US 12,463,816 B2
Decentralized zero-trust identity verification-authentication system and method
Shih-Hsien Hu, New Taipei (TW); and Cheng-Chang Tseng, Taipei (TW)
Assigned to Pei-Hua Hung, New Taipei (TW); and Cheng-Chang Tseng, Taipei (TW)
Appl. No. 18/690,038
Filed by Pei-Hua Hung, New Taipei (TW); and Cheng-Chang Tseng, Taipei (TW)
PCT Filed Sep. 6, 2022, PCT No. PCT/CN2022/117346
§ 371(c)(1), (2) Date Mar. 7, 2024,
PCT Pub. No. WO2023/036143, PCT Pub. Date Mar. 16, 2023.
Claims priority of provisional application 63/241,111, filed on Sep. 7, 2021.
Prior Publication US 2025/0132919 A1, Apr. 24, 2025
Int. Cl. H04L 9/32 (2006.01)
CPC H04L 9/3218 (2013.01) [H04L 9/3231 (2013.01); H04L 9/3278 (2013.01)] 16 Claims
OG exemplary drawing
 
1. An identity verification-authentication method, for verifying and authenticating a user, comprising:
acquiring a unique feature provided by the user, and generating a first digital token which comprises a first variant unique feature according to the unique feature and a first variant data;
generating a first proof request according to the first digital token, wherein the first proof request at least comprises the first variant data and a first answer data, and the first answer data comprises the first variant unique feature;
acquiring a to-be-authenticated unique feature corresponding to a to-be-verified-authenticated user, and generating a first to-be-compared answer data according to the to-be-authenticated unique feature of the to-be-verified-authenticated user and the first variant data in the first proof request;
generating a first determination result according to a comparison of the first to-be-compared answer data and the first answer data in the first proof request; and determining whether the to-be-verified-authenticated user is the user according to the first determination result;
generating a second digital token which comprises a second variant unique feature according to the unique feature and a second variant data;
generating a second proof request according to the second digital token, wherein the second proof request at least comprises the second variant data and a second answer data, and the second answer data comprises the second variant unique feature;
generating a second to-be-compared answer data according to the to-be-authenticated unique feature of the to-be-verified-authenticated user and the second variant data in the second proof request; and
generating a second determination result according to a comparison of the second to-be-compared answer data and the second answer data in the second proof request; and determining whether the to-be-verified-authenticated user is the user according to the first determination result and the second determination result.