Biometric and Geographic Information-based Identity Authentication Method
DOI:
https://doi.org/10.54097/dpyfnz62Keywords:
Mobile Payment, Identity Authentication, Biometric Features, Geographical LocationAbstract
With the ongoing advancements in computer technology and mobile internet, mobile payment has become an integral component of daily life. Identity authentication technology serves as a critical measure to ensure the security of mobile payments. This paper addresses the issue of low security associated with single-factor identity authentication while highlighting the substantial overhead involved in multi-factor authentication methods. We propose a novel identity authentication method that integrates biometric data and geographic information. In this framework, the identity authentication server first performs system initialization, configures system parameters, and stores them securely. Subsequently, the identity authentication client submits an authentication request to the server and completes its registration process. Finally, the server processes this request from the client, conducts user identity verification, and returns an authentication result. This approach effectively mitigates risks posed by attackers attempting to falsify biometric data or geographic information during the identity verification process and offers robust services for biometric- and geography-based identity authentication.
References
[1] Lyastani S G , Schilling M , Neumayr M ,et al.Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication[C]//2020 IEEE Symposium on Security and Privacy (SP).IEEE, 2020.
DOI:10.1109/SP40000.2020.00047.
[2] Camenisch J , Lehmann A , Neven G .Optimal Distributed Password Verification[C]//Acm Sigsac Conference on Computer & Communications Security.ACM, 2015:182-194.
DOI:10.1145/2810103.2813722.
[3] Weinshall D .Cognitive authentication schemes safe against spyware[J].IEEE, 2006.
DOI:10.1109/SP.2006.10.
[4] He, Hui Y .Research on the Network Security and Identity Authentication Technology[J].Advanced Materials Research, 2014, 926-930:2819-2822.
DOI:10.4028/www.scientific.net/AMR.926-930.2819.
[5] Palma D , Montessoro P L .Biometric-Based Human Recognition Systems: An Overview[J].Recent Advances in Biometrics [Working Title], 2022.
DOI:10.5772/intechopen.101686.
[6] He D , Gao Y , Chan S ,et al.An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks[J].Ad Hoc & Sensor Wireless Networks, 2010, 10(4):361-371.
DOI:10.1016/j.adhoc.2009.05.002.
[7] Bontrager P , Togelius J , Memon N .DeepMasterPrint: Generating Fingerprints for Presentation Attacks[J]. 2017.
DOI:10.48550/arXiv.1705.07386.
[8] Erdogmus N , Marcel S .Spoofing Face Recognition With 3D Masks[J].IEEE Transactions on Information Forensics and Security, 2014, 9(7):1084-1097.
DOI:10.1109/TIFS.2014.2322255.
[9] Ferrero R , Gandino F , Montrucchio B ,et al.On gait recognition with smartphone accelerometer[J].IEEE, 2015.
DOI:10.1109/MECO.2015.7181946.
[10] Yang D , Yang B .A biometric password-based multi-server authentication scheme with smart card[J].IEEE[2024-10-17].
DOI:10.1109/ICCDA.2010.5541128.
[11] Pang Xiaojian, Yang Li, Liu Maozhen, et al. Mineauth: mining behavioural habits for continuous authentication on a smartphone[C]//The 24th Australasian Conference on Information Security and Privacy. Christchurch: Springer Press, 2019: 533-551.
Downloads
Published
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.