Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Biological characteristic template protection method with safety threat monitoring capability

A biometric and template technology, applied in secure communication devices, user identity/authority verification, digital transmission systems, etc., can solve problems such as real-time detection of attack behaviors that cannot be templated, and rapid application of biometric identification and encryption products.

Inactive Publication Date: 2017-10-24
TIANJIN POLYTECHNIC UNIV
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 2) The protection is too passive, and the active defense of biometric template security threat monitoring must have a breakthrough:
At present, experts and scholars focus on the revocation of the biometric template to realize the resetting and updating of the key, and have achieved a lot of research results. There are relatively few researches on management and application of key technologies, such as the application of PKI biological certificates based on biological keys
In particular, there are few reports on the research and application of biometric template security threat monitoring. The current template protection algorithm cannot detect possible template attack behaviors in real time. a very important objective factor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Biological characteristic template protection method with safety threat monitoring capability
  • Biological characteristic template protection method with safety threat monitoring capability
  • Biological characteristic template protection method with safety threat monitoring capability

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, so that the advantages and features of the present invention can be more easily understood by those skilled in the art, so as to define the protection scope of the present invention more clearly.

[0026] The main idea of ​​this patent is, aiming at the template attack behavior problems that may exist in biometric templates, combined with digital certificates and using the principle of network honeypots to monitor template security threats in real time, to achieve online signature cryptographic operations based on biometric keys, such as figure 1 It includes two stages, namely template registration and certificate issuance stage, template verification and private key signature stage, which are described as follows:

[0027] 1) Template registration and certificate issuance stage (registration stage for short): Extract biometric identificatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a biological characteristic template protection method with the safety threat monitoring capability and relates to terminal password equipment, a certificate management system, a biological certificate signing service, a template honey pot monitoring service and a certificate certification service. The method is characterized by comprising a biological secret key generation and template honey pot forging, a template parameter secret storage and template honey pot publicity, a feature rapid matching and recognition of a biological certificate, a template parameter retrieval and template threat detection, a biological secret key recovery and on-line signature application. Based on the above manner, the safety threat of the biological template can be monitored in real time based on a honey pot and a certificate. Therefore, the template attack problem of the biological template based on the publicity of the digital certificate is effectively solved. As a result, the novel characteristic of the biological characteristic encryption application of the online signature and offline verification is realized. Meanwhile, safety targets, such as identifiable identity of the biological characteristic application, the non-repudiation of the signature, the non-tampering of data and the like, are achieved.

Description

Technical field [0001] The method of the invention belongs to the application field of biological identification, is a combination of biological feature encryption technology and a public key infrastructure PKI certificate system, and is suitable for network security applications such as electronic signatures and identity authentication based on biological features. Background technique [0002] With the rapid development of Internet technology, especially in the context of the application of big data processing in the current cloud computing environment, while people are enjoying the convenience of information networks, network security issues have become increasingly prominent. The rapid development of biometric encryption technology in the past ten years, as a new direction and new application of the integration of biometric identification and cryptography, provides an opportunity to solve the key management problem in the Internet environment. At the same time, because o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3231H04L9/3247H04L63/0823H04L63/0861H04L63/1491
Inventor 崔军张璐陈泓宇王金海李忠献
Owner TIANJIN POLYTECHNIC UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products