉hpw㊉hpw new (第 17 式) 四、變換密碼資訊階段 Ο Ο 第四圖表示了變換密碼資訊w個流程。當用戶 綠冊完成之後’他可以隨時自由地變更該密碼資訊沙,(並 ^不須要透職舰|^_助,提高_銳祝檢測的效 和__ζ先^動該用戶裝置"’並且輸人—通行身份資訊 #通㈣碼貧訊I以及將手指放置該生物特徵取得裝 2截取其特徵值運算一通行生物特徵模板^,一旦該用戶 置,過雜證後’即可提交—新密碼資訊^來做更新。 其細郎如下面描述: 步驟》亥用戶裝置U利用使用者輸入的資訊做以下驗 先由該通行㈣資訊^和該第—亂數值篇先進行互斥 21後進行雜凑運算,再和該通行生物特徵模板‘共同為 因數地進行互斥或運算所得運算出一通行第一密碼雜湊值 咖%,,其運算如下列第18式所示: —陶,PW,mG'卿陶 (第18式) =用該秘密資訊作該通行第一密碼雜湊值^進行 〆運算’最後’该用戶裝置以藉由前述運算值和該通行認 201042487 生物特徵模板匕„經過雜湊函數運算,並與該比對參 對’若是比對的結果-致’則繼續執行下個步驟;立= 束這次的登入請求,其判別式如下列第19式所示. (第19式) 即可提交該新密臂訊^ 若是該用戶裝置c/通過驗證, 並進行下一個步驟。 步驟二:該用戶裝置"利用該新密碼資訊沙 的運算,並更概其内容以完賴換密碼資訊的料. 新密碼資訊U 口該第-亂數值,先進行互斥或運算後= 行雜湊運算’再和該通行生物特徵模板心制為因數地進行 互斥或運算所得運算出-更新後第—密碼雜凑值_ ^其運 算如下列第18式所示: 糾 、 (第18式) hP'pd = hdw ® RNG)® Fpass 則係由該秘密資訊λ、該第一密碼 一更新後秘密資訊 雜凑值_錢該練後帛1雜難__進行互斥或運算 求得,其運算如下列第19式所示: (第19式)Kparng.wt^^c^ (15th formula), μ right 疋 is inconsistent, then the end of the connection is disconnected from the server $; otherwise, under the nose, 9 information, and the second chaotic value generated by the paste Replacing the secret information* and the first random number t in the original user device ν, the user device dynamically changes the secret 3 and the information π in the temporary setting after the user device is added. The user device u uses the to-be-confirmed password and the second chaotic value mine 2 to mutually exclusive or operate (4) with a hash function operation, and then with the to-be-confirmed biometric template 匕" mutually exclusive "calculated - new fee code The hash value; its operation is as shown in the following formula 16: 12 201042487 Na Wdn (16th) The new secret «Xun um by the secret capital ·, the first - password hash t and the new - password hash The value k is mutually exclusive or the operation is as shown in the following 17th: and new = and ten hpw ten hpw new (17th) 4. Transforming the password information stage Ο Ο The fourth figure shows the process of transforming the password information. After the completion of the green book, he can freely change the password information sand at any time, (and ^ does not need to pass the ship | ^ _ help, improve _ sharp wish detection effect and __ ζ first move the user device " 'and lose Person-passage identity information# pass (four) code poor news I and put the finger to the biometric acquisition device 2 intercept its characteristic value operation a pass biometric template ^, once the user sets, after the miscellaneous certificate 'can submit - new password Information ^ to do the update. Its thin Lang is as follows: The user device U uses the information input by the user to perform the following test. The traffic (4) information and the first-disorder value are first mutually exclusive 21 and then hashed, and then the common biometric template is The result of mutual exclusion or operation results in a pass-through first password hash value, and its operation is as shown in the following 18th formula: - Tao, PW, mG 'Qing Tao (18th) = use the secret information Performing the pass-through first cryptographic hash value ^ performing the ' operation 'final' of the user device to perform the hash function calculation by the aforementioned operation value and the pass-through 201042487 biometric template, and to compare with the comparison pair The result - to 'continue to continue the next step; stand = bundle this login request, the discriminant is shown in the following 19th formula. (19th formula) can submit the new secret arm message ^ If the user device c / Pass the verification, and proceed to the next step. Step 2: The user device " utilizes the operation of the new password information sand, and more details of the content to replace the password information. New password information U mouth the first mess Numerical value, first mutual exclusion or transport After the calculation = line hash operation 'and then the general biometric template core system is mutually exclusive or operated by the factor - the updated first - password hash value _ ^ the operation is as shown in the following 18: (Form 18) hP'pd = hdw ® RNG)® Fpass is mutually exclusive by the secret information λ, the first password, the updated secret information hash value, the money, the training, the __ The calculation is obtained, and its operation is as shown in the following 19th formula: (19th formula)

