Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Secret data matching device, secret data updating method, and recording medium

A technology of secret data and matching device, applied in the direction of secure communication device, digital data protection, digital data authentication, etc., can solve the problem that the server cannot easily update the biological information, the biological information cannot be updated safely or easily, the server does not Issues such as being able to update biometric information securely

Inactive Publication Date: 2016-02-10
FUJITSU LTD
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] However, there is a problem that biometric information cannot be updated securely or easily in the conventional technology for realizing the key binding method
[0009] For example, when performing a method for repeating the process used in the initial registration, since the user goes to a location dedicated to registration of biological information at a fixed cycle or whenever there is an indication that the degree of similarity has decreased and is repeatedly used to obtain biological information process, so the server cannot easily update biometric information
[0010] Vague Promise and Vague Safe involve sending unhidden biometrics to the server during enrollment so that the server cannot securely update biometrics
[0011] Although unconcealed biological information is not transmitted to the server during registration or matching in the key binding method using lattice element addition, the server cannot easily update the biological information because the process of initial registration is repeated
[0012] The above-mentioned problems are not limited to updating biological information, and the same problems also occur when updating digital information such as location information or confidential information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret data matching device, secret data updating method, and recording medium
  • Secret data matching device, secret data updating method, and recording medium
  • Secret data matching device, secret data updating method, and recording medium

Examples

Experimental program
Comparison scheme
Effect test

no. 1 approach

[0028] (Configuration of secret data matching system)

[0029] figure 1 is a diagram for explaining an example of the functional configuration of the secret data matching system according to the first embodiment. Such as figure 1 As shown, the secret data matching system 9 includes a client terminal 1 , a client terminal 2 and a secret data matching device 3 . A database 330 is included in the secret data matching device 3 . The secret data matching device 3 is connected with the client terminal 1 and the client terminal 2 through a network.

[0030] The secret data matching system 9 hides the customer's biological data and the customer's feature key data based on a specific random number (lattice element) called lattice masking, and registers the first secret data obtained by hiding in the database 330 in. When a client requests to match biological data, the secret data matching system 9 hides the biological data to be matched based on different lattice elements to obtai...

Embodiment approach 2

[0111] The previous discussion analyzed the case where the secret data 332 stored in one set of data per user is updated as secret data in which matching data is hidden during matching in the secret data matching device 3 according to the first embodiment. However, the secret data matching device 3 is not limited in this way, and a plurality of sets of secret data 332 may be stored for each user, and more secret data in which matching data is hidden during matching may be added.

[0112] A case will be discussed in which the secret data matching apparatus 3 in the second embodiment adds more secret data in which matching data is hidden during matching to store a plurality of sets of secret data 332 for each user.

[0113] (Configuration of secret data authentication system)

[0114] Figure 5 is a diagram for explaining an example of the functional configuration of the secret data matching system according to the second embodiment. are shown with the same reference numerals as...

no. 2 approach

[0129] (Advantages of the second embodiment)

[0130] According to the second embodiment, the secret data matching device 3 registers in the database 330 the first secret vector obtained based on the first random number and the first linear combination using the row vectors of the approximation determination matrix 331 to hide the biological data and the key . The secret data matching device 3 obtains the second secret vector obtained by hiding the matching data based on the second random number and the second linear combination using the respective row vectors of the approximation determination matrix 331 . Then, the secret data matching device 3 calculates a remainder vector as a remainder obtained by applying the approximate determination matrix 331 as a modulus to the difference between the first secret vector and the second secret vector. The secret data matching means 3 determines whether the biological data approximates the matching data based on the calculated remaini...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a secret data matching device, a secret data updating method, and a recording medium. The secret data matching device includes a memory unit for storing a first secret vector obtained by concealing a first data set and a key data using a determination matrix; an obtaining unit for obtaining a second secret vector by concealing a second data set using the determination matrix; a calculating unit for calculating a residue vector which is a residue when the determination matrix is a modulus, from a difference between the first and second secret vectors; a determination unit for determining whether the first and second data sets are approximate based on the residue vector; an extracting unit for extracting the key data from the residue vector when the first data set and the second data set are approximate; a creating unit for generating a third secret vector by combining the key data and the second secret vector; and a storing unit for storing the third secret vector.

Description

technical field [0001] Embodiments discussed herein relate to a secret data matching device, a computer-readable recording medium storing a program for updating secret data, and a secret data updating method. Background technique [0002] Biometric authentication is a technology capable of individual authentication using information on a person's physical characteristics and behavioral characteristics. Human physical features include, for example, fingerprints, veins, irises, and faces. Behavioral traits include, for example, handwriting and gait. Biological information called a template is obtained in advance, and authentication is performed by comparing the obtained biological information with information obtained by the sensor during matching. [0003] Recently, a biometric authentication technique has been known in which a template subjected to some type of conversion is stored in a database and used for comparison without restoring the original template obtained durin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32H04L9/32
CPCH04L63/0861G06F21/32G06F21/60G06F21/6218H04L9/0891H04L9/3231H04L9/3268
Inventor 條由花安田雅哉
Owner FUJITSU LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products