Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method based on biological feature encryption and homomorphic algorithm

A biometric and identity authentication technology, applied in user identity/authority verification, electrical components, transmission systems, etc., can solve the problems of different users and illegal access to system resources by legitimate users, so as to facilitate login and prevent illegal use of resources , the effect of high security strength

Inactive Publication Date: 2012-09-12
南京邦普信息科技有限公司
View PDF4 Cites 53 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] (3) Access authority: Many identity authentication systems do not grant different permissions to different users, which easily leads to the problem of illegal access to system resources by legitimate users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method based on biological feature encryption and homomorphic algorithm
  • Identity authentication method based on biological feature encryption and homomorphic algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The use process of the identity authentication scheme based on biometric encryption and homomorphic algorithm designed by the present invention includes the following five stages:

[0038] (1) Registration stage. The user first logs in to the registration page of the provider server of the cloud computing environment, applies for registration of an account, enters some necessary personal information PI, signs it with its own private key Pr and sends it to the provider server. The provider server uses the user’s public key Pu Verify the sent signature. If it is determined that the information sent by the user is true and valid, then feedback to the user for biometric (voice or fingerprint, etc.) collection I. After collecting the user’s biometric BC, extract a secret from the user’s registration information Key, after the result of the exclusive OR between the encryption key of the provider server and the biological feature, it is stored in the cloud computing server as an ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity authentication method based on biological feature encryption and a homomorphic algorithm. The method is quicker than a normal password method by using biological features of users as passwords to log in a system through a mobile device, using an encrypted biological template is safer, and privacy of the users can be guaranteed as information is transmitted in a ciphertext form. By adding factors such as timestamps, tri-party authentication among the users, a provider server and a cloud computing server is realized, and reliability among the three parties is enhanced. Legal users can be prevented from using resources in the cloud computing environment illegally to better manage the resources by means of user authentication operation according to attribution predicate encryption and real-time updating of permission information. Operation without encryption can be realized by the aid of the homomorphic algorithm, same effects as decrypting before operation can be achieved, time and space expenses can be saved, system efficiency is greatly improved, and the identity authentication method has high safety and efficiency.

Description

technical field [0001] The invention is an identity authentication scheme suitable for cloud computing environment, which mainly applies biometric encryption technology and homomorphic algorithm to the identity authentication system, and belongs to the technical field of computer network and information security. Background technique [0002] With the rapid development of the information network, the cloud computing environment is more and more favored by people due to its advantages of convenience and speed. How to protect system resources in an open cloud computing environment is particularly important. Designing a secure identity authentication system to prevent Illegal users' access to system resources and malicious attacks and intrusions by opponents have become a very important and urgent problem in the field of network security. [0003] Identity authentication refers to the process that the system confirms whether the user's identity is true, legal and unique when th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 孙国梓王志伟徐雯丽陈丹伟杨一涛
Owner 南京邦普信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products