Rupd = R® hpw® hjmu/Ki 由上可知’在本發明解決了遠端用戶裝置認證上的安 全問題’本協定結合了密解機制以及生物特徵辨識的高 安全性;本發鴨可達叙X力效在於·· (-μ用戶裝置時每次的登人訊息皆是動態的,故可 抵擋重送攻擊; (-)系統f理者無法得知或是運算該用戶裝置 u的密 竭資訊,防止了内部攻擊; 201042487 (三) 該用戶裝置t/可自由地選擇或是變換密碼資訊 /w,並且在登入前該用戶裝置r提供了一個極有效率的密 碼資訊檢測; (四) 伺服器端不需要儲存任何的驗證表,阻止了阻斷 服務或是驗證表被竊等攻擊。 【圖式簡單說明】 0 第一圖係本發明一較佳實施例之註冊階段流程圖。 第一圖係本發明一較佳實施例之登入階段流程圖。 第二圖係本發明一較佳實施例之驗證階段流程圖。 第四圖係本發明一較佳實施例之變換密碼資訊階段流 程圖。Rupd = R® hpw® hjmu/Ki It can be seen from the above that 'the invention solves the security problem of remote user device authentication'. This agreement combines the dense solution mechanism and the high security of biometric identification; X force effect lies in ·· (-μ user device every time the login message is dynamic, so it can resist the resend attack; (-) system f can not know or calculate the exhaustion of the user device u Information, preventing internal attacks; 201042487 (3) The user device t/ is free to select or change the password information /w, and the user device r provides an extremely efficient password information detection before logging in; The server does not need to store any verification table, and prevents attacks such as blocking service or verification table being stolen. [Simplified Schematic] 0 The first figure is a flowchart of the registration phase of a preferred embodiment of the present invention. 1 is a flow chart of a login phase of a preferred embodiment of the present invention. The second figure is a flow chart of a verification phase of a preferred embodiment of the present invention. The fourth figure is a process of transforming a password information phase according to a preferred embodiment of the present invention. Figure.

【主要元件符號說明】 用戶裝置f; 生物特徵取得裝置册 註冊資訊肋 密碼資訊户呎 第一參數θ 秘密資訊λ 私密金鑰;C 待確認密碼資訊/^ 待確認第—密鄕凑值㈣ 待比對參數Ρ idn 伺服器S 生物特徵模板F 身份資訊/£) 第一亂數值 第一役竭雜秦值fipW 比對參數p。 待確認身份資訊JD dn 待確認生物特徵模板4 第二參數巧 第二亂數值 15 201042487 亂數確§忍&gt; δίΐ 用戶裝置時戳7: 時間差ΔΓ 待比對時間雜湊值&lt;^_ 用戶即時時戳U 新第一密碼雜湊值冲 通行密碼資訊 新密碼資訊户 更新後第一密碼雜湊值冲 時間雜湊值Cr 伺服器時戳7; 第三參數尸3 回應訊息c„p 新秘密資訊及_ 通行身份資訊叫咖 通行生物特徵模板^ 通行第一密碼雜凑值 更新後秘密資訊心, 16[Main component symbol description] User device f; Biometric acquisition device book registration information rib password information household account first parameter θ secret information λ private key; C pending password information / ^ to be confirmed - secret value (4) Comparison parameter Ρ idn server S biometric template F identity information / £) The first chaotic value of the first dynasty miscellaneous Qin value fipW comparison parameter p. The identity information to be confirmed JD dn The biometric template to be confirmed 4 The second parameter is the second chaotic value 15 201042487 The number of the chaos is ‧ The δ ΐ ΐ User device time stamp 7: Time difference ΔΓ To compare the time hash value <^_ User instant Timestamp U New first password hash value rush password password information new password information household update first password hash value rush time hash value Cr server time stamp 7; third parameter corpse 3 response message c„p new secret information and _ Pass-through identity information called the coffee pass biometric template ^ Pass the first password hash value update after the secret information heart, 16

