METHOD FOR AUTHORIZED-USER VERIFICATION AND RELATED APPARATUS
First Claim
1. A method for authorized-user verification, which allows a host-end system to determine whether a holder of a user-end apparatus is an authorized user, the method comprising:
- the host-end system sending a secret code to the user-end apparatus;
the user-end apparatus scanning at least one biometric characteristic of the holder;
the user-end apparatus generating encrypted data according to the secret code and the biometric characteristic;
the user-end apparatus sending the encrypted data to the host-end system;
the host-end system decrypting the encrypted data to generate a decrypted secret code and a decrypted biometric characteristic;
the host-end system checking whether the decrypted secret code matches the secret code; and
the host-end system further checking whether the decrypted biometric characteristic matches a pre-stored biometric characteristic of the authorized user to determine whether the holder is the authorized user if the decrypted secret code matches the secret code.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention discloses a method for authorized-user verification, which allows a host-end system to determine whether a holder of a user-end apparatus is an authorized user. The method includes: the host-end system sending a secret code to the user-end apparatus; the user-end apparatus scanning at least one biometric characteristic of the holder, generating encrypted data according to the secret code and the biometric characteristic, and sending the encrypted data to the host-end system; the host-end system decrypting the encrypted data to generate a decrypted secret code and a decrypted biometric characteristic, checking whether the decrypted secret code matches the secret code, and further checking whether the decrypted biometric characteristic matches a pre-stored biometric characteristic of the authorized user when the decrypted secret code matches the secret code.
13 Citations
25 Claims
-
1. A method for authorized-user verification, which allows a host-end system to determine whether a holder of a user-end apparatus is an authorized user, the method comprising:
-
the host-end system sending a secret code to the user-end apparatus; the user-end apparatus scanning at least one biometric characteristic of the holder; the user-end apparatus generating encrypted data according to the secret code and the biometric characteristic; the user-end apparatus sending the encrypted data to the host-end system; the host-end system decrypting the encrypted data to generate a decrypted secret code and a decrypted biometric characteristic; the host-end system checking whether the decrypted secret code matches the secret code; and the host-end system further checking whether the decrypted biometric characteristic matches a pre-stored biometric characteristic of the authorized user to determine whether the holder is the authorized user if the decrypted secret code matches the secret code. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for authorized-user verification, which allows a host-end system to determine whether a holder of a user-end apparatus is an authorized user, the method comprising:
-
the host-end system sending a secret code to the user-end apparatus; the user-end apparatus scanning a biometric characteristic of the holder; the user-end apparatus checking whether the biometric characteristic matches a pre-stored biometric characteristic, the pre-stored biometric characteristic being stored in the user-end apparatus; the user-end apparatus generating encrypted data according to the secret code and a key value stored in the user-end apparatus if the biometric characteristic matches the pre-stored biometric characteristic; the user-end apparatus sending the encrypted data to the host-end system; the host-end system decrypting the encrypted data to generate a decrypted secret code and a decrypted key value; the host-end system checking whether the decrypted secret code matches the secret code; and the host-end system further checking whether the decrypted key value matches a pre-stored key value of the authorized user to determine whether the holder is the authorized user if the decrypted secret code matches the secret code. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. An authorized-user verification apparatus, which allows a host-end system to determine whether a holder of a user-end apparatus is an authorized user, the authorized-user verification apparatus comprising:
-
a transceiver, for receiving a secret code from the host-end system and sending encrypted data to the host-end system; a biometric characteristic sensor, for scanning at least one biometric characteristic of the holder; and an encryption module, coupled to the transceiver and the biometric characteristic sensor, for generating the encrypted data according to the secret code and the biometric characteristic; wherein the host-end system determines whether the holder is the authorized user according to the encrypted data. - View Dependent Claims (16, 17, 18)
-
-
19. An authorized-user verification apparatus, which allows a host-end system to determine whether a holder of a user-end apparatus is an authorized user, the authorized-user verification apparatus comprising:
-
a transceiver, for receiving a secret code from the host-end system and send encrypted data to the host-end system; a biometric characteristic sensor, for scanning a biometric characteristic of the holder; a security apparatus, for storing a pre-stored biometric characteristic and a key value of the authorized user; an identification module, coupled to the biometric characteristic sensor and the security apparatus, for determining whether the biometric characteristic matches the pre-stored biometric characteristic; and an encryption module, coupled to the identification module, the security apparatus, and the transceiver, for generating the encrypted data according to the secret code and the key value when the biometric characteristic matches the pre-stored biometric characteristic; wherein the host-end system determines whether the holder is the authorized user according to the encrypted data. - View Dependent Claims (20, 21, 22)
-
-
23. A method for authorized-user verification, which allows a host-end system to determine whether a holder of a user-end apparatus is an authorized user, the method implemented in the user-end apparatus, the method comprising:
-
receiving a secret code; scanning at least one biometric characteristic of the holder; generating encrypted data according to the secret code and the biometric characteristic; and sending out the encrypted data. - View Dependent Claims (24, 25)
-
Specification