WO2023036143A1 - 去中心化零信任身份核实认证系统及方法 - Google Patents
去中心化零信任身份核实认证系统及方法 Download PDFInfo
- Publication number
- WO2023036143A1 WO2023036143A1 PCT/CN2022/117346 CN2022117346W WO2023036143A1 WO 2023036143 A1 WO2023036143 A1 WO 2023036143A1 CN 2022117346 W CN2022117346 W CN 2022117346W WO 2023036143 A1 WO2023036143 A1 WO 2023036143A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- data
- variation
- request
- verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3278—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Definitions
- This application relates to the technical field of identity authentication methods, in particular to a decentralized zero-trust identity verification authentication system and method.
- the bank then needs to carry out a verification procedure (verification) to verify that the customer is who he claims to be.
- the verification procedure (verification) can be to check the official ID card submitted by the customer through the bank staff, and to compare whether the information about the name, address and ID number in the application form is consistent with the information on the ID card. Even compare the photo on the ID card with the face of the customer to determine whether they are the same person, or the customer can provide credit information (such as a natural person certificate issued by the government or other information that the customer has established and passed verification) bank account, or social identity (SocialIdentity) that has been registered in more credible communities such as Google and Facebook), and finally establishes a reliable association between the claimed identity of the customer and their real identity .
- credit information such as a natural person certificate issued by the government or other information that the customer has established and passed verification
- SocialIdentity social identity
- the current identity authentication method still has the problem that the user must keep the secret that can prove the identity on the bank-end host or user device, and over-reliance on the security of one end to avoid being stolen. And because the user's biometrics must be stored in the user's device, the bank's host computer, or in a third-party certification agency, once it is cracked and obtained, all applications that are kept secret will be invaded. How to improve various problems and deficiencies of the above method is the main purpose of developing the technical means of the present application.
- An embodiment of the present application provides an identity verification and authentication method, which is applied to user identity verification and authentication.
- the method includes: obtaining the unique features that the user can provide, and based on the unique features and the first variation data. generating a first digital token, the first digital token containing the unique characteristics of the first variation; generating a first certification request according to the first digital token, the first certification request containing at least the first variation data and first answer data, wherein the first answer data contains the unique characteristics of the first variation; obtain the unique characteristics corresponding to the authenticator to be verified, and according to the to-be-verified authenticator Generating first answer data to be compared based on the unique characteristics of the authentication and the first variation data in the first certification request; according to the first answer data to be compared and the first variation data in the first certification request A first judging result is produced by comparing the answer data; and determining whether the authenticator to be verified is the user according to the first judging result.
- the identity verification and authentication method further includes the following steps: generating a second digital token according to the unique characteristic and the second variation data, and the second digital token contains the second variation unique characteristic;
- the second digital token is used to generate a second proof request, and the second proof request includes at least the second variation data and second answer data, wherein the second answer data contains the second variation Unique features;
- the user is one of a natural person, an information device, a robot, an Internet of Things object, and an asset object with unique characteristics
- the characteristic characteristic of the natural person is that the user carries and can
- the secret that is taken out repeatedly, the secret is one of a combination of a password in memory, a handwritten signature or symbol, a personally pronounced pass word, a special gesture or body habit, and one or more biometric features.
- the unique feature of the device, the robot, or the IoT object is the electronic fingerprint generated in the integrated circuit chip by using the physical non-repeatable functional safety technology or the combination of the information device, the robot, or the IoT object. Location-specific information.
- the first variation data contained in the first certification request is the information required to generate the first answer data, and the first answer data is generated by the first user in the avatar
- the unique characteristics and the first variation data are used to generate and store in the database where the data can be accessed; and according to the first answer data and the first variation data, The unique features cannot be released back
- the database is a digital ledger system that is open to the public but cannot be tampered with, and there are multiple proof request sub-topics stored in the database, and each of the proof request sub-topics includes There are variation data and answer data corresponding to a specific user;
- the proof request sub-question corresponding to the first user includes the first variation data and the first answer data;
- the identity verification method specifically includes In response to the verification request issued by the first user, select and generate from the plurality of verification request subtopics in the database according to the identity code representing the first user in the verification request Proof question combination and answer combination; the first proof request includes the proof question combination, according to the comparison between the first answer combination corresponding to
- Another embodiment of the present application provides an identity verification and authentication system, which is applied to at least one first user's identity verification and authentication.
- the system includes: a first certification end, used to obtain the first Distinctive features; and a verification terminal, signal-connected to the first certification terminal, for generating a first certification request, and the verification terminal is further configured to send at least the first certification request in the first certification terminal to the first certification terminal A variation data, the first proof terminal is used to generate the first answer data to be compared according to the first characteristic feature provided by the first user and the first variation data, the first proof The terminal or the verification terminal is used to produce a first judgment result based on the comparison between the first answer data to be compared and the first answer data in the first certification request, and then according to The first judgment result determines whether the identity verification of the first user is successful.
- the verification terminal is specifically configured to send the first variation data and the first answer data in the first certification request to the first certification terminal, and the first certification terminal uses The first answer data to be compared is generated according to the first characteristic feature and the first variation data provided by the first user, and the first proof terminal is used to Comparing the answer data with the first answer data in the first certification request to produce a first judgment result, the verification end is used to determine the first judgment result according to the first judgment result. Whether the user's authentication was successful.
- the verifier is specifically configured to only send the first mutation data in the first certification request to the first certification terminal, and the first certification terminal is used to The first characteristic feature and the first variation data provided by the user generate the first answer data to be compared and send it back to the verification terminal, and the verification terminal is used to Comparing the answer data with the first answer data in the first certification request to produce a first judgment result, the verification end is used to determine the first usage based on the first judgment result The user's identity verification is successful.
- the identity verification and authentication system further includes a second certification terminal, configured to obtain a second unique characteristic provided by a second user, and the verification terminal is signal-connected to the second certification terminal, and is used to generate The second certification request, the verification terminal is further configured to send at least the second variation data in the second certification request to the second certification terminal, and the second certification terminal is used to The provided second characteristic feature and the second variation data are used to generate the second answer data to be compared, and the second proof end or the verification end is used to generate the second answer data to be compared according to the second answer data to be compared and the A second judgment result is generated by comparing the second answer data in the second certification request, and then according to the second judgment result, it is determined whether the identity verification of the second user is successful.
- a second certification terminal configured to obtain a second unique characteristic provided by a second user
- the verification terminal is signal-connected to the second certification terminal, and is used to generate The second certification request
- the verification terminal is further configured to send at least the second variation data in the second certification request to the second certification
- the verification end includes: a proof request database, in which a plurality of proof request sub-questions are stored, and each of the proof request sub-questions includes variation data and answer data corresponding to a specific user; and
- the verification execution unit is used to select and generate a proof topic combination and an answer combination from the multiple proof request sub-topics in the proof request database according to the identity code contained in a verification request, according to the The combination of the certification questions generated by the identity code of the first user is the first certification request, and the first certification terminal or the verification execution unit is used to The first judgment result produced by comparing with the first answer data in the first certification request is then used to determine whether the first judgment result matches the answer combination Whether the identity verification of the first user is successful, wherein the identity code is selected from a decentralized identity identifier, an ID number belonging to the first user, a mobile phone number, and the first user’s own One of the defined user names, when the identity code selects the decentralized identity identifier, the unique feature of the first user is completed with a non
- the first certification terminal includes: a signal transceiving unit, signal-connected to the verification terminal, and the signal transceiving unit is configured to transmit the first The variation data is taken out; the parameter processing unit is signal-connected to the signal transceiving unit, and the parameter processing unit is used to output a set of variation control parameters according to the first variation data; the biological characteristic collection unit is signal-connected to the parameter A processing unit, the biological feature collection unit is used to collect at least one biological feature of the first user, and the biological feature collection unit has a variety of biological feature collection and conversion rules, and can be used to process according to the parameters The content of the set of variation control parameters output by the unit is switched, and then switched to the biological feature collection and conversion rule corresponding to the set of variation control parameters among multiple biological feature collection and conversion rules to perform biometric Collect and mutate, and finally generate the first answer data to be compared containing the mutated biological characteristics for transmission; and a comparison unit, connected to the biological characteristic collection unit and the signal transceiving unit, the comparison unit It is
- the biological feature is a single fingerprint, an arrangement and combination of multiple fingerprints, a voiceprint, a face, a handwritten signature, or a unique feature of a gait
- the first certification request includes a combination of certification topics
- the topic combination data type includes a time stamp, the name of the challenger, and a topic combination composed of a plurality of proof request sub-topics, and each of the proof request sub-topics is taken from the proof request database, and the first A proof end is used to package the answer comparison and judgment work with secure multi-party computing technology, and use the edge computing architecture to complete the answer comparison and judgment work, which is used to reduce the amount of calculation of the proof end itself.
- the first certification end further includes: an obfuscation unit and a de-obfuscation unit, wherein any original variation biometric data in the plurality of variation biological characteristics is performed by the obfuscation unit according to the parameters of the scrambler.
- Obfuscation operation used to generate obfuscated original variation biometric data, and the obfuscated original variation biometric data is transmitted to a remote certification request database through the signal transceiver unit for storage, and is used to enrich the certification request data
- the number and types of sub-questions in the library the de-obfuscation unit is used to perform de-obfuscation operations on the obfuscated and mutated biometric data of the first user according to the parameters of the scrambler, and obtain the corresponding first
- the original variation biometric data of the user is then sent to the comparing unit.
- the first certification request sent by the verifier also includes the anti-eavesdropping protocol parameters determined by the verifier, and the obfuscation unit is used to obtain the A judgment result generates an obfuscated judgment result, and transmits the obfuscated judgment result to the verification end, and the verification end is used for the anti-eavesdropping agreement based on the received obfuscation judgment result and its decision parameters to de-obfuscate, and further determine whether the first user's identity verification authentication is successful.
- the identity verification and authentication system further includes a first user confusion corresponding unit dedicated to the first user, which stores a scrambler parameter table dedicated to the first user, so The scrambler parameter table can be read by the parameter processing unit, and the biological feature collection unit has a variety of biological feature collection and conversion rules, which can be performed according to the content of the control parameters output by the parameter processing unit.
- the signal transceiving unit is used to transmit to the remote proof request database for enriching the number and types of sub-questions in the proof request database.
- the proof request database in the verification terminal stores the multiple non-tamperable proof request sub-questions, which can be generated and returned by multiple proof terminals located at the remote end.
- Proof request sub-questions to enrich the question bank the proof end is an identity verification end device with biometric feature collection function, and the returned proof request sub-question contains biometric parameters, scrambler parameters, and data on confusing and mutated biometric data
- the verification terminal includes a noise mixer, the noise mixer is used to divide the answer data in the sub-question of the proof request into sub-regions, and select some sub-regions for noise mixing.
- the first proof terminal can be used to clearly point out the "noise-added area” and the method of adding noise, so the answer array is obtained after comparison, wherein no noise is added
- the multiple sub-areas and the multiple sub-areas that have been added with noise are respectively marked with different values, and the multiple sub-areas that have been added with noise are marked with different values according to the method of adding noise, and then used to transmit the answer array A further strong verification is performed on the verifier.
- Another embodiment of the present application provides an identity verification and authentication method, which is applied to the identity verification and authentication of digital avatars.
- the method includes the following steps: generating a digital token according to the unique characteristics and variation data corresponding to the digital avatar;
- the digital token is uploaded to the unalterable digital ledger, and the digital token contains the unique characteristic of variation related to the unique feature;
- a certification request is generated according to the digital token on the unalterable digital ledger, and the
- the proof request includes at least the variation data and the answer data, wherein the answer data contains the unique characteristic of the variation; according to the variation data of the proof request and the unique characteristic to be certified corresponding to the digital avatar to be certified and generate the answer data to be compared; produce a judgment result according to the comparison between the answer data to be compared and the answer data in the certification request; and determine the authentication to be verified according to the judgment result Whether the digital twin is said digital twin.
- Another embodiment of the present application provides a method for purchasing and verifying a non-transferable ticket, which can be applied to the first user between the ticket management center and the entry ticket inspection terminal.
- the method includes the following steps: the first A user obtains a first non-transferable ticket from the ticket management center, the first non-transferable ticket includes a one-time password and a certification request, and the certification request includes the first variation-specific feature and the first variation data, wherein the first variation characteristic feature is generated according to the first variation data and the first characteristic characteristic provided by the first user; and when the first user is in the After the entry ticket checking terminal successfully answers the certification request by using the first unique feature and the first variation data to which it belongs, it can unlock the one-time password in the first non-transferable ticket to Complete the ticket check.
- the first non-transferable ticket is a digital file
- the first user downloads and installs the tool program using the hardware held by the first user
- the first user uses the The tool program purchases the first non-transferable ticket from the ticket management center that exists in the form of a website, and when the transaction between the first user and the ticket management center is approved, the ticket management center
- the first user is required to use the hardware and the tool program held by him to collect the first characteristic feature that he belongs to and can provide with him, and then according to the randomly selected first variation data, the The first unique feature is subjected to mutation operation, and finally the first mutation unique feature is generated to form the certification request, and the certification request is sent to the ticket management center, or the first user sends
- the decentralized identity identifier is directly transmitted to the ticket management center, and the ticket management center randomly selects at least one certification request generated by the first user according to the decentralized identity identifier sub-topics to form the certification request, and the ticket management center packages the randomly generated one-time password and the certification request into the
- the admission ticket inspection terminal needs to require the ticket holder to use his/her own ticket on the spot.
- the unique feature is used to unlock the one-time password in the first non-transferable ticket in response to the authentication request.
- Another embodiment of the present application provides an identity verification and authentication method applied to a user device, which includes the following steps: after the user device acquires the unique features corresponding to the user, and then according to the unique features and variation data to at least generate the unique characteristics of the variation; use the unique characteristics of the variation to generate a proof request, and at least include the variation data and answer data in the certification request, wherein the answer data contains the unique characteristics of the variation, and after generation said certification request is stored in said user device, but said previously acquired characteristic feature is deleted;
- the user device When the authenticator to be verified wants to put the user device into a normal use state, the user device first obtains the unique characteristic of the authenticator to be verified corresponding to the authenticator to be verified, and according to the authenticator to be verified The unique feature to be certified and the variation data in the certification request are used to generate the answer data to be compared; the answer data is generated according to the comparison between the answer data to be compared and the answer data in the certification request a judgment result; and determining whether the authenticator to be verified is the user according to the judgment result.
