Privacy protection-based authentication method, apparatus and device

A privacy protection and authentication method technology, applied to devices and equipment, in the field of privacy protection-based authentication methods, which can solve problems such as information leakage

Active Publication Date: 2021-02-23
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

During the transmission of authentication information, there may be a risk of information leakage. Therefore, a solution that can improve...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection-based authentication method, apparatus and device
  • Privacy protection-based authentication method, apparatus and device
  • Privacy protection-based authentication method, apparatus and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] Such as figure 1 As shown, the embodiment of this specification provides an authentication method based on privacy protection. The execution subject of the method may be an Internet of Things (The Internet of Things, IoT) device, and the Internet of Things device may be any object configured with a biometric system. A networked device, such as an Internet of Things device, can be an automatic vending device equipped with an image acquisition device, or an access control device equipped with a fingerprint acquisition device, etc. The method specifically may include the following steps:

[0028] In S102, the authentication information for authenticating the identity of the target user is acquired.

[0029] Among them, the target user can be any one or more users who use the IoT device to perform specified operations (such as payment operations, start operations, etc.), and the authentication information can include the biometric information of the target user. For exampl...

Embodiment 2

[0049] As shown in Figure 2, the embodiment of this specification provides an authentication method based on privacy protection, the execution subject of the method may be an Internet of Things (The Internet of Things, IOT) device, and the Internet of Things device may be configured with a biometric identification system Any Internet of Things device, such as an Internet of Things device can be a vending device equipped with an image acquisition device, or an access control device equipped with a fingerprint acquisition device. The method specifically may include the following steps:

[0050] In S202, based on the biological feature acquisition device of the Internet of Things device, the target image including the target user's biological feature information is acquired.

[0051] Wherein, the target image may include an image of one or more biological feature information such as the target user's face, iris, and fingerprint.

[0052] In S204, feature extraction is performed ...

Embodiment 3

[0083] Such as image 3 As shown, the embodiment of this specification provides an authentication method based on privacy protection. The method may be a server, and the server may be an independent server or a server cluster composed of multiple servers. The method specifically may include the following steps:

[0084] In S302, the target authentication information of the target user sent by the IoT device is acquired.

[0085] Wherein, the target authentication information may be the information obtained by the Internet of Things device based on the target information processing strategy for the privacy protection processing of the target user's authentication information, and the target information processing strategy may be an information processing strategy corresponding to the risk type of the IoT device. The risk type of the Internet-connected device can be a risk type based on a pre-trained risk perception model, which determines that there is a risk of leakage in the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the invention disclose a privacy protection-based authentication method, apparatus and device. The method comprises the steps of obtaining authentication information for performing identity authentication on a target user; based on a pre-trained risk perception model, determining a risk type of a leakage risk existing in the process of processing the authentication information by the Internet of Things device, the risk perception model being a model constructed based on a machine learning algorithm and obtained by training historical risk element information; determining a target information processing strategy corresponding to the risk type based on the risk type, and performing privacy protection processing on the authentication information based on the target informationprocessing strategy to obtain processed authentication information; and sending the processed authentication information to a server, so that the server performs recovery processing on the processed authentication information to obtain authentication information for performing identity authentication on the target user so as to perform identity authentication.

Description

technical field [0001] This specification relates to the field of computer technology, and in particular to an authentication method, device and equipment based on privacy protection. Background technique [0002] With the rapid development of computer technology, IoT devices mainly provide users with corresponding services and functions by communicating with servers. [0003] At present, more and more IoT devices are equipped with biometric identification systems, which can obtain user authentication information (such as user face images, etc.) based on the biometric identification system. After obtaining the user authentication information, IoT devices can use the The acquired authentication information is uploaded to the server, so that the server performs work such as identity authentication on the user based on the authentication information. During the transmission of authentication information, there may be a risk of information leakage. Therefore, a solution that ca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F21/32G06K9/00G06K9/62G06N3/04G06N20/00
CPCH04L63/0861H04L63/0414G06N20/00G06F21/32G06V40/13G06V40/168G06N3/045G06F18/214
Inventor 曹佳炯李亮丁菁汀
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products