A biological key smart cryptographic key with security threat monitoring capability

A technology of intelligent password key and biological key, which is applied in the application field of biometrics, can solve the problems that biometric identification and encryption products cannot be quickly applied, and template attack behavior cannot be detected in real time, so as to achieve the effect of solving template attacks

Inactive Publication Date: 2019-05-17
TIANJIN POLYTECHNIC UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 2) The protection is too passive, and the active defense of biometric template security threat monitoring must have a breakthrough:
At present, experts and scholars focus on the revocation of the biometric template to realize the resetting and updating of the key, and have achieved a lot of research results. There are relatively few researches on management and application of key technologies, such as the application of PKI biological certificates based on biological keys
In particular, there are few reports on the research and application of biometric template security threat monitoring. The current template protection algorithm cannot detect possible template attack behaviors in real time. a very important objective factor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A biological key smart cryptographic key with security threat monitoring capability
  • A biological key smart cryptographic key with security threat monitoring capability
  • A biological key smart cryptographic key with security threat monitoring capability

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, so that the advantages and features of the present invention can be more easily understood by those skilled in the art, so that the protection scope of the patent for the present invention can be defined more clearly.

[0025] The main idea of ​​the present invention is to replace the user signature public-private key pair involved in the USBKey smart cryptographic key with a biological public-private key pair generated in real time based on living fingerprints, and realize biological template security threat monitoring through certificate and honeypot technology.

[0026] The specific implementation steps are as follows:

[0027] 1. The inventive method relates to the biological key intelligent password key and is made up of two parts, i.e. the USBKey intelligent password key system and the biological key security system (see figure 1 ). ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a biological key intelligent password key with security threat monitoring capability, and relates to a USBKey intelligent password key system abiding by the standard and a biological key security system responsible for generating a key. The biological key intelligent password key is characterized by comprising the following steps: distinguishing a stand-alone version and a network version, disclosing a biological template and secretly storing template parameters, restoring public and private keys of the intelligent password key in real time, monitoring threat of the template and extracting the template parameters. By means of the above-mentioned manner, the biological key intelligent password key disclosed by the invention can monitor security threat of the biological template based on a honey pot and a certificate in real time, the template attack problem when the biological template is disclosed is effectively solved, the intelligent password key based on the biological key is compatible with the current digital certificate application, fingerprint biometric recognition is combined with the modern cryptography, and the security targets of identity recognizability, signature undeniability, data non tampering and the like during biometric application can be achieved.

Description

Technical field [0001] The method of the invention belongs to the application field of biometrics, is a combination of biometrics encryption technology and public key infrastructure PKI certificate system, and is suitable for network security applications such as electronic signatures and identity authentication based on biometrics. Background technique [0002] With the rapid development of Internet technology, especially in the context of the application of big data processing in the current cloud computing environment, while people are enjoying the convenience of information networks, network security issues have become increasingly prominent. The rapid development of biometric encryption technology in the past ten years, as a new direction and new application of the integration of biometric identification and cryptography, provides an opportunity for solving key management problems in the Internet environment. At the same time, because of its inherent freedom from carryi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32H04L29/06
CPCH04L9/0861H04L9/0866H04L9/3231H04L9/3247H04L9/3263H04L63/06H04L63/0861
Inventor 崔军陈泓宇张璐王金海李忠献
Owner TIANJIN POLYTECHNIC UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products