- the user device is a shared car, motorcycle, encrypted currency cold wallet, smart phone or laptop computer, which is integrated with the system established by the Mobile Identity Recognition Alliance, and the certification request is in use times Or after the use time exceeds a preset value, it will expire and become invalid.
- the user device will require the user to generate a new certificate request to replace the invalid certificate request, and will obtain The unique feature of the device is deleted from the device, and the user device does not need to be connected during identity verification.
- Another embodiment of the present application provides a digital contract signing method, which is applied between multiple users, and includes the following steps: providing a digital contract; the digital contract issues corresponding A certification request, the content of the digital contract is encapsulated in the certification request; when the multiple users can correctly respond to the corresponding certification requests through the identity verification authentication method of the aforementioned embodiment, the digital The content of the contract can be correctly opened to be read and confirmed by the corresponding specific user; and the digital contract is signed and becomes effective until the multiple users confirm it.
- the verification and authentication method includes the following steps: providing an Internet of Things object; in a hardware production stage, endowing the Internet of Things The object corresponds to the unique identity code and the first unique feature, and then uses the identity code and the first unique feature to generate at least one digital token and stores it in the certification request database; in an initialization phase, a verification terminal uses The identity verification and authentication method described in claim 1 is used to verify the identity of the Internet of Things object, and the Internet of Things object that has passed the identity verification and authentication uses the special information of its location as the second unique feature, and uses The second unique feature and the first unique feature are used to further generate more proof request sub-topics, which are used to enrich its proof request database; The identity verification and authentication method described above uses the first unique feature and the second unique feature to perform identity verification and authentication of the IoT object.
- Another embodiment of the present application provides a method for benefit sharing, which includes the following steps: using a dedicated application program or a browser to access the portal website; According to the unique characteristics of the user and generate a plurality of variation unique characteristics according to the unique characteristics and a plurality of variation data, through the exclusive application program or through the browser and the portal website, the plurality of variation data-variation
- the unique features are uploaded to a database whose content cannot be tampered with, and after the multiple variant data-variant unique features are successfully uploaded, the maintainer of the database, the provider of the exclusive application program, the portal website
- the builder or an advertiser sends benefits to the user's exclusive account; and a third-party service provider links to the database to obtain the plurality of variation data-variation-specific characteristics, and responds to the authentication to be verified
- the user uses a dedicated application program or a portal website to log in to a third-party service, use the multiple variation data-variation unique features to generate a certification request, and then use the identity verification and authentication method described
- FIG. 1A is a schematic diagram of the process steps of an identity verification authentication (identity verification-authentication) method provided by an embodiment of the present application.
- FIG. 1B is a functional block diagram of an identity verification and authentication system provided by an embodiment of the present application.
- FIG. 1C is a schematic flowchart of an identity verification and authentication method executable in an identity verification and authentication system provided by an embodiment of the present application.
- FIG. 1D is a schematic functional block diagram of a digital token generator in an embodiment of the present application.
- FIG. 2A is a schematic functional block diagram of a verification terminal in an embodiment of the present application.
- Fig. 2B is an example diagram of a data block of a proof request sub-topic in an embodiment of the present application.
- FIG. 3A is a functional block diagram of a first proof terminal embodiment completed by taking fingerprints as an example in an embodiment of the present application.
- FIG. 3B is a functional block diagram of an embodiment of the present application provided by multiple exclusive OR (Exclusive OR) tables at the sending and receiving ends for conversion.
- exclusive OR Exclusive OR
- Fig. 4A is a schematic diagram of the data format of the combination of certification topics in the certification request in an embodiment of the present application.
- Fig. 4B is a schematic diagram of the data format of the proof request sub-topic in the proof topic combination in an embodiment of the present application.
- FIG. 4C is a schematic diagram of another data format for the combination of certification topics in the certification request in an embodiment of the present application.
- FIG. 4D is a schematic diagram of the data format of putting the subtitle of the proof request on the blockchain in an embodiment of the present application.
- FIG. 4E is a schematic diagram of the data format used in another embodiment of putting the subtitle of the certification request on the blockchain in one embodiment of the present application.
- FIG. 4F is a schematic diagram of the data format used in another embodiment in which the subtitle of the certification request is placed on the blockchain in one embodiment of the present application.
- FIG. 5A is a schematic functional block diagram of an embodiment further developed from the identity verification end device 20 with fingerprint collection function shown in FIG. 3A .
- FIG. 5B is a schematic functional block diagram of another embodiment further developed from the identity verification end device 20 with fingerprint collection function shown in FIG. 3A .
- FIG. 5C is a schematic functional block diagram of another embodiment further developed from the identity verification end device 20 with fingerprint collection function shown in FIG. 3A .
- FIG. 6A is a functional block diagram of an embodiment developed to realize the verification terminal 10 in an embodiment of the present application.
- FIG. 6B is a schematic diagram of mutated fingerprint data and mutated fingerprint data added with noise in an embodiment of the present application.
- FIG. 7A is a schematic diagram of segmented sub-regions of mutated fingerprint data with noise added in an embodiment of the present application.
- FIG. 7B is an answer array corresponding to the segmented sub-regions of the mutated fingerprint data with noise added in one embodiment of the present application.
- FIG. 8A is a functional block diagram of an identity verification terminal device 80 with a PIN code input function in an embodiment of the first certification terminal 11 completed by taking a personal identification code as an example in one embodiment of the present application.
- FIG. 8B is a schematic diagram of an example data format of the verification request sub-topic of the PIN code in one embodiment of the present application.
- FIG. 8C is a functional block diagram of an identity verification terminal device 80 with a PIN code input function in another embodiment of the first certification terminal 11 completed by taking the PIN code as an example in one embodiment of the present application.
- FIG. 8D is a schematic diagram of another data format example of the verification request sub-topic of the PIN code in an embodiment of the present application.
- FIG. 8E is a functional block diagram of an identity verification terminal device 80 with a PIN code input function in another embodiment of the first certification terminal 11 completed by taking a PIN code as an example in one embodiment of the present application.
- FIG. 8F is a schematic functional block diagram of an identity verification terminal device 80 with a PIN code input function in another embodiment of the first certification terminal 11 completed by taking a PIN code as an example in one embodiment of the present application.
- FIG. 9A is a functional block diagram of a system for purchasing and verifying non-transferable tickets in an embodiment of the present application.
- FIG. 9B is a functional block diagram of a portable device 99 that can be used to store the first non-negotiable ticket 900 in one embodiment of the present application.
- FIG. 10 is a functional block diagram of an embodiment of the present application applied to the verification and authorization process of an entity enterprise organization or even a decentralized autonomous organization on the block chain.
- an embodiment of the present application provides an identity verification authentication (identity verification-authentication) method and related system, which can be applied to at least one user's identity verification authentication, wherein the method mainly includes as shown in Figure 1A Steps: First, a unique characteristic corresponding to the user can be obtained first, and a digital token is generated according to the unique characteristic and a variation data, and the digital token contains a variation unique characteristic (for example, the variation unique characteristic is Generated according to the unique characteristic and the variation data) (step 11), and another digital token can be generated according to the same unique characteristic and different variation data, and the other digital token contains another variation unique characteristic ( For example, the unique feature of the first variation in the first digital token is generated based on the unique feature and the first variation data, while the second variation specific feature in the second digital token is generated based on the unique feature and the second variation data ).
- a variation unique characteristic for example, the variation unique characteristic is Generated according to the unique characteristic and the variation data
- another digital token can be generated according to the same unique characteristic and different variation data
- a proof request (proof request) can be generated according to the digital token, and the proof request at least includes the variation data and an answer data, wherein the answer data contains the unique characteristics of the variation (step 12).
- the proof request at least includes the variation data and an answer data, wherein the answer data contains the unique characteristics of the variation (step 12).
- step 13 obtain a unique characteristic to be authenticated corresponding to an authenticator to be verified, and according to the unique characteristic to be authenticated and the certification request of the authenticator to be verified.
- the variation data generates an answer data to be compared (step 14), and then a judgment result is produced according to the comparison between the answer data to be compared and the answer data in the proof request (step 15), Finally, it can be determined whether the authenticator to be verified is the user himself according to the judgment result (step 16).
- the above-mentioned users can be natural persons or information devices, robots, Internet of Things objects, or asset objects with unique characteristics, etc., and the unique characteristics of natural persons can be secrets that users carry with them and can be repeatedly retrieved, such as It can be a password (PIN) in memory, a handwritten signature or symbol, a passphrase pronounced by yourself, a special gesture or body habit, and a combination of one or more biometrics.
- PIN password
- the unique features of information devices, robots, or Internet of Things objects can be, for example, electronic fingerprints generated by Physically Unclonable Function (PUF) security technology in integrated circuit chips or combined with the information device, robot or It is location-specific information (such as GPS location information) of IoT objects.
- PAF Physically Unclonable Function
- the asset objects with unique characteristics can be antique calligraphy and painting, jade, music recordings, photographs, etc., through various feature collection methods, some unique characteristics can be extracted from the above-mentioned asset objects, and then the technology of this application can be used means to prove that it is authentic and not imitation or even fake.
- the unique characteristics of the asset object can be the flaws of gemstones, the three-dimensional space measurement data inside the house, or the characteristic values of the lines in the painting, etc.
- the identity verification and authentication system 1 can be applied to the identity verification and authentication of at least one first user 21.
- the system mainly includes a verifier (verifier) 10 and a first prover (prover) 11, wherein the first prover 11 can obtain Corresponding to a unique feature of the first user 21 .
- the verification terminal 10 is connected to the first certification terminal 11 for generating a certification request.
- the proof request at least includes a first variation data and a first answer data.
- the above and subsequent naming and understanding of verifier and prover can also be completed by using challenger and responder respectively, which are used for challenge-response identity authentication ( Challenge-Response authentication) corresponds to the noun.
- the verification terminal 10 sends the certification request to the first certification terminal 11 (step 21), the The first certification terminal 11 generates a first answer data to be compared according to a unique feature to be authenticated of the authenticator to be verified (such as the first user 21) and the first variation data in the certification request (step 22) . And can choose one from the first proof terminal 11 or the verification terminal 10, and produce a judgment result according to the comparison between the first answer data to be compared and the first answer data in the proof request ( Step 23), and then the verifier 10 can determine whether the authenticator to be verified is the first user 21 himself according to the obtained judgment result (step 24).
- the person to be verified (that is, the first user 21) can be allowed to log in to the online banking account on the remote line, and carry out various tasks normally. a transactional behavior.
- the identity verification and authentication method provided in this application can also be used as the second factor (Second Factor) besides the account password when logging into the remote account.
- the authenticator to be verified cannot provide the unique feature to generate the correct first answer data to be compared, the authenticator cannot pass the verification and is considered not to be the first user 21 himself, and the authenticator to be verified will It is impossible to log in to the online banking account at the remote end, let alone conduct various transactions.
- the identity verification and authentication system disclosed in this application is designed to use the first proof terminal 11 to compare the first answer data to be compared with the first answer data to produce the judgment result, send The content of the certification request to the first certification terminal 11 must include the first variation data and the first answer data, and then the first certification terminal 11 will send the judgment result produced to the verification The terminal 10, and the verification terminal 10 can determine whether the identity verification of the first user 21 is successful or not according to the judgment result obtained.
- the first certification terminal 11 can also package the answer comparison and judgment work with secure multi-party computing (Multi-Party Computation) technology, and use the Edge Computing (Edge Computing) architecture to deliver it to devices such as routers in the communication network system Completing the above answer comparison and judgment work is used to reduce the calculation load of the proof end itself.
- the verification terminal 10 can be a bank, an e-commerce company, etc. who need verification and certification, or can be a third party that provides verification and certification services, such as a credit reporting agency. Therefore, in the design of the identity verification and authentication system disclosed in this application, the verification terminal 10 can also be selected to compare the first answer data to be compared with the first answer data, and then the verification terminal 10 can prove to the first
- the verification request sent by the terminal 11 may only contain the first variation data, and the first answer data may be kept in the verification terminal 10 and not sent out.
- the verifier 10 can also use other certification terminals, such as the second certification terminal 12 shown in FIG. The method is the same as the steps performed on the first certification end 11. Therefore, for the convenience of description, only the first user 21 is taken as an example to describe the technical details below.
- the method and system proposed in this application have the function of allowing users to perform identity verification and authentication at a remote location. Therefore, it is especially suitable for users to create an avatar (Avatar) on the Internet or even in the metaverse (Metaverse) and to meet the needs of verifying and authenticating their avatar, and the avatar will be related to a certain characteristic of the user (such as biological characteristics) ) have a high degree of close relationship.
- the first variation data included in the certification request may be important information required to generate the first answer data (especially variation-specific features), and the first answer data may be the first user 21 is generated and stored in a database available to the verification terminal 10 by using the unique characteristics and the first variation data in the stage of creating its avatar.
- the unique feature cannot be deduced back. Therefore, even if a data leakage event occurs in the database or the database is a public ledger system (such as a block chain), the unique characteristic of the first user 21 will not be known by malicious intruders. In this way, the first user 21 can safely store the first answer data (mutation-specific characteristics) generated in the avatar creation stage in the database available to the verification terminal 10 .
- multiple answer data can be generated by utilizing the unique feature and the other variation data, and stored together in the database.
- different variation unique characteristics can be generated, and then different digital tokens can be generated.
- the second digital token 172 can also be generated according to the unique characteristic and the second variation data, and the second digital token includes the second variation unique characteristic 1720 .
- both the first digital token 171 and the second digital token 172 can be used to represent the user, therefore, multiple digital tokens can be selected by the verification terminal 10 for making certification requests with different contents.
- the digital token generator 17 can be installed in the first certification terminal 11 and the second certification terminal 12 shown in FIG. 1B above, or in any site where avatar creation and network identity registration are required.
