Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method based on biological feature encryption and homomorphic algorithm

A biometric, identity authentication technology, applied in user identity/authority verification, electrical components, transmission systems, etc., can solve the problems of different users, legitimate users illegally accessing system resources, etc., to facilitate login and prevent illegal use of resources. , the effect of high security strength

Inactive Publication Date: 2014-08-06
南京邦普信息科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] (3) Access authority: Many identity authentication systems do not grant different permissions to different users, which easily leads to the problem of illegal access to system resources by legitimate users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method based on biological feature encryption and homomorphic algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The identity authentication scheme based on biometric encryption and homomorphic algorithm designed by the present invention, its use process comprises the following 5 phase steps:

[0038](1) Registration stage. The user first logs in to the registration page of the server of the cloud computing environment provider, applies for an account, enters some necessary personal information PI, signs with his own private key Pr and sends it to the provider server, and the provider server uses the user's public key Pu Verify the sent signature. If it is determined that the information sent by the user is true and valid, it will feed back to the user for biometric (voice or fingerprint, etc.) collection. After collecting the user's biometric BC, extract a password from the user's registration Key, the XOR result of the provider's server encryption key and the biometric feature is stored in the cloud computing server as an encrypted biometric template.

[0039] Step 1: User --> ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An identity authentication method based on biometric encryption and homomorphic algorithm, which uses the user's biometrics as a password to log in to the system through a mobile device, which is faster than the usual password method, and the use of encrypted biometric templates is more secure, while information is transmitted The process is transmitted in the form of ciphertext, which ensures the privacy of the user; factors such as time stamps are added to enable three-party authentication between the user and the provider server and cloud computing server, which enhances the credibility of the three parties; The user performs the authorization operation based on the predicate encryption of the attribute and updates the permission information in real time, which can prevent legitimate users from illegally using resources in the cloud computing environment and better manage resources. The homomorphic algorithm can be used to operate without decryption, just as the effect of decryption first and then operation is the same, which saves time and space overhead, greatly improves the efficiency of the system, and has high security and efficiency.

Description

technical field [0001] The invention is an identity authentication scheme suitable for cloud computing environment, which mainly applies biometric encryption technology and homomorphic algorithm to the identity authentication system, and belongs to the technical field of computer network and information security. Background technique [0002] With the rapid development of the information network, the cloud computing environment is more and more favored by people due to its advantages of convenience and speed. How to protect system resources in an open cloud computing environment is particularly important. Designing a secure identity authentication system to prevent Illegal users' access to system resources and malicious attacks and intrusions by opponents have become a very important and urgent problem in the field of network security. [0003] Identity authentication refers to the process that the system confirms whether the user's identity is true, legal and unique when th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 孙国梓王志伟徐雯丽陈丹伟杨一涛
Owner 南京邦普信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products