Unlock instant, AI-driven research and patent intelligence for your innovation.

Biological characteristic identity authentication method for desensitization security

A biometric and identity authentication technology, applied in the direction of public key for secure communication, user identity/authority verification, digital data authentication, etc., can solve problems such as high cost, information security, and inability to achieve network authentication.

Pending Publication Date: 2021-11-23
成都天瑞芯安科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the irrevocability, privacy and non-repudiation of biometrics, once the biometric template is leaked, it will cause irreversible information security problems
In view of the above security risks, the existing biometric authentication restricts the authentication to the local device without network transmission, so that network authentication cannot be realized; at the same time, in order to avoid the risk of theft at the local end, the biometric feature needs to be stored in the security area of ​​the local end However, the cost of this method is high, and there is still a risk of cracking after the terminal is stolen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Biological characteristic identity authentication method for desensitization security
  • Biological characteristic identity authentication method for desensitization security
  • Biological characteristic identity authentication method for desensitization security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The desensitized and safe biometric identity authentication method of the present invention will be described below in conjunction with the accompanying drawings.

[0029] Figure 4 , Figure 5 It is a schematic diagram of the application of the present invention in network identity authentication based on fingerprint biometric features. The figure includes users (natural persons), identity registration devices, application terminals and authentication servers.

[0030] identity registration, such as Figure 4Shown:

[0031] A1: The user enrolls on the Identity Enrollment device. The user enters the user name; presses the fingerprint on the terminal, and the fingerprint is collected into an image by the fingerprint sensor on the registration device. After image processing, the fingerprint feature template is obtained. It is assumed that the feature template is composed of N feature points, and each feature point Ni is a binary Group (feature type, feature value), c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a biological characteristic identity authentication method with desensitization security. When the user identity is registered, the biological characteristic template is processed through a cryptographic algorithm to generate a desensitization data set, the desensitization data set is stored in an authentication server, and the desensitization data set does not contain any biological characteristic information. And during identity authentication, the authentication server generates an authentication data set by using the random number as a secret and the desensitization data set, and sends the authentication data set to the user, and the user performs password calculation by using the biological characteristics and the authentication data set to complete identity authentication. In each time of identity authentication, the authentication server uses different random numbers as temporary secrets to construct an authentication data set, so that desensitization data guessing is avoided; and the authentication server does not store the biological characteristic information of the user, so that the biological characteristic leakage risk caused by attacks is avoided.

Description

technical field [0001] The present invention relates to biometric identity authentication methods, including but not limited to this field. Background technique [0002] Identity authentication is the process of determining whether the user's identity is legal. Generally, the following three methods are used: (1) Known by the user: knowledge known to the user, such as passwords, etc.; (2) Owned by the user: things held by the user such as IC card / USB shield etc.; (3) Who the user is: the user's biological characteristics such as fingerprints, etc. Among them, the biometric feature has the advantages of being portable, no need to remember, and convenient to use. More importantly, it has the characteristics of non-repudiation, which can realize the integration of the biological body and the certificate, and its security and reliability are higher. [0003] In the field of electronic information, biometrics are generally digitized into biometric templates, which consist of a s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/30H04L9/32G06F21/32
CPCH04L9/0869H04L9/3231H04L9/3066G06F21/32
Inventor 尚望兰天
Owner 成都天瑞芯安科技有限公司