- the verification terminal 10 in the above-mentioned identity verification and authentication system 1 can be a hardware device, a software program or a combination of the two, and the first user 21 can use its own unique characteristics and the processing between the first certification terminal 11, Then pass the verification of the verification terminal 10 .
- the first user 21 who is a bank customer wants to log in a bank account remotely, and the verification terminal 10 is responsible for verifying that "the first user 21 is the same as the customer who originally registered the bank account.” individual" tasks.
- the above-mentioned unique features can be secrets that users can bring with them and can be taken out repeatedly, such as passwords in memory, handwritten signatures or patterns, a pass phrase pronounced by themselves, special gestures or body habits, and a or a combination of multiple biometrics.
- the first proof terminal 11 can be an identity proof terminal device with a biometric feature collection function, which can be used by the first user 21, and the biometric feature is a fingerprint as an example below. example to illustrate.
- FIG. 2A is a functional block diagram of a preferred embodiment of the verification terminal 10 , which mainly includes a certificate request database 100 and a verification execution unit 101 .
- the proof request database 100 stores multiple proof request sub-topics, the content of which can be shown as an example diagram of a data block as shown in FIG. 2B.
- Each proof request sub-question 70 may include variation data 700 and answer data 701 corresponding to a user, and the paired variation data 700 and answer data 701 can be obtained from the content of the digital token generated in FIG. 1D .
- the answer data 701 is a mutated fingerprint data
- the mutated data 700 is a set of variation control parameters used when generating the mutated fingerprint data.
- the details and examples of the method of forming the proof request sub-problem it will be described later.
- the first user 21 wants to log into the account of the bank, he can use the first certification terminal 11 at the remote end to initiate a verification request to the verification terminal 10, and the The verification request includes an identity code representing the first user 21 (for example, decentralized identifiers (DID for short) based on blockchain technology, an ID number belonging to the first user 21 , mobile phone number, or user-defined username, etc.).
- the verification execution unit 101 can combine and generate a proof subject combination from the proof request database 100 according to the identity code of the first user 21 included in the verification request, and of course it can correspond to the A pen proves the combination of questions and obtains an answer combination.
- DID decentralized identifiers
- the proof topic combination may include one or more proof request subtopics corresponding to the first user 21 , and other proof request subtopics not corresponding to the first user 21 may be mixed in.
- the proof request sub-question corresponding to the first user 21 includes the first variation data and the first answer data, wherein the first answer data is the variation fingerprint data corresponding to the first user 21,
- the first variation data is the set of variation control parameters used when generating the variation fingerprint data.
- the verification execution unit 101 sends the certification request to the first certification terminal 11, and the certification request includes the certification subject combination. And according to the combination of answers to be compared corresponding to the proof topic combination and the comparison of the proof topic combination, the judgment result can be produced, and then according to whether the judgment result matches the answer combination. Determine whether the identity verification of the first user 21 is successful.
- FIG. 3A it is a preferred embodiment of the first certification terminal 11 completed by taking fingerprints as an example.
- a fingerprint collection function which mainly includes a fingerprint collection unit 200, A parameter processing unit 201 , a comparison unit 202 and a signal transceiving unit 203 .
- the fingerprint collection unit 200 is used to collect a single fingerprint or a plurality of fingerprints of the first user 21 or a combination of common account users (that is, multiple people jointly own this account), and in order to reduce the amount of data, after the fingerprints are collected, It can be converted and simplified into a small number of feature point sets, and unique features such as voiceprints and faces can be processed in this way.
- the fingerprint collection unit 200 has a variety of fingerprint collection and conversion rules, which can be used to switch according to the content of a variation control parameter output by the parameter processing unit 201, and then based on the fingerprint pattern of the same finger, it can generate Multiple variant fingerprints with patterns that differ from each other.
- the signal transceiving unit 203 is used to receive the first variation data contained in the sub-topic of the certification request included in the proof topic combination in the received certification request (in this example, the variable fingerprint data can be generated)
- the set of variation control parameters used when using is sent to the parameter processing unit 201, and is also used to transfer the first answer data included in the proof request sub-question in the proof topic combination in the received proof request (In this example, the variation fingerprint data corresponding to the first user 21) is sent to the comparing unit 202.
- the parameter processing unit 201 is used to output the set of variation control parameters to the fingerprint collection unit 200 according to the first variation data, and then switch to the fingerprint collection and conversion corresponding to the variation control parameters among multiple fingerprint collection and conversion rules.
- the rules to carry out fingerprint collection and variation finally produce the first answer data to be compared with a variation fingerprint to be sent to the comparison unit 202, and to be compared with the first answer data (corresponding to the variation of the first user 21 Fingerprint data) to compare, and then judge whether the two match.
- a judgment result that is like a yes-no question answer column will be obtained (which one of the multiple sub-questions Or those sub-questions are the variation fingerprints belonging to the first user 21), and the judgment result is sent to the verification terminal 10, and the verification terminal 10 can combine the received judgment result with the originally generated answer Comparison is performed to determine whether the user's identity verification authentication is successful.
- each proof request sub-question included in the proof question combination is like a non-question group, in addition to giving it once and then answering it once, it can also be given in series and then answered in batches, which can be adjusted according to the needs practice
- the verification terminal 10 can be used to perform the comparison between the first answer data to be compared and the first answer data.
- the certification request sent by the verification terminal 10 to the first certification terminal 11 may only contain the first variation data, and may choose to keep the first answer data in the verification terminal 10 without sending it.
- the fingerprint collection unit 200 can also be completed by other biometric collection units, such as a handwritten signature unit, a voiceprint collection unit, a palmprint collection unit, a face picture collection unit, an iris collection unit, a gait image collection unit, Palm dynamic pressure collection unit or walking foot pressure collection unit, etc.
- the gait image acquisition unit collects the continuous images of the user’s walking posture, and then converts them into characteristic data related to the user’s unique habits
- the palm dynamic pressure acquisition unit refers to pressing the palm print in a pressure
- the process of applying pressure from the front palm to the back palm (or reverse) is sensed, and then a set of pressure data that changes with time during the corresponding process is obtained.
- the walking foot pressure acquisition unit it refers to a set of pressure data that changes with time during the walking process, which is sensed when the sole of the foot is walking on a pressure sensing plane.
- These stress data are personal and therefore can be used as biometrics.
- functional units such as depth detection or body temperature detection can also be added to the acquisition unit.
- each user can be generated by using the corresponding certification terminal device.
- the certification request database 100 can be set in the cloud, providing a plurality of remote verification execution units for signal connection, and then using the combination of certification topics therein to generate the required certification request.
- the first proof terminal 11 can be used to verify
- the fingerprint collection of single or multiple fingerprints of the first user 21 (or the second user 22) is based on the fingerprint of the same finger, but multiple variations with different patterns are produced according to different variation control parameters Fingerprints, and then pair the corresponding variation control parameters with the variation fingerprints to form the multiple certification request sub-topics belonging to the first user 21, and then send them to the certification request database 100 for storage, and then complete the avatar
- the purpose of making and enriching the question bank is based on the fingerprint of the same finger, but multiple variations with different patterns are produced according to different variation control parameters Fingerprints, and then pair the corresponding variation control parameters with the variation fingerprints to form the multiple certification request sub-topics belonging to the first user 21, and then send them to the certification request database 100 for storage, and then complete the avatar The purpose of making and enriching the question bank.
- the mutated fingerprints that need to be generated when the user successfully authenticates, or the mutated fingerprints generated by using different mutated data during the successful authentication can be made into a new proof request sub-question, and then by The verifier sends the newly generated proof request sub-questions to the proof request database 100 to complete the purpose of enriching the number of question banks.
- the data types of the proof topic combination in the proof request can include a timestamp (timestamp), the name of the challenger (challenger, such as the abc bank in the figure) and a sufficient number of proof requests
- Each proof request sub-topic can be taken from the proof request database 100 or the challenger can make it himself according to the data format of the proof request sub-topic (as shown in FIG. 4B ).
- each proof request sub-question may include a piece of mutated fingerprint data corresponding to a certain user and a set of mutated control parameters used when generating the mutated fingerprint data.
- the data format of the proof request sub-question it can be shown in FIG. 4B , including biometrics, garbler parameters, and raw data. Therefore, when the verification execution unit 101 generates the proof topic combination corresponding to the first user 21, it can select one or more proof request subtopics corresponding to the first user, while other parts select subtopics corresponding to the non-second user.
- the combination of answers corresponding to the combination of questions that should be proved is a bit string or a bit array.
- the answer combination corresponding to the question combination that should be proved is a 16-bit string 0010000000010000.
- the judgment result is sent back from the identity verification terminal device 20 with fingerprint collection function, and the judgment result is sent to the verification terminal 10, if the judgment result matches the answer combination (character string 0010000000010000) or matches If the rate reaches a certain threshold, the verifier determines that the authentication of the user's identity verification is successful. Therefore, in the above example, the first user 11 who is a bank customer can use the first verification terminal 11 to pass the verification of the verification terminal 10 and successfully log in to the bank account.
- a transmission protocol can also be added to change the content of the answer combination, as shown in the functional block shown in Figure 3B Schematic diagram, both sending and receiving ends (for example, the signal transceiving unit 203 and the verifying end 10 in FIG.
- 3A are provided with a plurality of mutually exclusive OR tables (XORtable), and the answer combination 31 is selected through a mutually exclusive OR table 30, after the mutual exclusive OR operation, the expression mode of the answer combination can be changed, and then the signal transceiving unit 203 sends the answer combination 32 with the changed expression mode to the verification terminal 10, and the verification terminal 10 can use the same mutual exclusion Or the table 30 performs a mutually exclusive OR operation on the answer combination 32 whose expression mode has been changed, so as to obtain the restored answer combination 33 consistent with the content of the answer combination 31 .
- the proof request sub-questions stored in the proof request database 100 contain answer data, for example, a variant fingerprint data file corresponding to the user, whose pattern is obtained by the fingerprint collection unit 200 according to different Variation data (a set of variation control parameters) is obtained by scanning the fingerprint of the user's finger, so the pattern of the generated mutated fingerprint is different from the real fingerprint. Therefore, the real fingerprint pattern will not be collected, nor will it be stored in the certification request database 100, nor will it be stored in the identity certification terminal device 20 (first certification terminal 11) with fingerprint collection function, so that it will prevent The real fingerprint pattern is stolen.
- a variant fingerprint data file corresponding to the user whose pattern is obtained by the fingerprint collection unit 200 according to different Variation data (a set of variation control parameters) is obtained by scanning the fingerprint of the user's finger, so the pattern of the generated mutated fingerprint is different from the real fingerprint. Therefore, the real fingerprint pattern will not be collected, nor will it be stored in the certification request database 100, nor will it be stored in the identity certification terminal device 20 (first certification terminal 11
- the unique features of the user can also be the user's handwritten signature, gait, face, voiceprint or iris, palm dynamic pressure, walking foot pressure, etc.
- variation data such as a set of variation control parameters
- the implementation of the certification request database 100 can be a ledger database with security protection, or it can be an immutable digital ledger completed in the form of a block chain.
- the certification request sub-topics stored in the certification request database 100 can also be uploaded successively by legitimate user devices (the uploading conditions will be described later), and as the number of times of use increases, each use The operator will generate a huge number of sub-questions and store them in the proof request database 100 at the same time, so the number of questions or the number of digital tokens in the database will also increase accordingly to increase the degree of change of the question group.
- the user-specific features or secrets placed in the above-mentioned various forms of open but unalterable digital ledgers have been processed into various variations by the technology of this application without duplication.
- it is completed in the form of blockchain
- the digital tokens, content of proof request subtitles and transaction timestamps cannot be maliciously tampered with.
- FIG. 5A is a first preferred embodiment further developed based on the identity verification terminal device 20 with fingerprint collection function shown in FIG. 3A .
- FIG. 5A it is a preferred embodiment for completing the first certification terminal 11 for exclusive use by the first user 21 .
- the identity verification terminal device 20 with fingerprint collection function also includes an obfuscation unit 51 and a de-obfuscation unit. 52.
- the fingerprint collection unit 200 can be used to collect a single fingerprint or a combination of multiple fingerprints of the first user 21, and the fingerprint collection unit 200 has a variety of fingerprint collection and conversion rules, which can be based on the variation output by the parameter processing unit 201. Control the content of the parameters to switch, and then based on the fingerprint of the same finger, multiple variant fingerprints with different patterns can be produced. Any original mutated fingerprint data among the multiple mutated fingerprints can be subjected to an obfuscated operation by the obfuscation unit 51 according to a garbler parameter (garbler can be used to generate) to generate an obfuscated original mutated fingerprint data.
- garbler can be used to generate
- the obfuscated original variation fingerprint data can be transmitted to the remote certificate request database 100 through the signal transceiving unit 203 for storage, so as to enrich the number and types of sub-questions in the certificate request database 100 .
- the purpose of performing obfuscation operation on the original variation fingerprint data is to prevent the original variation fingerprint data from being maliciously collected and interpreted, and the obfuscation unit 51 can simply use the mutual exclusion or (XOR) circuit shown in Figure 3B to complete, of course, it can also The obfuscation unit 51 can be completed by using other digital combinations or sequential logic circuits.
- the signal transceiver unit 203 receives the certification request from the verification terminal 10, and the data format of each certification request subtitle in the certification request can be as shown in FIG. 4B As shown, it includes biometrics, garbler and raw data.
- the set of variation control parameters (biological feature parameters) used in generating the original variation fingerprint data in each proof request sub-question is sent to the parameter processing unit 201 by the signal transceiving unit 203 .
- the first answer data (corresponding to the confusion variation fingerprint data of the first user) and the scrambler parameters included in the proof request sub-question are first sent to the de-obfuscation unit 52, and the de-obfuscation unit 52 According to the parameters of the scrambler, the first answer data (corresponding to the confusion and variation fingerprint data of the first user) is de-obfuscated, and the original variation fingerprint data corresponding to the first user is obtained and then sent to Comparison unit 202 .