Claims (1)

201042487 七、申請專利範圍: 種以生物特徵為驗證基礎之遠端身份認證方法, 包含有下列步驟: 續^ -使用者經由―用戶裝置對—舰器註冊後產 纟β冊#4戶裝置包含_生物特徵取得裝置·該 使用者提供該用戶裝置至少一身份資訊、一密碼資訊和一 生物特徵模板,該用戶裝置提供一第一亂數值,該飼服器 Ο 卩有―私密金H生物特徵模板伽使用者藉由該生物 特徵取得裝置將自己的生物特徵所轉換而成;該註冊資訊 13秘③、Μ和—比對參數,該秘密資訊和該比對參數 係由該私密金餘、該第一亂數值、該密碼資訊、以及該身 份資訊經過至少-單向運算所產生;該伺服器係將該註冊 貝讯傳送至該用戶裝置並且儲存於該用戶裝置; 登入及驗證:在該使用者經由該用戶裝置請求登入該 #服11時’係由該使用者對該好裝置輸人-待確認身{八 ° 資訊、—待確鋪碼資訊以及-待確認生物魏模板,^ 帛戶裝置即以該待確認身份資訊、該待確認密碼資訊、該 待確認生物特徵模板、以及該第一亂數值為已知因數^ 該秘密資訊施以該單向運算,來求得一待比對參數將該 待比對參數與該比對參數進行比對; , 比對結果如果不正確,則中斷該用戶裝置的登入動 作;比對結果如果正確,則該用戶裝置即將一第二亂數值 傳送至該伺服器,該伺服器即依該第二亂數值取代該第一 亂數值,且產生-新秘密資訊,並再將該新秘密資訊傳适 17 201042487 至該用戶裝置取代姉㈣訊;其巾鋪秘料訊是配人 該第二亂數值的改變而重新經過該單向運算取得的。σ 2.依據申請專利範圍第1項所述之以生物特徵為驗證 基礎之遠端身份認證方法,其中:在註冊步驟中,該用戶 裝置係將該密碼資訊與該第一亂數值進行互斥或運^後再 代入雜湊函數得到-第-參數,再傳送至該伺服器端整合 於該註冊資訊中。 53201042487 VII. Patent application scope: A remote identity authentication method based on biometrics verification, including the following steps: Continued ^ - User registered via the "user device pair" - ship after the production of the beta book #4 household device contains _ biometric acquisition device: the user provides at least one identity information, a password information and a biometric template of the user device, the user device provides a first chaotic value, and the feeding device has a "private gold H biometric feature" The template gamma user converts the biometric feature by the biometric feature acquisition device; the registration information 13 secret, Μ, and - comparison parameters, the secret information and the comparison parameter are from the private The first random number, the password information, and the identity information are generated by at least one-way operation; the server transmits the registered beta to the user device and is stored in the user device; login and verification: in the When the user requests to log in to the service device 11 via the user device, the user is input to the good device by the user - the body to be confirmed is {8° information, and the information to be confirmed is to be confirmed. And - to confirm the biological Wei template, ^ the household device is to apply the identity information, the to-be-confirmed password information, the to-be-confirmed biometric template, and the first random number as a known factor ^ the secret information The one-way operation is used to obtain a waiting parameter to compare the parameter to be compared with the comparison parameter; if the comparison result is incorrect, the login action of the user device is interrupted; if the comparison result is correct, Then, the user device transmits a second random value to the server, and the server replaces the first random number according to the second random value, and generates a new secret information, and then transmits the new secret information. 201042487 to the user device to replace the 四 (4) news; its towel shop secret message is matched with the change of the second random value and re-acquired through the one-way operation. </ RTI> </ RTI> </ RTI> <RTIgt; </ RTI> <RTIgt; </ RTI> <RTIgt; </ RTI> <RTIgt; </ RTI> <RTIgt; </ RTI> <RTIgt; Or after the ^ and then into the hash function to get the - the - parameter, and then transferred to the server side integrated in the registration information. 53 3.依據申請專職圍第2項所述之以生物特徵為㈣ 基礎之遠端身份認證方法,其中:在登人及驗證步驟中, 该用戶裝置係將該待確認密碼資訊與該第一亂數值進行互 斥或運算後再代入雜湊函數得到一待確認第—密碼雜凑 值,再整合於該待比對參數中。 4.依據中請專利範圍第丨項所述之以生物特徵為驗證 基礎之遠端身份認證方法,其中:在註冊步驟中,該單向 運算係為雜湊運算或雜湊運算結合互斥或運算擇一^之° 5.依據中請專利範圍第丨項所述之以生物特徵為驗證 基礎之遠端身份認證方法’其中··該生物特徵係為指紋、 視網膜、腳趾紋、以及臉部特徵的其中之一或混合。 6.依據申請專利範圍第丨項所述之以生物特徵為驗软 基礎之遠端身份認證方法,其中:在登入及驗證步驟中祖 該用戶裝置更具有-用戶裳置時戳,該用戶裝置時戰係為 該使用者登入時的當時時間,該用戶裝置時戳係與該第2 亂數值進行互斥或運算,再代入雜湊函數得到一時 值。 、$雜凑 18 201042487 7.依據申請專利範圍第6項所述之以生物特徵為驗说 基礎之遠端身份紐方法,其中··在登人及驗證㈣中也 該用戶裝置在將該第二亂數值傳送至該伺服器時, 將該用戶裝置時戳傳送至該舰器;該舰器在收到該用 戶裝置的登人要求時即產生—伺服器時戳,並比較該用X戶 裝置時戳與軸服器時戳即可判斷該用戶裝置登人的時間 疋否在預定的時間差内,若不符合則中斷登入動作。 