Unlock instant, AI-driven research and patent intelligence for your innovation.

Privacy-protecting identity information storage method and device and privacy-protecting identity authentication method and device

A technology for protecting privacy and identity information, which is applied in the field of identity authentication methods and devices for protecting privacy, and can solve problems such as malicious use of face information, user privacy and network security damage.

Pending Publication Date: 2021-06-08
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the face scanning service provider has a data leak, it will inevitably lead to a large amount of face information being used maliciously, causing serious damage to user privacy and network security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy-protecting identity information storage method and device and privacy-protecting identity authentication method and device
  • Privacy-protecting identity information storage method and device and privacy-protecting identity authentication method and device
  • Privacy-protecting identity information storage method and device and privacy-protecting identity authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The specification will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. The described embodiments are only some of the embodiments in this specification, not all of them. Based on the embodiments in this specification, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present application.

[0043] It should be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings. In the case of no conflict, the embodiments in this specification and the features in the embodiments can be combined with each other. In addition, words such as "first" and "second" in this specification are only used to distinguish information and do no...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a privacy-protecting identity information storage method and device and a privacy-protecting identity authentication method and device. The privacy-protecting identity information storage method comprises the following steps: an identity authentication server generates a distributed identity label of a user after real-name authentication of the user is passed, and sends the distributed identity label to terminal equipment of the user; the terminal equipment acquires biological characteristic information of a user as a biological characteristic template, encrypts the biological characteristic template by using a first public key of the terminal equipment and adopting a homomorphic encryption algorithm to obtain a ciphertext biological characteristic template, and sends an identity signing and issuing request to the identity signing and issuing server, wherein a distributed identity label and a ciphertext biological characteristic template are included; the identity signing and issuing server side responds to the identity signing and issuing request, an identity credential of the user is generated, the identity credential is stored in the block chain, and the identity credential comprises a distributed identity label and a ciphertext biological feature template.

Description

technical field [0001] The embodiments of this specification relate to the technical field of identity authentication, and in particular, to a privacy-protecting identity information storage method and device, and a privacy-protecting identity authentication method and device. Background technique [0002] At present, biometric information such as face has been used in business scenarios such as payment, government affairs, finance, and social networking. Common scenarios include payment by face, login by face, and activation by face. Existing identity authentication schemes generally adopt centralized management, storage, and use methods for biometric information such as faces, which still has a certain distance from thorough user privacy protection. Taking the face as an example, the face image is usually stored in the form of a feature vector on the face scanning service provider side, and the feature vector can be reversely restored to the original face image. If the fa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F21/64G06F21/60G06K9/00
CPCG06F21/6254G06F21/64G06F21/602G06V40/50G06V40/53G06V40/10
Inventor 颜林
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD