Secret key generation method based on multi-modal biological characteristics

A biometric feature and key generation technology, which is applied in the fields of information security and biometrics, can solve problems such as insufficient key length, unsatisfactory recognition rate and rejection rate, and poor cross-terminal support for user data decryption.

Inactive Publication Date: 2014-11-26
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the problem with single-mode is that due to the lack of stable information describing the user, the length of the generated key is not enough, and the recognition rate and rejection rate are not ideal.
In the mobile cloud scenario, the biological collection devices of different smart terminals are inconsistent, resulting in poor cross-terminal support for user data decryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key generation method based on multi-modal biological characteristics
  • Secret key generation method based on multi-modal biological characteristics
  • Secret key generation method based on multi-modal biological characteristics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific implementation, but the scope of the present invention will not be limited in any way.

[0036] This implementation example uses figure 1 The overall framework diagram of the multimodal biometric key generation shown. It mainly includes three modules: biometric vector extraction, codeword extraction, and key binding / unbinding.

[0037] figure 2 Shown is the codeword extraction module. When registering or verifying, each biometric feature will generate or restore the corresponding codeword.

[0038] image 3 Shown is the key binding or unbinding module. When registering or verifying, you can bind or unbind a pre-generated random key.

[0039] In this implementation example, it is assumed that there are four types of biological data during registration, that is, N=4. The preset threshold value t=3, that is, only three kinds of biometric data can...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secret key generation method based on multi-modal biological characteristics, comprising (1) collecting characteristic images of N species of biology, extracting and quantifying the biological characteristic data as characteristic vector, (2) processing the characteristic vector and extracting the binary string to present the characteristic of the creature, (3) generating a random secret key, binding and outputting a public template P by utilizing a Shamir secret sharing method with the binary string collection, (4) sampling M creature characteristics and obtaining a binary string collection, wherein n>-M>=t>=2, and the t is a threshold value of the Shamir method, 5) inputting the binary string collection and the template P into the Shamir secret sharing method to recovery a secret key K', (6)and comparing the K and K'. The invention can improve the recognition rate and reduce the false rejection rate, can produce secret key with higher entropy, and can finish the user authentification while recovering the secret key by binding the user identity and the secret key.

Description

technical field [0001] The invention belongs to the fields of information security and biometric identification, and in particular relates to a method for generating a key based on multimodal biometric features. Background technique [0002] With the widespread use of cloud computing and smart terminals, mobile cloud is deeply affecting all aspects of people's lives. Nowadays, users are accustomed to storing a large amount of personal data in the cloud and obtaining the data through various devices when needed. However, due to the security and privacy protection issues in the cloud, users usually choose to encrypt personal privacy data before uploading to the cloud, and decrypt the data at the terminal before reading the data. This process requires a proper key management method. However, traditional key management methods have certain limitations, such as easy to forget passwords and insufficient security strength, easy to lose tokens and inconvenient to carry, etc. The ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08H04L29/06H04L29/08
Inventor 陈驰王朝刚杨腾飞林东岱
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products