Remote biological feature identity authentication method for strengthening privacy protection

A biometric and privacy protection technology, applied in the field of information security, can solve the problems of low security of generated templates, security depends on security, and increase application costs, and achieve the effect of resisting common attacks and comprehensive protection.

Active Publication Date: 2017-09-22
WUHAN UNIV
View PDF5 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (1) The template generated by the random mapping algorithm has low security and cannot resist common attacks such as similarity attacks, similarity attacks, and replay attacks.
Since the traditional RP algorithm mostly uses the transformed data directly as a saving template, there is a hidden danger of completely restoring the original biometric information by using inverse transformation or cross-matching attacks; at the same time, when the transformed characteristics are stolen, such methods cannot resist replay attacks
[0005] (2) There is no safe and effective management mechanism for the transformation key (RP matrix or pseudo-random sequence that generates the mapping matrix)
If it is saved by the user, two-factor authentication is realized, which has high security, but its security depends on the security of the random number token, and multi-factor authentication brings inconvenience to the application; if it is saved by the user terminal, the user and the user If the terminal is bound, the application will be limited; if it is stored on the application side, the key will be easily stolen illegally and there will be a security risk that the user's biometric information will be leaked
[0006] (3) In commercial applications, most of the identity authentication involved is in a remote application system in an incompletely trusted environment. The existing algorithms have security risks for the processing of fingerprint images and the storage of templates and keys.
If a trusted third party is introduced for management, it will increase the application cost, and at the same time, there is a problem that the third party cannot guarantee its own credibility

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Remote biological feature identity authentication method for strengthening privacy protection
  • Remote biological feature identity authentication method for strengthening privacy protection
  • Remote biological feature identity authentication method for strengthening privacy protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] The concept and specific technical solutions of the present invention will be further described below in conjunction with the accompanying drawings, so as to fully demonstrate the purpose, principle and effect of the present invention. It should be understood that these embodiments are only used to illustrate the present invention and are not intended to limit the scope of the present invention. After reading the present invention, those skilled in the art all fall into the appended claims of the present application to the amendments of various equivalent forms of the present invention limited range.

[0067] The invention provides a remote biometric identity authentication method with enhanced privacy protection. While improving the random mapping biometric template protection algorithm, a re-encryption mechanism is introduced into the management of the key (random mapping matrix), which can be applied to biometric identity In the authentication system, the user's priv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a remote biological feature identity authentication method for strengthening privacy protection. The method comprises a preprocessing stage, a registration stage and an authentication stage, wherein the preprocessing stage comprises the following steps: inputting a safety parameter, generating a user terminal private key and an application-side public-private key pair, obtaining a transform key for each user terminal to prestore at an application-end; the registration stage comprises the following steps: transmitting the public key to the user terminal through the application-side, generating a saving template for the input biological feature in a TrustZone trust computing zone of the user terminal by using the improved random mapping algorithm, and performing encryption protection on the random mapping matrix; the authentication stage comprises the following steps: generating the transform feature for the input biological feature by using the improved random mapping algorithm, and performing the feature matching by the application-side to realize the identity authentication. By using the technical scheme provided by the invention, the privacy protection of the user fingerprint can be strengthened, and the technical scheme has high attack resistance and the universality of the application.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to a remote biometric identity authentication method that strengthens privacy protection. Background technique [0002] With the rapid development of artificial intelligence, identity authentication technology based on biometrics has gradually provided convenient and safe identity authentication for the intelligent era, and has achieved automatic and accurate authentication in national security, finance, justice, e-commerce, e-government and other application fields. of identity. However, with the growth of commercial applications, biometric identity authentication faces security risks that cannot be ignored. Due to the permanence and uniqueness of biometrics, it is necessary to store digitized features as templates in applications. Once attacked or stolen, the cause serious consequences. The stolen or tampered biometrics may be used by criminals to pretend to be le...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08H04L9/00H04L29/06
CPCH04L9/002H04L9/0869H04L9/3231H04L63/0442H04L63/0478H04L63/0861
Inventor 徐正全贾姗
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products