Check patentability & draft patents in minutes with Patsnap Eureka AI!

Biometric authentication key negotiation method and system for secure communication

A biometric authentication and key negotiation technology, applied in the field of information security, can solve the problems of private key theft, inability to determine the private key clone in time, and it is difficult for terminal devices to update the public and private key pairs in time, so as to achieve the effect of eliminating noise.

Pending Publication Date: 2022-02-01
WUHAN UNIV
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Second, if an adversary attacks the end device, the private key may be stolen
More importantly, it cannot be determined in time whether the private key has been cloned
Third, it is difficult to update the public-private key pair in time when the participant loses or needs to replace the terminal device, because each new public key needs to be authenticated in an out-of-band manner before it can be used

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Biometric authentication key negotiation method and system for secure communication
  • Biometric authentication key negotiation method and system for secure communication
  • Biometric authentication key negotiation method and system for secure communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to facilitate those skilled in the art to understand and implement the present invention, the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the implementation examples described here are only used to illustrate and explain the present invention, not for limit the invention.

[0044] please see figure 1 , a security-communication-oriented biometric authentication key agreement system provided by the present invention includes a biometric information processing module, an asymmetric fuzzy encapsulation module, and a biometric authentication key negotiation module; the biometric information processing module is used to process biometric features, and The iris or fingerprint biometrics are converted into a biometric vector or a set of biometric vectors, which serve as the user's biometric private key. This module needs to be executed in a trusted environment w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a biometric authentication key negotiation method and system oriented to secure communication, and the method comprises the steps: firstly, processing two biometric features of an iris or a fingerprint, and respectively converting the two biometric features into biometric feature private keys in two forms of a biometric feature vector or a biometric feature vector set; then, encapsulating secret information by using a public key corresponding to the biological characteristic private key, wherein only a private key similar to the target biological characteristic private key can de-encapsulate the information; and finally, negotiating a session key for both communication parties, and realizing an implicit biometric authentication function in the process. According to the authentication key negotiation method provided by the invention, the client does not need to store a private key, the biological characteristics of the participant are protected in the key negotiation process, and noise in the biological characteristics can be tolerated at the same time.

Description

technical field [0001] The invention belongs to the technical field of information security, and relates to an authentication key negotiation method and system in applied cryptography, in particular to a security communication-oriented biological authentication key negotiation method. Background technique [0002] With the development of the Internet, especially the popularity of the mobile Internet, social networking platforms have become one of the most influential types of Internet applications. In the existing mainstream communication mode, the communication between the client and the server is encrypted, and the server itself can obtain plaintext information. Under normal circumstances, in order to use big data to obtain commercial profits, or to meet the monitoring needs of relevant departments, companies will ensure that they can obtain plaintext information on the server. And this has become the biggest security hole in the entire network, because once the server is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/32G06F21/60G06F21/64
CPCG06F21/32G06F21/602G06F21/64
Inventor 陈晶王梅何琨杜瑞颖
Owner WUHAN UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More