Privacy-protecting identity authentication method and device

An identity authentication result and a technology to be authenticated, applied in digital data authentication, digital data protection, computer security devices, etc., can solve problems such as biometric leakage, achieve security, ensure execution efficiency, and prevent personal privacy from leaking.

Active Publication Date: 2021-06-11
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF8 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In actual use, there is a risk of leakage of biometrics

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy-protecting identity authentication method and device
  • Privacy-protecting identity authentication method and device
  • Privacy-protecting identity authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The specification will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. The described embodiments are only some of the embodiments in this specification, not all of them. Based on the embodiments in this specification, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present application.

[0027] It should be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings. In the case of no conflict, the embodiments in this specification and the features in the embodiments can be combined with each other. In addition, words such as "first" and "second" in this specification are only used to distinguish information and do no...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a privacy-protecting identity authentication method and device which are applied to terminal equipment, and one specific embodiment of the method comprises the following steps: acquiring plaintext biological characteristic information of a user to be authenticated; obtaining a stored ciphertext biological feature template, and obtaining the ciphertext biological feature template by adopting a homomorphic encryption algorithm and encrypting a biological feature template of a legal user based on a public key corresponding to the homomorphic encryption algorithm; calculating the ciphertext similarity between the plaintext biological characteristic information and the ciphertext biological characteristic template by adopting a plaintext-ciphertext direct calculation algorithm corresponding to the homomorphic encryption algorithm; and based on the ciphertext similarity, obtaining an identity authentication result for the to-be-authenticated user.

Description

technical field [0001] The embodiments of this specification relate to the field of computer technology, and in particular, to a privacy-protecting identity authentication method and device. Background technique [0002] Traditional biometric identification technologies (such as face recognition technology) identify and authorize users by extracting the user's biometric information and comparing it with the stored original biometrics. Among them, biometrics are personally identifiable information and belong to personal privacy. In actual use, there is a risk of leakage of biometrics. [0003] Therefore, there is an urgent need for a reasonable and reliable solution that can not only guarantee the security of the user's biometric features, but also ensure the execution efficiency of identity authentication. Contents of the invention [0004] The embodiment of this specification provides a privacy-protecting identity authentication method and device. [0005] In the first...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06F21/44G06F21/60
CPCG06F21/32G06F21/44G06F21/602
Inventor 张振飞
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products