FIELD: biometric authentication.
SUBSTANCE: system receives a biometric pattern from user equipment, which is encrypted using a public key related to the system. Then, the encrypted biometric pattern is provided to the second subject together with a biometric identifier, after receiving a request for transaction, which includes the biometric identifier and the second biometric pattern. The second subject can encrypt the second biometric pattern, using the same public key related to the system, and compare two encrypted biometric patterns. The resulting data file with coincidence results has already been encrypted and can be provided to the system to determine the degree of coincidence of two biometric patterns.
EFFECT: providing biometric authentication without disclosing closed information to an authorization subject.
20 cl, 6 dwg
Title | Year | Author | Number |
---|---|---|---|
MULTIPLE-DEVICE TRANSACTION VERIFICATION | 2016 |
|
RU2711464C2 |
TELECOMMUNICATION CHIP-CARD | 2013 |
|
RU2628492C2 |
SINGLE NETWORK LOGIN DISTRIBUTED SERVICE | 2006 |
|
RU2417422C2 |
IMAGE BASED KEY DERIVATION FUNCTION | 2014 |
|
RU2676231C2 |
REGISTRATION AND AUTHENTICATION OF USERS WITHOUT PASSWORDS | 2017 |
|
RU2713604C1 |
RELIABLE AUTHENTICATION METHOD AND DEVICE | 2006 |
|
RU2434352C2 |
PROTECTION OF USAGE OF KEY STORE CONTENT | 2017 |
|
RU2740298C2 |
METHODS FOR SAFE GENERATION OF CRYPTOGRAMS | 2015 |
|
RU2710897C2 |
INFRASTRUCTURE FOR VERIFYING BIOMETRIC ACCOUNT DATA | 2007 |
|
RU2434340C2 |
VIRTUAL SIM-CARD FOR MOBILE TELEPHONES | 2008 |
|
RU2472310C2 |
Authors
Dates
2022-07-15—Published
2018-07-25—Filed