Without-trust third party public key authentication method based on speaker voice print

An authentication method and public key technology, applied in the field of network security, can solve the problem of difficult implementation of public key cryptosystem

Inactive Publication Date: 2011-01-05
HANGZHOU DIANZI UNIV
View PDF2 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At this time, the existing public key cryptosystem is difficult to implement

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Without-trust third party public key authentication method based on speaker voice print
  • Without-trust third party public key authentication method based on speaker voice print
  • Without-trust third party public key authentication method based on speaker voice print

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The present invention will be further described below in conjunction with accompanying drawing.

[0018] An important problem that needs to be solved when transferring public keys in a network environment is how to make the recipient of the public key confirm the correspondence between the public key and the private key user who owns the public key. In the present invention, the confirmation of this corresponding relationship is by binding the public key with the unique biometric characteristics contained in the speaker's voice, thereby confirming that the public key is sent by the speaker, that is, confirming that the public key and the owner For the correspondence between the private key users of this public key, see figure 1 . The non-trusted third-party public key authentication method based on the speaker's voiceprint in the present invention follows the steps below:

[0019] In the first step, the communication parties determine the voice channel and require dig...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a without-trust third party public key authentication method based on a speaker voice print, comprising the following steps that 1. the two parties determine a voice channel; 2. the two parties enable the voice channel and respectively establish a GMM (Gaussian mixture model) of the speaker voice print of the opposite side; 3. the two parties respectively generate a public and private key pair; the two parties are symmetrical below; 4. a public key sender states a public key for a receiver through the voice; 5. a public key receiver carries out voice print identification on a voice stream for stating the public key by using the speaker GMM to judge whether to be the sender or not, if yes, carrying out a step 6, and if not, denying; 6. the public receiver extracts the public key of the call voice, and the encrypted public key for a random number is generated and sent to a public key sending end; and 7. after the public key sender receives the random number, the random number is encrypted by the public key and sent to the receiver; after the receiver receives the random number, the random number is decrypted and verified by the public key in the step 6, if pass, the public key authentication is successful, and if fail, the public key authentication fails. The invention does not need the third party to participate and is convenient and flexible to use; and the two communication parties directly transfer and authenticate the public key through a voice call, thereby effectively preventing the attack of other people.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to an untrusted third-party public key authentication method based on the speaker's voiceprint, which can provide convenient and safe authentication for both parties in an instant network call without prior agreement on a key. Open an encrypted session to provide technical support. Background technique [0002] Public key cryptography is widely used in various fields of network encrypted communication. There are three modes in the existing public key cryptosystem: certificate-based, identity-based and self-authentication, and all three modes require the existence of a trusted third party. The certificate-based model is based on the public key infrastructure PKI. The public key certificate needs a trusted certificate authority (CA) to issue it, and the user verifies the reliability of the certificate to the CA. The identity-based mode directly uses the user's i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/30G10L17/00
Inventor 吴震东
Owner HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products