- the parameter processing unit 201 to output the set of variation control parameters (biological characteristic parameters) to the fingerprint collection unit 200 according to the first variation data (such as the fingerprint collection unit and Capacitive sensing technology, and examples of relevant variable control parameters can be various combinations of parallel numbers of adjacent capacitive sensing electrodes, or various combinations of parallel numbers of non-adjacent but close spaced electrodes, or It is a mixture of the two, or there are different parallel combination selections for different sub-regions of the fingerprint), and then when the first user puts one or more fingers on the fingerprint collection unit 200, the variation control is used
- the fingerprint collection and conversion rules corresponding to the parameters are used to collect fingerprints, and finally the first answer data to be compared is generated as a mutated fingerprint and then sent to the comparison unit 202 .
- the comparison unit 202 is used to compare the first answer data to be compared with the first answer data (corresponding to the variation fingerprint data of the first user), and then judge whether the two match, and finally compare each sub-question After all comparing, a judgment result will be drawn (which one or those sub-topics belong to the variation fingerprint of the first user in a plurality of sub-topics), and the judgment result is sent to the verification terminal 10, and the verification terminal 10 Then it can be further determined whether the identity verification and authentication of the user is successful or not according to the received judgment result.
- FIG. 5B is a second preferred embodiment further developed based on the identity verification terminal device 20 with fingerprint collection function shown in FIG. 3A, as shown in FIG.
- FIG. 5B the data format of the certification request is shown in FIG. (protocol).
- the judgment result obtained by the comparison unit 202 (which one or those subtopics are the fingerprints of the first user in the plurality of subtopics) will first pass through the confusion unit 51 to produce a confusing judgment result, and the confusion After the judgment result is sent to the verification terminal 10, the verification terminal 10 can de-confuse according to the received confusion judgment result and the anti-eavesdropping agreement parameter (protocol) determined, and further determine the identity verification of the user Whether the authentication was successful.
- FIG. 5C is a third preferred embodiment further developed based on the identity certification terminal device 20 with fingerprint collection function shown in FIG. 3A. As shown in FIG. 5C, it is used to complete the first certification terminal 11.
- the difference between the third preferred embodiment and the first and second preferred embodiments is that it is not dedicated to a certain user, but can be shared by multiple users, so it can be set in the credit card reader of the store payment system. Card machine, mobile payment card reader, automatic teller machine, rental house access control or door lock of shared car. Therefore, in addition to the original identity verification terminal device 20 with the fingerprint collection function, a user confusion correspondence unit 53 dedicated to the user is also provided.
- This user confusion correspondence unit 53 of the present example is dedicated by the first user, for example, this user confusion correspondence unit 53 can be a piece of proximity (Near Field Communication, NFC) IC card, stores exclusive-use in it
- the first user's garbler parameter table (garbler table), when approaching the parameter processing unit 201, allows the garbler parameter table to be read by the parameter processing unit 201.
- the fingerprint collection unit 200 has a variety of fingerprint collection and conversion rules, which can be switched according to the content of the control parameters output by the parameter processing unit 201, and can generate mutual patterns based on the fingerprints of the same finger. Multiple variant fingerprints that differ from one another.
- the confusing variant fingerprint data can be transmitted to the remote certificate request database 100 through the signal transceiver unit 203 to enrich the number and types of sub-questions in the certificate request database 100.
- This application scenario can be that the user first The card opening behavior after obtaining the user's confusion corresponding unit 53 for the first time, the user's confusion corresponding unit 53 can also be provided with a PIN code for secondary verification.
- the purpose of confusing the variation fingerprint data is to prevent the variation fingerprint data from being maliciously collected and interpreted, and the confusion unit 51 can simply use the mutual exclusion or (XOR) circuit shown in Figure 3B to complete, of course, other digital combinational logic circuits or sequential logic circuits.
- the signal transceiver unit 203 receives the certification request from the verification terminal 10, and the data format of each certification request subtitle in the certification request can be as shown in the figure As shown in 4B, it includes biological characteristic parameters (biometrics), garbler parameters (garbler) and confusing mutation fingerprint data (rawdata).
- the group of variation control parameters (biological feature parameters) used in generating the variation fingerprint data in each proof request sub-question is sent to the parameter processing unit 201 by the signal transceiving unit 203 .
- the first answer data (corresponding to the confusion and variation fingerprint data of the first user) and the scrambler parameters contained in the sub-question are first sent to the de-obfuscation unit 52, and the de-confusion unit 52
- the device parameters and the scrambler parameter table downloaded from the user's confusion correspondence unit 53 are used to de-obfuscate the first answer data (corresponding to the confusion variation fingerprint data of the first user), and obtain the corresponding
- the mutated fingerprint data of the first user is then sent to the comparison unit 202 .
- the parameter processing unit 201 to output the set of variation control parameters (biometric parameters) to the fingerprint collection unit 200 according to the first variation data, and then use the control parameters when the authenticator to be verified puts his finger on the fingerprint collection unit 200
- the corresponding fingerprint collection and conversion rules are used to collect fingerprints, and finally the first answer data to be compared is generated as a mutated fingerprint and then sent to the comparison unit 202 .
- the comparison unit 202 is used to compare the first answer data to be compared with the first answer data (corresponding to the variation fingerprint data of the first user), and then judge whether the two match, and finally compare each sub-question After all comparing, a judgment result (that one or those sub-topics in a plurality of sub-topics is the fingerprint of the first user) will be drawn, and the judgment result will be passed through the confusing unit 51 earlier to produce a confusing judgment result, And the judging result of the obfuscation is transmitted to the verification terminal 10, and the verification terminal 10 can de-confuse according to the received judging result of the confusion and the anti-eavesdropping agreement parameter (protocol), and further determine whether the identity verification authentication Success means judging whether the authenticator to be verified is the first user.
- a judgment result that one or those sub-topics in a plurality of sub-topics is the fingerprint of the first user
- FIG. 6A is a preferred embodiment developed by the present application to realize the above verification terminal 10, wherein the certification request database 100 can be completed by a non-tamperable block chain 60, and multiple records are stored on it.
- Non-tamperable proof request sub-questions, and the test bank can be enriched by the proof request sub-questions generated and returned by multiple proof ends (first proof end 11, second proof end 12) located at the remote end.
- the proof end may be the above-mentioned identity proof end device 20 with the fingerprint collection function, and the returned proof request sub-question is as shown in FIG. 4B , including biometrics parameters, garbler parameters ) and packets of obfuscated mutated fingerprint data.
- the first user 21 uses the first proof terminal 11 to verify the first user 21 when making the clone.
- a user 21 collects fingerprints, and based on the same fingerprint, but according to different variation control parameters, multiple variation fingerprints with different patterns are generated, and then the corresponding variation control parameters are paired with the variation fingerprints to form a
- the multiple (for example, 256) certification request subtitles belonging to the first user 21 are ": ["abcDeF1", “abcDeF2", “abcDeF3",...,”abcDeF256”], and then sent to this block Stored in the chain 60, and the block chain 60 will automatically generate an "id”: "1234567890” for this transaction, and use the "id”: "1234567890” in the verification terminal 10 with the first user 21
- the identity is associated.
- the operation of expanding the number of sub-topics of the certification request can also be performed during another identity verification and authentication procedure in the future.
- the block chain 60 has stored multiple certification request sub-topics with “id” as "1234567890” and associated with the first user 21, and the first user 21.
- the first certification terminal 11 can be based on the fingerprint scanned this time, and generate the ID according to different variation control parameters again. Generate proof request sub-problems by generating multiple variant fingerprints with different patterns.
- the specific condition can be that the identity verification and authentication procedure is passed, or not only the identity verification and authentication procedure is passed but also the answers in the process are completely consistent, or the identity verification and authentication procedure is passed, the answers are completely consistent and the transaction amount is greater than a preset number. And this time, the operation of adding multiple proof request subtopics on the block chain 60 will generate a new ID (such as "id": "0987654321”), and record it in the transaction number established by the verification terminal 10 In the ledger (or blockchain).
- a new ID such as "id”: "0987654321
- the new ID can be based on the original biometric feature (in this case, a fingerprint of a certain finger), or add a new biometric feature as a verification factor (for example, the first user 21 can pass the first verification terminal Note function on 11, select another fingerprint or face, and record the association of the variation control parameter and note that this newly produces on the first proof terminal 11, the note function on the proof terminal 11 will be processed proof next time When requesting the variation control parameter in the sub-topic, the first user 21 can be correctly reminded to provide the required biometric feature).
- the original biometric feature in this case, a fingerprint of a certain finger
- add a new biometric feature as a verification factor for example, the first user 21 can pass the first verification terminal Note function on 11, select another fingerprint or face, and record the association of the variation control parameter and note that this newly produces on the first proof terminal 11, the note function on the proof terminal 11 will be processed proof next time
- the first user 21 can be correctly reminded to provide the required biometric feature
- the new ID "0987654321” is a new ID that was added when the original ID "1234567890” was verified and authenticated, so that the new ID "0987654321” can be compared with the original ID
- the ID "1234567890" of the ID "1234567890” has the association of belonging to the same user, so that the method of expanding the certificate request database can be achieved.
- various combinations of fingerprints, numbers and sequences of different fingers of the user, as well as unique features added to the user's voiceprint or face pattern can be used as part of the verification factor to form different combinations . Different combinations can represent different service behaviors or user opinions, which in turn can activate different smart contracts on the blockchain.
- a specific combination of different verification factors will be able to activate the account to enter the anti-theft account (with a withdrawal limit) or to enter the transfer behavior with higher authority. Adding the user's voiceprint or face pattern can also verify whether the user is awake and whether his will is being coerced.
- the first certification terminal 11 is not owned by the first user 21, but is an example as shown in FIG.
- the parameter table (garbler table)
- the identity codes such as "id”:"1234567890” generated by the above method and the association of variation control parameters and annotations can also expand the sub-questions of the certification request database during the avatar production stage and after Number of stages to complete.
- the association of identity codes such as "id”: "1234567890” and variation control parameters with annotations can be stored and recorded in the user confusion corresponding unit 53. As for other details, it is roughly the same as the above-mentioned technical means, so it is not necessary to Let me repeat.
- FIG. 4E is the data format used in another embodiment of putting the subtitle of the proof request on the blockchain 60.
- the first four items are the data formats that general blockchains will have, so they will not be described again.
- the dezeta "1234567890" in the fifth item is used to represent the identification code of the first user 21's proof request sub-topic.
- the id "did:zeta:sov:WRfXPg8dantKVubE3HX8pw" of the sixth item represents the decentralized identity identifier (DID for short) of the first user 21, which is mainly a DID generated by a decentralized identity blockchain "did:sov:WRfXPg8dantKVubE3HX8pw", plus the method provided by this application system to complete the annotation, and then generate the decentralized identity identifier (DID) code "did:zeta:sov:WRfXPg8dantKVubE3HX8pw" with the word zeta added .
- DID decentralized identity identifier
- the DID is assigned by the first user 21 after uploading the public key in a public-private key pair generated by software or hardware to a decentralized identity blockchain (not shown in the figure). owned.
- a decentralized identity blockchain (not shown in the figure). owned.
- the decentralized identity blockchain is established by the autonomous foundation (SF, Sovrin Foundation)
- the DID format obtained is did:sov:WRfXPg8dantKVubE3HX8pw.
- the identity verification and authentication system of this application (Dezeta for short) continues to use this DID, and then obtains the decentralized identity identifier (DID) code "did:zeta:sov:WRfXPg8dantKVubE3HX8pw" with the word zeta added.
- the first certification terminal 11 when the first user 21 is creating avatars, use the first certification terminal 11 to collect the fingerprints of the first user 21, based on the same fingerprint, but according to different variation control parameters to generate A plurality of variant fingerprints with different patterns from each other, and then pairing the corresponding variation control parameters with the variant fingerprints to form the multiple (for example, 256) proof request sub-questions belonging to the first user 21, and then use their
- the private key in the owned user device (such as the first certification terminal 11 or the user confusion corresponding unit 53 of this application) is encrypted to form an encrypted certification request subtitle "abcDeF": ["abcDeF1","abcDeF2",” abcDeF3",...,”abcDeF256"], and then combined into the data format of Figure 4E and sent to the block chain 60 for storage.
- the block chain 60 will continue to use the existing decentralized identity identifier (DID) did:zeta:sov:WRfXPg8dantKVubE3HX8pw of the first user 21 for this avatar production, and then complete the avatar production and enrich the purpose of the question bank.
- DID decentralized identity identifier
- the first user 21 can present its identity code to the verification terminal 10 through its user device (for example, the first certification terminal 11 of the present application or the user confusion corresponding unit 53), that is,
- the above-mentioned decentralized identity identifier (DID) did:zeta:sov:WRfXPg8dantKVubE3HX8pw allows the verifier 10 to go to the blockchain 60 to find the public key "publicKey”: "H3C2AVvLMv6qmMNam3uVAjZpfkcJCwDwnZn6z3wXmqPV" and the multiple certificates Request the data block of the sub-topic (as shown in Figure 4E), use the public key "publicKey”: "H3C2AVvLMv6qmMNam3uVAjZpfkcJCwDwnZn6z3wXmqPV" to decrypt the encrypted proof request sub-topic, and then restore the proof request sub-topic to
- the verification terminal 10 thinks that the first user 21 can pass the identity verification procedure, it can allow to log in the account associated with "did:zeta:sov:WRfXPg8dantKVubE3HX8pw".
- the block chain 60 can also be completed using a general database, because through the public-private key encryption system, this embodiment encrypts the subtitle of the certification request with a private key to establish a unique biometric feature (for example, the link between the fingerprint) and the public-private key pair makes the generated proof request database have the effect of a digital signature, so this embodiment can ensure that the proof request subtitle encrypted with the private key will not be maliciously tampered with, so In terms of technical architecture, it is not necessarily necessary to use decentralized technology to ensure that data is not tampered with, so it is not necessary to use blockchain for storage.
- this application can also link unique biometric features (such as fingerprints) to different digital signatures. Keys are used to encrypt multiple proof request sub-topics respectively (that is, digitally sign the proof request sub-topics).
- the verifier can use the same user to provide the subtitle of the proof request that belongs to the same or different databases and is originally encrypted by multiple different private keys, and then use the user to disclose
- the proof request composed of the proof request sub-topics decrypted by the public key is used to challenge the user at the proof end. And when the user at the proving end can answer with a high rate of correctness or even a completely correct answer, then the verifying end can consider that the different private keys belong to the same user.
- the above-mentioned technology can be used to verify the identity of different digital signatures, and then establish a public-private key pair owned by the same user. Relevance, used to strengthen the credibility of digital signatures issued by non-government.
- this application can complete the connection between natural persons and DIDs through the connection between biometric features (such as fingerprints) and public-private key pairs
- this example is applied to non-homogeneous tokens (NFT, Non -Fungible Token)
- NFT Non-Fungible Token
- the connection between natural persons and non-fungible tokens (NFT, Non-Fungible Token) can be further achieved, which is closer to the reality of allowing natural persons to own digital assets.
- the test bank of new proof request sub-questions generated by the user during the avatar creation stage and after each important transaction, these untamperable records can also be regarded as the respective non-homogeneous tokens belonging to different users ( NFT).
- the tokens of the first user and the tokens of the second user are different, but through the technology of this application, it is possible to distinguish which NFTs belong to the first user and which ones do not belong to the first user.
- a non-homogeneous token is a proof that the user authorizes the important transaction, participates in the important event, or actively checks in to express concern about the matter, even if it is a proof produced by the same user but different devices
- the request sub-question bank (a collection of non-homogeneous tokens (NFT)) can be linked to the device's unique electronic fingerprint, NFC, or explicit QR-Code, which can be considered as the user's personal credit rating records, records of personal preferences, or even records of changes in biometrics over time.
- NFTs non-fungible tokens
- FIG. 4F is the data format used in another embodiment of putting the above-mentioned certification request subtopic on the blockchain 60.
- DID decentralized identity identifier
- the public key can originally be found in the decentralized identity blockchain (not shown) according to the decentralized identity did:sov:WRfXPg8dantKVubE3HX8pw, so the The public key does not have to be written in the subtitle of the proof request.
- the first user 21 can present its identity code to the verification terminal 10 through its user device (such as the first certification terminal 11 of the present application or the user confusion corresponding unit 53), that is, add
- the decentralized identity identifier (DID) marked by zeta above did:zeta:sov:WRfXPg8dantKVubE3HX8pw allows the verifier 10 to access the decentralized identity blockchain (not shown) and the blockchain 60
- the verifier 10 may allow to log in the account associated with "did:zeta:sov:WRfXPg8dantKVubE3HX8pw".
- the block chain 60 can also be completed by using a general database, because through the public-private key encryption system, it can already ensure that the subtitle of the encryption proof request is not tampered with.
- the verification execution unit 101 in FIG. 6A can be connected to the remote block chain 60 (or proof request database 100) through the communication network (Internet or wide area network) 61, and is used to obtain data from the block chain 60 ( or the proof request database 100) to take out the required proof request sub-topics (as shown in Figures 4E and 4F), and finally make a combination of proof titles (as shown in Figures 4A and 4C).
- the verification execution unit 101 can further utilize a noise mixer 62 contained therein to carry out sub-region segmentation (for example, segmentation into 16 sub-areas), and select some sub-areas for noise mixing, which is used to increase the difficulty of comparing the answer data.
- the fingerprint 620 on the left of the figure is a schematic diagram of mutated fingerprint data, and after being processed by the noise mixer 62, the fingerprint 621 on the right of the figure is formed, which may include multiple noises added.
- the mixed noise does not destroy the main features of the fingerprint, multiple proof ends (the first proof end 11 and the second proof end 12) at the far end can still successfully identify which proof request sub-topics belong to the application. fingerprints of the recipient.
- the verification execution unit 101 uses the noise mixer 62 to select certain sub-regions for noise mixing, the generated fingerprint 621 is divided into 16 sub-regions as shown in FIG. 7A , which may include Multiple sub-regions with noise added (marked as O), multiple sub-regions with noise added (marked with X).
- the proof end (the first proof end 11 or the second proof end 12) can clearly point out the "area with added noise" and the method of adding noise (scratch, replacement, etc.), so it can be drawn as follows after comparison
- the answer array shown in Figure 7B (the multiple sub-areas that have not added noise are marked as 0, and the multiple sub-areas that have added noise are then marked as 1), and then the answer array is sent to the verification terminal 10 for further processing. verification.
- multiple sub-regions that have been added with noise can also be marked with different values according to the method of adding noise, such as bit values such as 01, 10, and 11, and then the answer array is sent to the verification terminal 10 for further processing. Further verification.
- the verification terminal 10 compares all the answers and verifies that they are correct, a strong verification can be completed, and then a high-value transaction can be completed.
- Fig. 8A it is a preferred embodiment of the first proof terminal 11 completed by taking personal identification number (Personal identification number, PIN) as an example, the identity proof terminal device 80 with PIN code input function Functional block diagram.
- PIN Personal identification number
- the unique feature mentioned in this application in addition to the biological feature of the first user, can also be a personal identification number (Personal identification number, PIN) predetermined by the first user.
- the identity verification terminal device 80 of this embodiment mainly includes a PIN code processing unit 800, a parameter processing unit 801, a comparison unit 802, and a signal transceiving unit 803, wherein the PIN code processing unit 800 is used to receive the first user 21 input a first PIN code (such as 4-6 yards of numbers), the PIN code processing unit 800 has a variety of conversion rules, which can be switched according to the content of a control parameter output by the reading unit 801, and then used Based on the first PIN code, multiple conversion rules are used to generate a plurality of variable digital code data (word strings or bit arrays) with different contents.
- a first PIN code such as 4-6 yards of numbers
- the PIN code processing unit 800 has a variety of conversion rules, which can be switched according to the content of a control parameter output by the reading unit 801, and then used Based on the first PIN code, multiple conversion rules are used to generate a plurality of variable digital code data (word strings or bit arrays) with different contents.
- the signal transceiving unit 803 transmits the first variation data (the group of control parameters used when generating the variation digital code data) contained in the sub-topic in the received certification request to the parameter processing unit 801, In addition, the first answer data (corresponding to the variation digital code data of the first user) contained in the proof request sub-question in the proof topic combination received in the proof request is sent to the comparison unit 802.
- the parameter processing unit 801 outputs the group of control parameters to the PIN code processing unit 800 according to the first variation data, and then switches to the PIN code processing and conversion rule corresponding to the control parameter among multiple PIN code processing and conversion rules to carry out the PIN code processing, and finally produce the first answer data to be compared with a variable digital code data to be sent to the comparison unit 802, and to be used with the first answer data (corresponding to the variable number of the first user) Code data) to compare, and then determine whether the two match, and finally after comparing each sub-question, a judgment result will be drawn (which one or those sub-questions in the multiple sub-questions are the first user's variable digital code information), and transmit the judgment result to the verification terminal 10, and the verification terminal 10 can further determine whether the user's identity verification is successful or not according to the received judgment result.
- the data format example of the proof request sub-topic in this embodiment is shown in FIG. 8B , which includes personal identification code conversion rules (pin) and variable digital code data (rawdata).
- the personal identification code conversion rule can use the electronic fingerprint generated by the physical non-copyable function (PUF) security technology as the seed required by the random number generator (random number generator), and use the Cyclic Redundancy Check (Cyclic Redundancy) Check, referred to as CRC) anti-noise coding method to complete.
- the cyclic redundancy check (CRC) anti-noise coding method is mainly used to detect or verify errors that may occur during data transmission, and can be used in this application to deal with the noise mixer in the verification terminal 10. 62 deliberately added errors, and then complete the correct judgment.
- FIG. 8C is a schematic functional block diagram of yet another preferred embodiment of the above-mentioned first certification terminal 11 .
- the identity verification end device 82 of this embodiment still uses the personal identification number (PIN) predetermined by the first user as a unique feature. It differs from the previous embodiment in that besides the PIN code processing unit 800, the parameter processing unit 801, the comparison unit 802 and the signal transceiving unit 803, the identity verification terminal device 82 of this application further includes a confusion unit 821 and a signal transceiving unit 803. Deobfuscation unit 822 .
- PIN personal identification number
- the PIN code processing unit 800 can produce according to a garbler parameter (garbler) by the obfuscation unit 821 in a plurality of variation digital code data (word string or bit array) produced according to the same PIN code (available garbler) ) to perform an obfuscation operation for generating multiple obfuscated variant digital code data.
- a garbler parameter garbler
- variation digital code data word string or bit array
- the confusion and variation digital code data can be transmitted to the proof request database 100 in the remote verification terminal 10 through the signal transceiving unit 803 for storage, so as to enrich the number and types of sub-questions in the proof request database 100 .
- the purpose of confusing the variable digital code data is to prevent the variable digital code data from being maliciously collected and interpreted, and the confusing unit 821 can simply use the mutual exclusion or (XOR) circuit shown in Figure 3B to complete, of course, it can also be selected Other digital combinations or sequential logic circuits complete the obfuscation unit 821 .
- the signal transceiver unit 803 receives the certification request from the verification terminal 10, and the data format of each certification request subtitle in the certification request can be as shown in the figure As shown in 8D, it includes personal identification code conversion rules (pin), garbler parameters (garbler) and variable digital code data (rawdata).
- the group of personal identification code conversion rules (pins) used for generating the variation digital code data in each proof request sub-topic is transmitted to the parameter processing unit 801 by the signal transceiving unit 803 .
- the first answer data (corresponding to the obfuscation and variation digital code data of the first user) contained in the proof request sub-question and the scrambler parameters are first sent to the de-obfuscation unit 822, and the de-obfuscation unit 822 according to the garbler parameter (garbler) to the first answer data (corresponding to the first user's confusion and variation digital code data) for de-obfuscation operation, to get back the corresponding first user's variation number
- the encoded data is then sent to the comparison unit 802.
- the parameter processing unit 801 output the group of variation control parameters (personal identification code conversion rules) to the PIN code processing unit 800 according to the first variation data, and then input the PIN code of the first user into the PIN code processing unit At 800, use the personal identification code conversion rule corresponding to the variation control parameter to process, and finally generate the first answer data to be compared which is a variation digital code data, and then send it to the comparison unit 802.
- group of variation control parameters personal identification code conversion rules
- the comparison unit 802 is used to compare the first answer data to be compared with the first answer data (corresponding to the variable digital code data of the first user), and then judge whether the two match, and finally compare each sub After the questions are all compared, a judgment result will be obtained (which one or which sub-questions in the multiple sub-questions belong to the variation digital code data changed by the PIN code of the first user), and the judgment result will be sent to The verification terminal 10 can further determine whether the user's identity verification is successful or not according to the received judgment result.
- FIG. 8E is a functional block diagram of another preferred embodiment of the above-mentioned first certification terminal 11, which is similar to the functional design of FIG. 5B, mainly replacing the fingerprint collection unit 200 with a PIN code processing unit 800.
- the data format of the certification request used is shown in FIG. 4C , and also includes an anti-tapping protocol parameter (protocol) determined by the verifier 10 .
- protocol anti-tapping protocol parameter
- the judgment result obtained by the comparison unit 802 (which one or which sub-topics in the plurality of sub-topics is generated by the variation of the first user's PIN code) will first pass through the confusion unit 821 to produce a confusing judgment result, and The judging result of the obfuscation is transmitted to the verification terminal 10, and the verification terminal 10 can de-confuse according to the received judging result of the obfuscation and the anti-eavesdropping agreement parameter (protocol) determined by it, and further determine the user The identity verification authentication is successful.
- FIG. 8F it is a functional block diagram of another preferred embodiment of the above-mentioned first certification terminal 11, which is similar to the functional design of FIG. 5C, mainly replacing the fingerprint collection unit 200 with a PIN code processing unit 800 and adding The user confuses the corresponding unit 83 as the user device owned by the first user 21.
- the user confuses the corresponding unit 53 and can be an IC card, which stores the exclusive scrambler parameter table of the first user in it. (garbler table), and when approaching the parameter processing unit 801, allow the garbler parameter table to be read by the parameter processing unit 801.
- each proof request subtitle in the proof request used therein can be as shown in Figure 8D, including personal identification code conversion rules (pin), garbler parameters (garbler) and variable digital code data ( rawdata).
- the group of control parameters (personal identification code conversion rules) used for generating the variation digital code data in each proof request sub-topic is sent to the parameter processing unit 801 by the signal transceiving unit 803 .
- the first answer data (corresponding to the confusion and variation digital code data of the first user) and the scrambler parameters contained in the sub-question are first sent to the de-obfuscation unit 822, and the de-confusion unit 822 according to the
- the scrambler parameter and the scrambler parameter table downloaded from the user confusion corresponding unit 83 carry out de-obfuscation operation to the first answer data (corresponding to the confusion variation digital code data of the first user), and get back
- the variation digital code data corresponding to the first user is then sent to the comparison unit 802 .
- the parameter processing unit 801 output the set of control parameters (personal identification code conversion rules) to the PIN code processing unit 800 according to the first variation data, and then when the authenticator to be verified enters the PIN code in the PIN code processing unit 800 , use the personal identification code conversion rule corresponding to the control parameter to perform PIN code conversion, and finally generate the first answer data to be compared with the content of a variable digital code, and then send it to the comparison unit 802.
- control parameters personal identification code conversion rules
- the comparison unit 802 is used to compare the first answer data to be compared with the first answer data (corresponding to the variable digital code of the first user), and then judge whether the two match, and finally compare each sub-question After all comparing, will draw a judgment result (that one or those sub-questions in a plurality of sub-questions are the variable digital codes of the first user), and the judgment result is first passed through the confusing unit 51 to produce a confusing judgment result, and the confusion is passed to the verification end 10, and the verification end 10 can de-confuse according to the received judgment result of the confusion and the anti-eavesdropping agreement parameter (protocol), and further determine identity verification Whether the authentication is successful, that is, whether the authenticator to be verified is the first user.
- FIG. 9A is another embodiment developed by the present application based on the same concept. It is a non-transferable ticket purchase and verification system, which can be applied to the first user 91 in a ticket management center. 90 and the management and verification of the non-transferable tickets carried out between 92 and an entry ticket inspection terminal.
- the first user 91 can obtain a first non-transferable ticket 900 from the ticket management center 90, and the first non-transferable ticket 900 includes a one-time password (OTP) 9001 and a certification request 9002 , the certification request 9002 includes a first variation unique characteristic and a first variation data.
