Biometric authentication key negotiation method and system for secure communication

A biometric authentication and key negotiation technology, applied in the field of information security, can solve the problems of private key theft, inability to determine the private key clone in time, and it is difficult for terminal devices to update the public and private key pairs in time, so as to achieve the effect of eliminating noise.

Pending Publication Date: 2022-02-01
WUHAN UNIV
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Second, if an adversary attacks the end device, the private key may be stolen
More importantly, it cannot be determined in time whether the private key has been cloned
Third, it is difficult to update th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Biometric authentication key negotiation method and system for secure communication
  • Biometric authentication key negotiation method and system for secure communication
  • Biometric authentication key negotiation method and system for secure communication

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0043] In order to facilitate the understanding and practice of the invention, The invention is defined.

[0044] See figure 1 A biometric authentication key negotiation system provided by the present invention, including a biological information processing module, a non-symmetrical fuzzy package module, a biometric key negotiation module; a biological information processing module is used to process biometrics, The iris or fingerprint biological characteristics are transformed into a form of biometric vector or biometric vector set, thereby as a user's biometric private key. The module needs to be executed in a trusted environment, no information of the user biometric character; the asymmetric fuzzy package module is used to encapsulate a secret information, which encapsulates a random character with a public key corresponding to a user biometric private key. Strings, and only when the participant has a private key that is very close to the biometric private key, the random strin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a biometric authentication key negotiation method and system oriented to secure communication, and the method comprises the steps: firstly, processing two biometric features of an iris or a fingerprint, and respectively converting the two biometric features into biometric feature private keys in two forms of a biometric feature vector or a biometric feature vector set; then, encapsulating secret information by using a public key corresponding to the biological characteristic private key, wherein only a private key similar to the target biological characteristic private key can de-encapsulate the information; and finally, negotiating a session key for both communication parties, and realizing an implicit biometric authentication function in the process. According to the authentication key negotiation method provided by the invention, the client does not need to store a private key, the biological characteristics of the participant are protected in the key negotiation process, and noise in the biological characteristics can be tolerated at the same time.

Description

technical field [0001] The invention belongs to the technical field of information security, and relates to an authentication key negotiation method and system in applied cryptography, in particular to a security communication-oriented biological authentication key negotiation method. Background technique [0002] With the development of the Internet, especially the popularity of the mobile Internet, social networking platforms have become one of the most influential types of Internet applications. In the existing mainstream communication mode, the communication between the client and the server is encrypted, and the server itself can obtain plaintext information. Under normal circumstances, in order to use big data to obtain commercial profits, or to meet the monitoring needs of relevant departments, companies will ensure that they can obtain plaintext information on the server. And this has become the biggest security hole in the entire network, because once the server is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/32G06F21/60G06F21/64
CPCG06F21/32G06F21/602G06F21/64
Inventor 陈晶王梅何琨杜瑞颖
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products