Safe online fingerprint matching method

A matching method and fingerprint technology, applied in the fields of information security and privacy protection, can solve the problems of high computational complexity, high implementation cost, and few homomorphic encryption algorithms.

Pending Publication Date: 2021-02-05
ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE
View PDF10 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method better solves the contradiction between the accuracy of the cryptographic system and the fuzziness of biological characteristics, but the Fuzzy Vault method has serious security flaws: (1) The data of the original feature point template can be obtained by cross-comparing multiple fuzzy vaults ; (2) Once the key is stolen, the attacker can replace part of the random hash value with...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe online fingerprint matching method
  • Safe online fingerprint matching method
  • Safe online fingerprint matching method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] This application proposes a new secure privacy protection scheme—Security e-finger scheme, which introduces the idea of ​​LWE problem to protect the privacy of the user's temporary fingerprint feature information. The Security e-finger solution proposed by this application can solve the privacy protection security problem of fingerprint data in the online fingerprint authentication system, and at the same time take into account the system's requirements for efficiency, and provide a new privacy protection technical solution for the biometric authentication system , providing a theoretical basis and technical support for the popularization of the secure fingerprint authentication system.

[0060] combine figure 1 Introduce the specific implementation process of this application:

[0061] Security certification center initialization phase

[0062] The specific operation is: the security certification center initializes and selects a security parameter Run the function...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a safe online fingerprint matching method, which comprises the following steps that: in a safety authentication center initialization stage, a safety authentication center generates system parameters, a user and a service provider register in the safety authentication center to generate respective public and private key pairs, and user fingerprint characteristics are acquired and template data are submitted; in the user template data authorization stage, after the user registers at the service provider, the service provider applies to the security authentication centerto obtain template data of the user; in the user service request stage, a user side collects feature information of a user, and temporary verification fingerprint ciphertext information is generatedby using a homomorphic BGN cryptographic algorithm; and a ciphertext matching stage: after receiving the verification request of the user, the service provider matches the verification request with the template data of the user in the database, if the matching result is true, the service provider accepts the service request of the user, otherwise, the service provider refuses the service request of the user. Efficient and safe online fingerprint authentication is achieved, and the contradiction between the uncredibility of service providers and the privacy of user fingerprint features is solved.

Description

technical field [0001] The invention belongs to the field of information security and privacy protection, and specifically relates to a safe online fingerprint matching method, which uses a homomorphic BGN encryption algorithm to protect the privacy of user fingerprint features and performs feature matching in a ciphertext state. Background technique [0002] Biometric-based identification was first proposed in 1994. However, the security of the biometric identification system has only begun to receive widespread attention in recent years. The different encryption types of biometric data can be divided into: feature template encryption; searchable encryption; homomorphic encryption; matrix encryption. In 2006, Jules et al. proposed a Fuzzy Vault method, which maps the biometric data to the polynomial of the key construction to obtain the real point, then adds a large number of random hash values, and inputs the biometric data during verification. When a sufficient number of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K9/00G06K9/62G06F21/60G06F21/62
CPCG06F21/602G06F21/6245G06V40/1347G06V10/751
Inventor 周潭平刘文超刘尧吴旭光车小亮张敏情韩益亮杨晓元
Owner ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products