- OTP one-time password
- the certification request 9002 includes a first variation unique characteristic and a first variation data.
- the first variation unique feature is generated by mutation operation using the first variation data and a first unique feature provided by the first user 91 .
- the first non-transferable ticket 900 can be a digital file, and the first user 91 can use its own hardware (not shown in this figure, it can be a smart phone or a personal computer) to A tool program 910 is downloaded and installed.
- the tool program 910 may be issued by the ticket management center 90 and run on the first user 91 end. Then, the first user 91 uses the tool program 910 to purchase the first non-transferable ticket 900 from the ticket management center 90 existing in the form of a website.
- the ticket management center 90 can require the first user 91 to use the hardware it holds.
- the tool program 910 collect the first unique feature (such as face, fingerprint, handwritten signature or a voice clearance passphrase whose content can be customized and read out by yourself) that it belongs to and can provide with you, and then according to the randomly selected
- the first mutation data is used to perform a mutation operation on the first unique feature, and finally the first mutation unique feature is generated to form the certification request 9002 .
- the first user 91 uses its owned hardware or the tool program 910 to transmit the certification request 9002 to the ticket management center 90, or the first user 91 will identify its decentralized identity
- the certificate (DID) is directly sent to the ticket management center 90, and the ticket management center randomly selects the certificate request sub-topic generated by the first user 91 according to the decentralized identity identifier (DID) to form the certificate request 9002.
- the ticket management center 90 packages the randomly generated one-time password 9001 and the certification request 9002 into the first non-transferable ticket 900 and sends it back to the first user 91, so that the delivery of the ticket can be completed.
- this one-time password 9001 is mainly produced by this ticket management center 90, is encapsulated in this first non-transferable ticket 900, will be opened after answering this certification request 9002 successfully.
- the hardware held by the first user 91 (smart phone or similar portable device, such as a wearable watch), it can be used to store the first non-transferable ticket 900, the first non-transferable ticket 900 It can also record the time stamp (or similar code) when the first non-transferable ticket 900 is generated and stored for the first time, for example, 10:38:25 AM on July 30, 2021, and this time stamp can also be recorded at the same time Recorded in the terminal of the ticket management center 90, corresponding to the data field of the first non-transferable ticket 900.
- the time stamp of the first non-transferable ticket 900 can be set as "the time when it was saved", For example, July 31, 2021 at 11:56:55 AM.
- the first user 91 can use the first non-transferable ticket 900 in the portable device for ticket inspection.
- the tool program 910 can also be added with the function of reissuing coupons or coupon transfer.
- the tool program 910 of the original user needs to notify the coupon management center 90, and the first non-transferable ticket 900 is repackaged by a new certification request generated by the new user, and stored in the portable device of the new user again. In this way, the ticket in the present invention can be transferred, but it needs to be processed and marked by the ticket management center 90 .
- Fig. 9B it is a functional block diagram of a portable device 99 that can be used to store the first non-negotiable ticket 900.
- the first method In order to ensure that the ticket Tickets have not been transferred to others after they are sold. At the ticket gate, the ticket holder needs to use his own unique features (such as face, fingerprint, handwritten signature or a voice that can be customized and read out by himself) to pass the level. Only after successfully answering the certification request 9002 through a password) can the one-time password 9001 in the first non-transferable ticket 900 be opened.
- the way of successfully answering this certification request 9002 can be to let the holder use the portable device 99 to obtain the unique feature on the spot at the ticket gate, and then use the tool program 910 installed on the portable device 99 , according to the unique feature and the first variation data in the certification request in the first non-negotiable ticket 900 to generate a unique feature of the variation to be compared; then according to the unique feature of the variation to be compared and the unique feature of the first variation A judgment result is produced by the comparison, and finally, whether the ticket holder is the first user can be determined according to the judgment result.
- the display 990 in the portable device 99 can show the one-time password 9001 to the ticket reader at the entry ticket inspection terminal 92 to read and check the once Whether the password 9001 is legal or not. Conversely, if the judgment result is that the ticket holder is not the first user, then the display 990 in the portable device 99 will not show the one-time password 9001, so that the ticket holder cannot pass through the ticket inspection. was denied admission.
- the one-time password 9001 is a two-dimensional barcode
- the entrance ticket inspection terminal 92 only needs to be equipped with a two-dimensional barcode reader and a database storing the sold one-time passwords to complete the layout, so that Scan the QR code directly to complete ticket verification.
- the proof request can also include a proof topic combination, and a proof request sub-topic composed of the first variation unique feature and the first variation data can be included in the proof topic combination, and the answer combination corresponding to the proof topic combination is a bit string or a bit array.
- the answer combination corresponding to the proof topic combination is a 16-bit string 0010000000010000.
- the second method can also be adopted: first check the latest storage time of the first non-transferable ticket 900, when its latest storage time and the first time recorded at the ticket management center 90 are generated and stored When the time is consistent, it is directly released, because this situation represents that the first non-transferable ticket 900 has not been resold and is transferred to another person's portable device. Conversely, when the latest storage time is inconsistent with the first generated and stored time recorded at the ticket management center 90, it means that the first non-transferable ticket 900 has been transferred to a different portable device.
- the entry ticket checking terminal 92 needs to require the ticket holder to use the unique features (such as fingerprints, handwritten signatures, or a voice pass code that the content can be customized and read out in person) to respond to the certification request on the spot.
- the unique features such as fingerprints, handwritten signatures, or a voice pass code that the content can be customized and read out in person
- the verification method of the original identity management system on the smart phone can also be used to package the one-time password 9001 in the first non-transferable ticket 900, for example, the phone number or the phone number IMEI serial number for binding, that is to say, the one-time password 9001 in the first non-transferable ticket 900 must be opened on the same mobile phone number or the same IMEI serial number mobile phone, which can also greatly reduce the ticket price. Chances of the coupon being transferred. Furthermore, this technical means can also be applied to the sale of package tickets.
- the certification request in the non-transferable package ticket It contains the corresponding unique features provided by each user to mutate the unique features generated by the mutation operation, and at the admission ticket terminal 92, multiple users are required to provide corresponding unique features to open the non-transferable The one-time password in the set ticket, and then complete the above-mentioned ticket verification procedure.
- the portable device storing the first non-transferable ticket 900 can also be an exclusive souvenir of the event.
- the technology of this application can also be applied to the identity verification and authentication system of user devices such as smart phones or notebook computers, and then integrated with the system established by the Fast IDentity Online (FIDO) Alliance.
- FIDO Fast IDentity Online
- the user identity code in the "decentralized zero-trust identity verification and authentication system and method" of this application is realized by using the decentralized identity identifier (DID) technology, and after the identity code is recorded in the FIDO registration stage, the user In each verification and authentication procedure performed during the login phase, in addition to performing unilateral authentication of the user (password, fingerprint or facial recognition) on the hardware held by the user, the FIDO verification terminal can also use the user
- the identity code is used to carry out the "decentralized zero-trust identity verification and authentication system and method” described in this application as the second factor (Second Factor), so as to enhance its security.
- the user device may first acquire a unique characteristic (fingerprint, voiceprint or face) corresponding to a user (real person), and generate at least one variation unique characteristic according to the unique characteristic and a variation data. Then use the unique feature of the variation to generate a proof request, the proof request at least includes the variation data and an answer data, wherein the answer data includes the unique feature of the variation.
- the generated proof request can be stored in the user device, but the previously obtained unique feature is deleted, so the unique feature corresponding to the user (real person) itself will no longer be stored in the user device middle.
- an authenticator to be verified will make the user device enter a normal use state (such as obtaining a full access right to the user device)
- the user device will first obtain the Corresponding to a unique feature (fingerprint, voiceprint or face) of the authenticator to be verified, and according to the unique feature to be verified of the authenticator to be verified and the variation data in the certification request to generate a comparison The answer data; then according to the comparison of the answer data to be compared with the answer data in the certification request, a judgment result is produced; finally, according to the judgment result, it is determined whether the authenticator to be verified is the user By. If yes, then let the user device enter the normal use state or enable the FIDO function normally.
- the user device may require the user to generate a new certificate request to replace the invalid certificate request, and delete the unique feature acquired at the time from the device. In this way, the user device still does not store any unique characteristics corresponding to the user (real person), and the user device does not need to be in a connected state when performing identity verification and authentication. Therefore, the above concept can also be applied to shared cars, motorcycles or cold wallets of cryptocurrencies that cannot be connected to the Internet at all times.
- the cryptocurrency wallet can also be another type of FIDO authenticator (authenticator), which can be used to generate, manage, and store public-private key pairs.
- authentication an authenticator
- the user can bind a digital avatar created by this application "Decentralized Zero Trust Identity Verification Authentication System and Method" according to different application scenarios, which is managed by the encrypted currency wallet and A user ID corresponding to the digital double is stored. And by completing the verification means of the digital avatar, the encrypted currency account corresponding to the digital avatar in the encrypted currency wallet can be successfully accessed.
- the above-mentioned technical means of non-transferable tickets can be used to encapsulate the password corresponding to an encrypted currency account with a certification request related to the digital clone
- the non-transferable ticket is stored in a specific hardware or a database whose content cannot be tampered with, and only the unique characteristics of the digital double can be used to successfully answer the certification request.
- a password that can unlock the cryptocurrency account in the non-transferable ticket is used. In this way, using the technology of the present application, another technical means for safely storing the password of the encrypted currency account can be provided.
- FIG. 10 is a functional block diagram of applying the technology of this application to the verification and authorization process of a decentralized autonomous organization (Decentralized Autonomous Organization, referred to as DAO) on a physical enterprise organization or even a blockchain.
- DAO Decentralized Autonomous Organization
- It is a digital contract signing method.
- an online digital contract or a smart contract on the blockchain 1001
- five of them need to be signed and approved by specific users (users 1011-1015) to be confirmed or is in effect.
- the digital contract 1001 can issue corresponding certification requests (certification requests 1111-1115) to these specific users to encapsulate the contract content, until the five specific users 1011-1015 have passed the identity verification proposed in this application Authentication mechanism for identity verification and authentication, and when the correct digital avatar unique characteristics can correctly respond to the corresponding certification requests, the content of the digital contract can be correctly opened to allow the corresponding specific user Read and be confirmed, and the digital contract will be signed until all five users confirm it.
- the present application can also apply the core technology to an advertisement benefit sharing mechanism.
- a user installs a dedicated application program in a user device (smart phone, personal computer or shared KIOSK) or uses a browser to access a portal website
- the dedicated application program and the portal website provided Advertisement pages provided by advertisers can be inlaid on the user interface, and the fee for placing advertisements can be collected by the provider of the exclusive application program and the builder of the portal website.
- the portal website here can be a shopping website, a video and video sharing platform, a community website or an online game website.
- the user can first obtain the unique feature corresponding to the user (input PIN code or provide fingerprint) through the user device (smart phone, personal computer or shared KIOSK) and then according to the unique feature and Multiple variant data to generate multiple variant-specific features, and then the user device will completely delete the temporarily stored PIN code or fingerprint, but through the exclusive application or through the browser and portal, the multiple variants Data-mutation-specific features are uploaded to a database whose contents cannot be tampered with. And after the multiple variation data-variation-specific features are successfully uploaded, the database maintainer, exclusive application provider, portal website builder or advertiser can issue benefits (such as reward tokens) to the user exclusively Account.
- benefits such as reward tokens
- providers of third-party services can link to the database to obtain such information.
- Variation data-variation-specific characteristics, and the variation data-variation-specific characteristics can be used to generate a certification request.
- Third-party service providers who obtain such variation data-variation-specific characteristics need to provide corresponding benefits (such as fees or reward tokens) to the database maintainer, exclusive application provider, and portal builder.
- the authenticator to be verified can provide the unique characteristics of an authentication to be verified (input a PIN code or provide a fingerprint) that he or she owns for use in Processing with the variation data in the certification request submitted by the third-party service provider to generate an answer data to be compared, and then performing a comparison between the answer data to be compared and the answer data in the certification request When a judgment result is produced, it can finally be determined whether the person to be verified and authenticated is the user himself or not according to the judgment result.
- the technology of this application can not only be applied to the identity verification and authentication of natural persons and pets with biological characteristics, but also can be applied to the identity verification and authentication between Internet of Things objects.
- it can pass security Personalize IoT objects in certified factories, assign a unique decentralized identity identifier (DID) as the identity code of the IoT object, and then use Physically Unclonable Function (PUF) technology to realize this
- DID decentralized identity identifier
- PAF Physically Unclonable Function
- the verification terminal can use this application "Decentralized Zero Trust Identity Verification and Authentication System and Method” to verify the identity of the IoT object and confirm that it is manufactured by the safety-certified factory of an IoT object.
- the Internet of Things object can also use the special information of the location (such as GPS position) as its second unique feature, and use the second unique feature and the first unique feature to further generate more proof request sub-questions, using to populate its attestation request database.
- two IoT objects can use this application "Decentralized Zero Trust Identity Verification and Authentication System and Method” to verify the identity of the other party, which is used to realize the "Internet of Things" between objects.
- Zero Trust Architecture Zero Trust Architecture
- the first unique feature and the second unique feature can effectively prevent the intrusion event of the IoT object in a different place pretending to be a genuine IoT object, and can also effectively Another type of intrusion event that prevents authentic IoT objects from being plugged and replaced.
- the technical means disclosed in this case can be applied to the identity verification and authentication of natural persons and Internet of Things objects, and the technical means of this case do not need to keep unnecessary personal privacy data in the database of the verification end, so it is especially suitable for those who need to comply with the Personal Information Protection Law , such as the company line number of the EU's General Data Protection Regulation (GDPR).
- GDPR General Data Protection Regulation
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Biomedical Technology (AREA)
- Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Collating Specific Patterns (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (23)
- 一种身份核实认证方法,应用于使用者的身份核实认证,所述方法包含:获取所述使用者可提供的特有特征,并根据所述特有特征与第一变异资料来生成第一数字信物,所述第一数字信物中包含有第一变异特有特征;根据所述第一数字信物来生成第一证明请求,所述第一证明请求中至少包含有所述第一变异资料与第一答案资料,其中所述第一答案资料中包含有所述第一变异特有特征;获取对应于待核实认证者的待认证特有特征,并根据所述待核实认证者的所述待认证特有特征与所述第一证明请求中的所述第一变异资料而生成第一待比对答案资料;根据所述第一待比对答案资料与所述第一证明请求中的所述第一答案资料所进行的比对而产出第一判断结果;以及根据所述第一判断结果来决定所述待核实认证者是否为所述使用者。
- 如权利要求1所述的身份核实认证方法,其中还包含下列步骤:根据所述特有特征与第二变异资料来生成第二数字信物,所述第二数字信物中包含有第二变异特有特征;根据所述第二数字信物来生成第二证明请求,所述第二证明请求中至少包含有所述第二变异资料与第二答案资料,其中所述第二答案资料中包含有所述第二变异特有特征;根据所述待核实认证者的所述待认证特有特征与所述证明请求中的所述第二变异资料而生成第二待比对答案资料;根据所述第二待比对答案资料与所述证明请求中的所述第二答案资料所进行的比对而产出所述第二判断结果;以及根据所述第一判断结果与所述第二判断结果来共同决定所述待核实认证者是否为所述使用者。
- 如权利要求1所述的身份核实认证方法,其中所述使用者为自然人、信息装置、机器人、物联网物件与具有特有特征的资产物件中之一,所述自然人的所述特有特征为所述使用者随身自备且能重复拿出来的秘密,所述秘密是记忆中的密码、手写签名或符号、一句亲自发音的通关密语、特殊的手势或肢体习惯动作以及一个或多个生物特征的组合中之一,所述信息装置、所述机器人或是所述物联网物件的所述特有特征是集成电路芯片中以物理不可仿制功能安全技术所生成的电子指纹或是再搭配所述信息装置、机器人或是物联网物件的所在地特有信息。
- 如权利要求1所述的身份核实认证方法,其中所述第一证明请求中所包含的所述第一变异资料是生成所述第一答案资料所需的信息,所述第一答案资料由所述第一使用者 在分身制作阶段时,利用其具有的所述特有特征与所述第一变异资料所生成并储存在资料可以被取用的资料库中;而根据所述第一答案资料与所述第一变异资料,并无法回推出所述特有特征;所述资料库为区块链公开但不可窜改的数字帐本系统,所述资料库中储存有多笔证明请求子题,每笔所述证明请求子题包含有对应一特定使用者的变异资料与答案资料;对应所述第一使用者的所述证明请求子题包含有所述第一变异资料和所述第一答案资料;所述身份核实方法具体包括响应于所述第一使用者所发出的核实请求,根据所述核实请求中代表所述第一使用者的身份代码来从所述资料库中的所述多笔证明请求子题来挑选并生成出证明题目组合以及答案组合;所述第一证明请求中包含有所述证明题目组合,根据所述证明题目组合所对应产生的第一待比对答案组合与所述证明题目组合所进行的比对而产出所述第一判断结果,再根据所述第一判断结果与所述答案组合是否相符来决定所述第一使用者的身份验证是否成功。
- 一种身份核实认证系统,应用于至少一第一使用者的身份核实认证,所述系统包含:第一证明端,用于获取所述第一使用者提供的第一特有特征;以及核实端,信号连接至所述第一证明端,用于生成第一证明请求,所述核实端还用于向所述第一证明端至少发出所述第一证明请求中的第一变异资料,所述第一证明端用于根据所述第一使用者所提供的所述第一特有特征以及所述第一变异资料而生成第一待比对答案资料,所述第一证明端或所述核实端用于再根据所述第一待比对答案资料与所述第一证明请求中的所述第一答案资料所进行的比对而产出第一判断结果,以及再根据所述第一判断结果来决定所述第一使用者的身份验证是否成功。
- 如权利要求5所述的身份核实认证系统,其中所述核实端具体用于向所述第一证明端发出所述第一证明请求中的所述第一变异资料与所述第一答案资料,所述第一证明端用于根据所述第一使用者所提供的所述第一特有特征以及所述第一变异资料而生成所述第一待比对答案资料,所述第一证明端用于根据所述第一待比对答案资料与所述第一证明请求中的第一答案资料所进行的比对而产出第一判断结果,所述核实端用于再根据所述第一判断结果来决定所述第一使用者的身份验证是否成功。
- 如权利要求5所述的身份核实认证系统,其中所述核实端具体用于仅向所述第一证明端发出所述第一证明请求中的所述第一变异资料,所述第一证明端用于根据所述第一使用者所提供的所述第一特有特征以及所述第一变异资料而生成所述第一待比对答案资料后送回所述核实端,所述核实端用于根据所述第一待比对答案资料与所述第一证明请求中的第一答案资料所进行的比对而产出第一判断结果,所述核实端用于再根据所述第一判断结果来决定所述第一使用者的身份验证是否成功。
- 如权利要求5所述的身份核实认证系统,其中还包含第二证明端,用于获取第二使 用者提供的第二特有特征,所述核实端信号连接至所述第二证明端,用于生成第二证明请求,所述核实端还用于向所述第二证明端至少发出所述第二证明请求中的第二变异资料,所述第二证明端用于根据所述第二使用者所提供的所述第二特有特征以及所述第二变异资料而生成第二待比对答案资料,所述第二证明端或所述核实端用于根据所述第二待比对答案资料与所述第二证明请求中的第二答案资料所进行的比对而产出第二判断结果,以及再根据所述第二判断结果来决定所述第二使用者的身份验证是否成功。
- 如权利要求5所述的身份核实认证系统,其中所述核实端包含:证明请求资料库,其中储存有多笔证明请求子题,每笔所述证明请求子题包含有对应一特定使用者的变异资料与答案资料;以及核实执行单元,用于根据一核实请求中所包含的身份代码,而从所述证明请求资料库中的所述多笔证明请求子题来挑选并生成出证明题目组合以及答案组合,根据所述第一使用者的所述身份代码所产生的所述证明题目组合为所述第一证明请求,而所述第一证明端或所述核实执行单元用于根据所述第一待比对答案资料与所述第一证明请求中的所述第一答案资料所进行的比对所产出的所述第一判断结果,再用于根据所述第一判断结果与所述答案组合是否相符来决定所述第一使用者的身份验证是否成功,其中所述身份代码是选用自去中心化身份辨识符、属于所述第一使用者的身份证号、移动电话号码以及所述第一使用者自定义的使用者名称中之一,当所述身份代码选用所述去中心化身份辨识符时,所述第一使用者的所述特有特征与区块链上的一非同质化代币完成关联,达成让自然人拥有数字资产的效果,所述第一使用者在分身制作阶段以及每次重要的交易后所产生新的证明请求子题的题库,这些不可篡改的记录也可以被视为属于所述第一使用者的非同质化代币,所述非同质化代币代表所述第一使用者授权所述重要交易的证明,所述非同质化代币集合为所述使用者的个人信用评等记录或是特有特征随时间变化的记录,所述记录可以跨装置而指向所述第一使用者,还可以被用来当作健康保险、金融信用甚或是区块链上的共识机制参考的重要资料。
- 如权利要求5所述的身份核实认证系统,其中所述第一证明端包含:信号收发单元,信号连接至所述核实端,所述信号收发单元用于将所接收到的所述第一证明请求中的所述第一变异资料取出;参数处理单元,信号连接至所述信号收发单元,所述参数处理单元用于根据所述第一变异资料来输出一组变异控制参数;生物特征采集单元,信号连接至所述参数处理单元,所述生物特征采集单元用于采集所述第一使用者的至少一生物特征,而且所述生物特征采集单元具有多种生物特征采集与转换规则,并可以用于根据所述参数处理单元所输出的所述组变异控制参数的内容来进行切换,进而在多个生物特征采集与转换规则中切换至所述组变异控制参数所对应的所述生物特征采集与转换规 则来进行生物特征采集与变异,最后产生出包含变异生物特征的所述第一待比对答案资料来传送;以及比对单元,信号连接至所述生物特征采集单元与所述信号收发单元,所述比对单元用于将所述第一待比对答案资料与所述第一证明请求中的所述第一答案资料进行比对,进而判断两者是否相符。
- 如权利要求10所述的身份核实认证系统,其中所述生物特征为单一指纹、多个指纹的排列组合、声纹、脸孔、手写签名或步态特有特征,所述第一证明请求中包含证明题目组合,所述证明题目组合资料种类包含有一时间戳记、发出挑战者名称以及多个证明请求子题所构成的题目组合,而每一个所述证明请求子题是从所述证明请求资料库中所取出,所述第一证明端用于将答案比对与判断工作以安全多方计算的技术打包,利用边缘计算架构完成所述答案比对与判断工作,用于降低证明端本身的运算量。
- 如权利要求10所述的身份核实认证系统,其中所述第一证明端还包含:混淆单元与解混淆单元,其中所述多个变异生物特征中的任一原始变异生物特征资料由所述混淆单元根据乱码器参数来进行混淆运算,用于产生混淆原始变异生物特征资料,所述混淆原始变异生物特征资料通过所述信号收发单元来传送到远端的一证明请求资料库中进行储存,用于充实所述证明请求资料库中子题的数量与种类,所述解混淆单元用于根据所述乱码器参数来对所述第一使用者的所述混淆变异生物特征资料进行解混淆运算,得回对应所述第一使用者的所述原始变异生物特征资料后再送至所述比对单元。
- 如权利要求12所述的身份核实认证系统,其中所述核实端所发出的所述第一证明请求中还包含有由所述核实端决定的防窃听协定参数,所述混淆单元用于根据所述比对单元所得出的一判断结果产生混淆过判断结果,并将所述混淆过判断结果传送至所述核实端,所述核实端用于再根据所接收到的所述混淆过判断结果与其决定的所述防窃听协定参数来解混淆,进一步来决定所述第一使用者的身份核实认证是否成功。
- 如权利要求12所述的身份核实认证系统,其中还包含有专属于所述第一使用者的第一使用者混淆对应单元,其内储存有专属所述第一使用者的乱码器参数表,所述乱码器参数表可被所述参数处理单元所读取,所述生物特征采集单元具有多种生物特征采集与转换规则,可以根据所述参数处理单元所输出的所述控制参数的内容来进行切换,进而能根据同一生物特征为基础,却可产生出彼此互异的多个变异生物特征,而多个变异生物特征中的任一变异生物特征资料,可由所述混淆单元根据从所述使用者混淆对应单元中所读取到的所述乱码器参数表以及一乱数产生的乱码器参数来进行混淆运算后,产生出所述混淆变异生物特征资料;所述混淆变异生物特征资料可通过所述信号收发单元来传送到远端的所述证明请求资料库中,用于充实所述证明请求资料库中子题的数量与种类。
- 权利要求14所述的身份核实认证系统,其中所述核实端中的所述证明请求资料库中储存有所述多笔不可篡改的证明请求子题,并可以通过位于远端的多个证明端所产生并回传的证明请求子题来充实题库,所述证明端是具有生物特征采集功能的身份证明端装置,而回传的证明请求子题中包含有生物特征参数、乱码器参数以及混淆变异生物特征资料的资料封包,另外所述核实端中包含有一杂讯混合器,所述杂讯混合器用来对所述证明请求子题中的答案资料进行子区域分割,并选择在部分子区域进行杂讯混入,用于增加答案资料的可比对难度;所述第一证明端可以用于清楚指出“加过杂讯的区域”以及加入杂讯的方法,因此经比对后得出答案阵列,其中未加入杂讯的多个子区域与已加入杂讯的多个子区域分别标示为不同数值,其中已加入杂讯的多个子区域更依加入杂讯的方法标示为不同数值,然后再用于将所述答案阵列传送给所述核实端进行进一步的强力核实。
- 一种身份核实认证方法,应用于数字分身的身份核实认证,所述方法包含下列步骤:根据对应于所述数字分身的特有特征与变异资料来生成数字信物;将所述数字信物上传至不可窜改数字帐本,所述数字信物中包含有与所述特有特征相关的变异特有特征;根据所述不可窜改数字帐本上的所述数字信物来生成证明请求,所述证明请求中至少包含有所述变异资料与答案资料,其中所述答案资料中包含有所述变异特有特征;根据所述证明请求的所述变异资料与对应于待认证数字分身的待认证特有特征而生成待比对答案资料;根据所述待比对答案资料与所述证明请求中的所述答案资料所进行的比对而产出判断结果;以及根据所述判断结果来决定所述待认证数字分身是否为所述数字分身。
- 一种不可转让票券的购买与验证方法,可应用于第一使用者在票券管理中心以及入场验票端之间,所述方法包含下列步骤:所述第一使用者从所述票券管理中心获得第一不可转让票券,所述第一不可转让票券中包含有一个一次性密码以及证明请求,所述证明请求中则包含有第一变异特有特征与第一变异资料,其中所述第一变异特有特征是根据所述第一变异资料与所述第一使用者所提供的第一特有特征来生成;以及当所述第一使用者在所述入场验票端使用自身所属的所述第一特有特征与所述第一变异资料来成功回答所述证明请求后,便可开启所述第一不可转让票券中的所述一次性密码来完成验票。
- 如权利要求17所述的不可转让票券的购买与验证方法,其中所述第一不可转让票券是一个数字档案,而所述第一使用者利用其所持有的硬体来下载并安装工具程序,所述第一使用者利用所述工具程序到以网站形态存在的所述票券管理中心购买所述第一不可转让票券,当所述第一使用者与票券管理中心间的交易行为被认可后,所述票券管理中心便要求所述第一使用者利用其所持有的硬体与所述工具程序采集其所属并可随身提供的所述第一特有特征,然后根据随机选用的所述第一变异资料来将所述第一特有特征进行变异运算,最后生成所述第一变异特有特征而组成所述证明请求后,将所述证明请求传送到所述票券管理中心,或是由所述第一使用者将其去中心化身份辨识符直接传送给所述票券管理中心,由所述票券管理中心根据所述去中心化身份辨识符来自行随机选用所述第一使用者已产生的至少一证明请求子题而组成所述证明请求,所述票券管理中心再将随机产生的所述一次性密码与所述证明请求封装成所述第一不可转让票券传回给第一使用者,用于完成票券交付,所述第一不可转让票券中还可以记录下所述第一不可转让票券首次被生成与储存的时间戳记,而所述时间戳记也被同时记录在所述票券管理中心端,对应所述第一不可转让票券的资料栏位中,而当所述第一不可转让票券被再次转存至可携式装置中,所述第一不可转让票券的时间戳记被设定成“被另存的时间”,为了减少验票时间,可以先检查所述第一不可转让票券的最新储存时间,当其最新储存时间与记录在票券管理中心端的首次被生成与储存的时间一致时而直接放行,反之,当其最新储存时间与记录在票券管理中心端的首次被生成与储存的时间不一致,此时入场验票端才需要要求持票人当场使用自身所属的所述特有特征来回应所述证明请求,用于开启所述第一不可转让票券中的所述一次性密码。
- 一种身份核实认证方法,应用于使用者装置上,其包含下列步骤:所述使用者装置获取对应于使用者的特有特征后,再根据所述特有特征与变异资料来至少生成变异特有特征;利用所述变异特有特征生成证明请求,所述证明请求中至少包含有所述变异资料与答案资料,其中所述答案资料中包含有所述变异特有特征,而生成后的所述证明请求被存放在所述使用者装置中,但先前所获取的所述特有特征则被删除;当待核实认证者要使所述使用者装置进入正常使用状态时,所述使用者装置先获取对应于所述待核实认证者的待认证特有特征,并根据所述待核实认证者的所述待认证特有特征与所述证明请求中的所述变异资料而生成待比对答案资料;根据所述待比对答案资料与所述证明请求中的所述答案资料所进行的比对而产出判断结果;以及根据所述判断结果来决定所述待核实认证者是否为所述使用者。
- 如权利要求19所述的身份核实认证方法,其中所述使用者装置为共享汽车、摩托车、加密货币的冷钱包、智能手机或笔记本电脑,其与行动身份识别联盟所建立系统完成整合,而所述证明请求在使用次数或使用时间超过一预设值后,便会过期而失效,在此同时,所述使用者装置将要求所述使用者再生成一个新的证明请求来取代失效的证明请求,并且将当次获取的所述特有特征从装置中删除,而在进行身份核实认证时,所述使用者装置不需要处于连线状态。
- 一种数字合约签署方法,应用于多个使用者之间,其包含下列步骤:提供一张数字合约;所述数字合约分别对所述多个使用者发出相对应的证明请求,所述证明请求中封装有所述数字合约的内容;所述多个使用者通过权利要求1所述的身份核实认证方法,而能正确地回应所述等相对应的证明请求时,所述数字合约的内容便可被正确打开而让相对应的特定使用者阅读以及被确认;以及直到所述多个使用者皆确认后所述数字合约便被签署生效。
- 一种核实认证方法,应用于多个物联网物件之间,所述核实认证方法包含下列步骤:提供一物联网物件;在一硬件生产阶段中,赋予所述物联网物件相对应且唯一的身份代码与第一特有特征,再利用所述身份代码与所述第一特有特征产生至少一数字信物并储存在证明请求资料库中;在一初始化阶段,一核实端使用权利要求1所述的身份核实认证方法来对所述物联网物件进行身份核实认证,通过所述身份核实认证的所述物联网物件再使用其所在地的特用信息做为第二特有特征,并用所述第二特有特征与所述第一特有特征来进一步产生更多的证明请求子题,用来充实其证明请求资料库;以及在一运行阶段时,另一物联网物件使用权利要求1所述的身份核实认证方法,同时利用所述第一特有特征与所述第二特有特征来进行所述物联网物件的身份核实认证。
- 一种利益分享的方法,包含下列步骤:利用专属应用程序或是浏览器来存取入口网站;在使用者分身制作阶段,所述使用者通过用户装置获取对应于所述用户的特有特征并根据所述特有特征与多个变异资料来生成多个变异特有特征,通过所述专属应用程序或是通过所述浏览器与所述入口网站,将多个变异资料-变异特有特征上传至内容无法窜改的资料库,并可在所述多个变异资料-变异特有特征成功上传后,由所述资料库的维护 方、所述专属应用程序的提供者、所述入口网站的建置者或一广告商发出利益给该使用者专属的账户;以及一第三方服务提供商链接至所述资料库以获取所述多个变异资料-变异特有特征,并响应于待核实认证者使用专属应用程序或入口网站来登入第三方服务时,利用所述多个变异资料-变异特有特征来生成证明请求,然后使用权利要求1所述的身份核实认证方法来对所述待核实认证者进行身份核实认证,其中获取所述多个变异特有特征的第三方服务提供商,需对所述资料库维护方、所述专属应用程序提供者或入口网站建置者提供相对应的利益。