8.依據申請專利範圍第6項所述之以生物特徵為驗證 基礎之遠端身份認證方法,其中:在登入及驗證步驟中也 该用戶裝置在產生該第二亂數值時,也同時將該第二亂數 值與該待確認身份資訊、該待確認密碼資訊、以及該私密 金鑰進行该單向運算而產生出一亂數確認資訊和一時間雜 凑值’並將該亂數確認資訊傳送至該伺服器;該伺服器透 過對應該使用者的待確認身份資訊、該待確認密碼資訊、 以及該私密金鑰來對該亂數確認資訊進行該單向運算進 而得出一第三參數;將該用戶裝置時戳與該第三參數進行 互斥或運算,再代入雜湊函數得到一待比對時間雜凑值, 將該待比對時間雜凑值與該時間雜凑值進行比對;若不符 合,則中斷該用戶裝置的登入動作。 193. The remote identity authentication method based on biometrics (4) according to the second application of the full-time application, wherein: in the login and verification step, the user device is to confirm the password information to be confirmed with the first mess. After the values are mutually exclusive or operated, they are substituted into the hash function to obtain a first-password hash value to be confirmed, and then integrated into the to-be-aligned parameter. 4. The remote identity authentication method based on biometrics as described in the third paragraph of the patent scope, wherein: in the registration step, the one-way operation is a hash operation or a hash operation combined with mutual exclusion or calculation 1. According to the scope of the patent application, the remote identification method based on the biometrics verification is based on the fingerprint, the retina, the toe pattern, and the facial features. One of them or a mixture. 6. The remote identity authentication method based on the biometrics as the soft test base according to the scope of the patent application scope, wherein: in the login and verification step, the user device further has a user time stamp, the user device The time warfare is the time when the user logs in. The user device time stamp is mutually exclusive or computed with the second chaotic value, and then substituted into the hash function to obtain a one-time value. , Hash 18 201042487 7. The remote identity method based on the biometrics test described in item 6 of the patent application scope, wherein the user device is also in the boarding and verification (4) When the second random value is transmitted to the server, the user device time stamp is transmitted to the ship; the ship generates a server time stamp when receiving the request of the user device, and compares the X household The device time stamp and the shaft device time stamp can determine whether the time of the user device's boarding time is within a predetermined time difference, and if not, the login action is interrupted. 8. The remote identity authentication method based on biometrics according to claim 6 of the patent application scope, wherein: in the login and verification step, the user device also simultaneously generates the second random number The second random number and the to-be-identified identity information, the to-be-confirmed password information, and the private key perform the one-way operation to generate a random number confirmation information and a time hash value 'and transmit the random number confirmation information Go to the server; the server performs the one-way operation on the random number confirmation information through the identity information to be confirmed by the user, the password information to be confirmed, and the private key to obtain a third parameter; The user device time stamp is mutually exclusive or operated with the third parameter, and then the hash function is substituted into a time-matching time hash value, and the time-matched time hash value is compared with the time hash value; If not, the login action of the user device is interrupted. 19
TW98117214A 2009-05-22 2009-05-22 Remote identity authentication method for verification based on biometrics TW201042487A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW98117214A TW201042487A (en) 2009-05-22 2009-05-22 Remote identity authentication method for verification based on biometrics

