Biometric Authentication Method and System Based on Elliptic Curve and Cancellable Biometrics
A biometric feature and biometric authentication technology, applied in the field of biometric authentication privacy protection, can solve the problems of being unable to resist denial of service attacks, unable to resist user anonymity, impersonation attacks and replay attacks, and unable to provide forward secrecy, so as to improve privacy protection Security, reduced computational complexity, and small key effects
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0056] Embodiment 1 of the present invention provides a biometric authentication method for privacy protection based on an elliptic curve and a revocable biometric certificate.
[0057] In order to enable users to securely access online services and establish secure communication between participants, the security requirements for identity verification are getting higher and higher. The portability and reliability of biometric authentication are superior to traditional technologies, and are widely used in In various online services, but facing great security risks, by adopting revocable biometrics to generate revocable pseudo-biometrics, and combining with vague promises to protect the generated pseudo-biometric templates, users and Between servers, an elliptic curve is used to establish a secure session key agreement to further improve the privacy protection of biometric authentication.
[0058] Specifically, it includes the system initialization phase, the registration phase...
Embodiment 2
[0079] In one or more embodiments, the present invention provides a system for privacy-preserving biometric authentication based on elliptic curves and revocable biometrics. Flow chart such as Figure 7 As shown, the system includes a client, a server, a database and a smart card, and secure communication is established between the client and the server to achieve the following functions.
[0080] (1) Registration stage
[0081] The client sends the user's identity to the server, and stores the converted pseudo-biometric template in the database. The server performs an anonymous operation on the user's identity, and uses the fuzzy commitment scheme to process the pseudo-biometric template to generate auxiliary data, which is stored in the database. middle.
[0082] (2) Verification stage
[0083] The client user carries the smart card to enter the identity, password and biometric information, uses the same conversion parameters to generate a pseudo biometric template, sends...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