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202280060797.7A CN117981272A (zh) | 2021-09-07 | 2022-09-06 | 去中心化零信任身份核实认证系统及方法 |
| US18/690,038 US12463816B2 (en) | 2021-09-07 | 2022-09-06 | Decentralized zero-trust identity verification-authentication system and method |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US202163241111P | 2021-09-07 | 2021-09-07 | |
| US63/241,111 | 2021-09-07 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2023036143A1 true WO2023036143A1 (zh) | 2023-03-16 |
Family
ID=85506086
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2022/117346 Ceased WO2023036143A1 (zh) | 2021-09-07 | 2022-09-06 | 去中心化零信任身份核实认证系统及方法 |
Country Status (3)
| Country | Link |
|---|---|
| US (1) | US12463816B2 (zh) |
| CN (1) | CN117981272A (zh) |
| WO (1) | WO2023036143A1 (zh) |
Cited By (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN116743743A (zh) * | 2023-05-13 | 2023-09-12 | 深圳星火互娱数字科技有限公司 | 一种元宇宙数据分享方法及系统 |
| CN117411615A (zh) * | 2023-12-13 | 2024-01-16 | 广州市信亦达电子科技有限公司 | 一种基于随机数的二维码防伪加密方法及系统 |
| CN118282663A (zh) * | 2024-03-27 | 2024-07-02 | 贵州大学 | 一种元宇宙中基于第一印象的抗乔装身份认证方法 |
| CN119854027A (zh) * | 2025-03-18 | 2025-04-18 | 北京工业大学 | 一种基于区块链的车联网身份跨域认证系统 |
| US12284294B1 (en) * | 2023-01-04 | 2025-04-22 | Wells Fargo Bank, N.A. | Authentication in metaverse |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103617534A (zh) * | 2013-10-18 | 2014-03-05 | 苏州佳世达电通有限公司 | 电子票券取票方法及应用该方法的系统 |
| CN104468579A (zh) * | 2014-12-10 | 2015-03-25 | 北京众享比特科技有限公司 | 适用于分布式存储的认证系统 |
| US20180183586A1 (en) * | 2016-12-28 | 2018-06-28 | Intel Corporation | Assigning user identity awareness to a cryptographic key |
| CN109272317A (zh) * | 2018-09-27 | 2019-01-25 | 北京金山安全软件有限公司 | 一种区块链私钥的获取方法、装置及电子设备 |
| WO2020042462A1 (zh) * | 2018-08-31 | 2020-03-05 | 深圳壹账通智能科技有限公司 | 基于生理特征信息的身份验证方法、装置、系统和介质 |
| CN112714108A (zh) * | 2020-12-21 | 2021-04-27 | 中国移动通信集团江苏有限公司 | 终端通信号码验证的方法、装置、设备及计算机存储介质 |
Family Cites Families (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| TW591554B (en) | 2002-10-28 | 2004-06-11 | Sin Etke Technology Co Ltd | Vehicle management system |
| TW200534133A (en) | 2004-04-07 | 2005-10-16 | Friendly Information Co Ltd | Electronic bank account opening method and management system integrating image and identity data |
| CN101539995B (zh) | 2009-04-24 | 2011-05-25 | 清华大学深圳研究生院 | 基于手指静脉纹与手指背纹的成像设备及多模态身份认证方法 |
| CN102916968B (zh) | 2012-10-29 | 2016-01-27 | 北京天诚盛业科技有限公司 | 身份认证方法、身份认证服务器和身份认证装置 |
| CN103647534B (zh) | 2013-11-29 | 2016-06-08 | 青岛歌尔声学科技有限公司 | 一种电子设备的按键复位电路 |
| US10671712B1 (en) | 2017-03-01 | 2020-06-02 | United Services Automobile Association (Usaa) | Virtual notarization using cryptographic techniques and biometric information |
| US20210377263A1 (en) | 2018-10-29 | 2021-12-02 | Login Id Inc. | Distributed computing systems for strong user authentication and related methods |
| CN109472647A (zh) | 2018-11-16 | 2019-03-15 | 重庆晶皛广告传媒有限公司 | 一种互联网广告系统运营方法 |
| US20250165575A1 (en) * | 2019-06-25 | 2025-05-22 | Scientia Potentia Est II, LLC | System for system for creating, storing, and portably utilizing verified digital identities |
| US20240022565A1 (en) * | 2019-12-10 | 2024-01-18 | Winkk, Inc | Continuous id verification based on multiple dynamic behaviors and analytics |
-
2022
- 2022-09-06 US US18/690,038 patent/US12463816B2/en active Active
- 2022-09-06 WO PCT/CN2022/117346 patent/WO2023036143A1/zh not_active Ceased
- 2022-09-06 CN CN202280060797.7A patent/CN117981272A/zh active Pending
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103617534A (zh) * | 2013-10-18 | 2014-03-05 | 苏州佳世达电通有限公司 | 电子票券取票方法及应用该方法的系统 |
| CN104468579A (zh) * | 2014-12-10 | 2015-03-25 | 北京众享比特科技有限公司 | 适用于分布式存储的认证系统 |
| US20180183586A1 (en) * | 2016-12-28 | 2018-06-28 | Intel Corporation | Assigning user identity awareness to a cryptographic key |
| WO2020042462A1 (zh) * | 2018-08-31 | 2020-03-05 | 深圳壹账通智能科技有限公司 | 基于生理特征信息的身份验证方法、装置、系统和介质 |
| CN109272317A (zh) * | 2018-09-27 | 2019-01-25 | 北京金山安全软件有限公司 | 一种区块链私钥的获取方法、装置及电子设备 |
| CN112714108A (zh) * | 2020-12-21 | 2021-04-27 | 中国移动通信集团江苏有限公司 | 终端通信号码验证的方法、装置、设备及计算机存储介质 |
Cited By (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US12284294B1 (en) * | 2023-01-04 | 2025-04-22 | Wells Fargo Bank, N.A. | Authentication in metaverse |
| CN116743743A (zh) * | 2023-05-13 | 2023-09-12 | 深圳星火互娱数字科技有限公司 | 一种元宇宙数据分享方法及系统 |
| CN117411615A (zh) * | 2023-12-13 | 2024-01-16 | 广州市信亦达电子科技有限公司 | 一种基于随机数的二维码防伪加密方法及系统 |
| CN117411615B (zh) * | 2023-12-13 | 2024-04-02 | 广州市信亦达电子科技有限公司 | 一种基于随机数的二维码防伪加密方法及系统 |
| CN118282663A (zh) * | 2024-03-27 | 2024-07-02 | 贵州大学 | 一种元宇宙中基于第一印象的抗乔装身份认证方法 |
| CN119854027A (zh) * | 2025-03-18 | 2025-04-18 | 北京工业大学 | 一种基于区块链的车联网身份跨域认证系统 |
Also Published As
| Publication number | Publication date |
|---|---|
| US20250132919A1 (en) | 2025-04-24 |
| TW202312058A (zh) | 2023-03-16 |
| US12463816B2 (en) | 2025-11-04 |
| CN117981272A (zh) | 2024-05-03 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11777726B2 (en) | Methods and systems for recovering data using dynamic passwords | |
| US12244589B2 (en) | Systems and methods for managing digital identities associated with mobile devices | |
| US10042993B2 (en) | Access control through multifactor authentication with multimodal biometrics | |
| US20220052852A1 (en) | Secure biometric authentication using electronic identity | |
| US12463816B2 (en) | Decentralized zero-trust identity verification-authentication system and method | |
| US9665704B2 (en) | Method and system for providing password-free, hardware-rooted, ASIC-based, authentication of human to a stand-alone computing device using biometrics with a protected local template to release trusted credentials to relying parties | |
| JP4736744B2 (ja) | 処理装置、補助情報生成装置、端末装置、認証装置及び生体認証システム | |
| US20030101348A1 (en) | Method and system for determining confidence in a digital transaction | |
| CN107209821A (zh) | 用于对电子文件进行数字签名的方法以及认证方法 | |
| US12101317B2 (en) | Computer-implemented user identity verification method | |
| JP2009543176A (ja) | トレースレス生体認証識別システム及び方法 | |
| US12112328B1 (en) | System for enhanced authentication using non-fungible tokens (NFTs) | |
| JP2008015924A (ja) | ネット決済補助装置 | |
| CN113892099A (zh) | 信息处理装置和信息处理方法 | |
| CA3066831A1 (en) | Systems and methods for securely verifying a subset of personally identifiable information | |
| Moallem | Human-Computer Interaction and cybersecurity handbook | |
| Ghafourian et al. | Combining blockchain and biometrics: A survey on technical aspects and a first legal analysis | |
| Nath et al. | Issues and challenges in two factor authentication algorithms | |
| WO2023239760A1 (en) | Computer-implemented user identity verification method | |
| Brăcăcescu et al. | A proposal of digital identity management using blockchain | |
| TWI906543B (zh) | 去中心化零信任身份核實認證系統與方法 | |
| CN120770137A (zh) | 生物识别集成币 | |
| Habibu | Development of secured algorithm to enhance the privacy and security template of biometric technology | |
| Omondi | Near field communication based-model for authentication in online banking | |
| Han | An integrated and distributed biometric-based user authentication architecture |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22866606 Country of ref document: EP Kind code of ref document: A1 |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 18690038 Country of ref document: US Ref document number: 202280060797.7 Country of ref document: CN |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 22866606 Country of ref document: EP Kind code of ref document: A1 |
|
| WWP | Wipo information: published in national office |
Ref document number: 18690038 Country of ref document: US |
|
| WWG | Wipo information: grant in national office |
Ref document number: 18690038 Country of ref document: US |