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW98117214A TW201042487A (en) 2009-05-22 2009-05-22 Remote identity authentication method for verification based on biometrics

Publications (2)

Publication Number Publication Date
TW201042487A true TW201042487A (en) 2010-12-01
TWI398791B TWI398791B (en) 2013-06-11

Family

ID=45000565

Family Applications (1)

Application Number Title Priority Date Filing Date
TW98117214A TW201042487A (en) 2009-05-22 2009-05-22 Remote identity authentication method for verification based on biometrics

Country Status (1)

Country Link
TW (1) TW201042487A (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5970143A (en) * 1995-11-22 1999-10-19 Walker Asset Management Lp Remote-auditing of computer generated outcomes, authenticated billing and access control, and software metering system using cryptographic and other protocols
US5732138A (en) * 1996-01-29 1998-03-24 Silicon Graphics, Inc. Method for seeding a pseudo-random number generator with a cryptographic hash of a digitization of a chaotic system
US20060036857A1 (en) * 2004-08-06 2006-02-16 Jing-Jang Hwang User authentication by linking randomly-generated authentication secret with personalized secret
TWI381696B (en) * 2006-10-06 2013-01-01 Univ Chang Gung Authentication based on asymmetric cryptography utilizing rsa with personalized secret
TWI383327B (en) * 2008-03-21 2013-01-21 Univ Chang Gung The use of wafer financial card in the ATM system cardholder authentication methods, systems and computer systems

Also Published As

Publication number Publication date
TWI398791B (en) 2013-06-11

Similar Documents

Publication Publication Date Title
Hathaliya et al. Securing electronics healthcare records in healthcare 4.0: A biometric-based approach
CN107819587B (en) Authentication method based on fully homomorphic encryption, user equipment and authentication server
JP6420854B2 (en) Device and user authentication
JP7421766B2 (en) Public key/private key biometric authentication system
JP5701855B2 (en) Device and user authentication
US9165130B2 (en) Mapping biometrics to a unique key
JP5859953B2 (en) Biometric authentication system, communication terminal device, biometric authentication device, and biometric authentication method
CN104769602B (en) Method and system for authenticating access requests
US20210398134A1 (en) Biocrypt Digital Wallet
CN110998574B (en) Authentication terminals, authentication equipment and authentication methods and systems using these
JP5343761B2 (en) Optical information reader and authentication system using optical information reader
CN109150535A (en) A kind of identity identifying method, equipment, computer readable storage medium and device
US20180358113A1 (en) Two-factor authentication in a pulse oximetry system
KR102488139B1 (en) Method and system for certificating vaccinaion and offering follow-up management after the vaccination
CN102347942A (en) Information safety method based on image acquisition and system thereof
CN102394896A (en) Privacy-protection fingerprint authentication method and system based on token
CN101945114A (en) Identity authentication method based on fuzzy vault and digital certificate
CN103236933B (en) For on-line real name Verification System and the authentication method thereof of online medical system
CN105205944A (en) Self-service deposit and withdrawal system based on intelligent terminal
WO2021205660A1 (en) Authentication server, authentication system, authentication server control method, and storage medium
US20060204048A1 (en) Systems and methods for biometric authentication
Bera et al. Healthcare security: Post-quantum continuous authentication with behavioral biometrics using vector similarity search
CN111242629B (en) Reference location and identity authentication method and communication system
WO2016062200A1 (en) Fingerprint authentication method and apparatus, and server
KR102490640B1 (en) Electronic device and method for proving private information between individuals based on blockchain technology

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees