Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A privacy protection biological authentication method and device, electronic equipment

A technology of biometric authentication and privacy protection, applied in the field of privacy protection identity authentication, can solve the problem of large data storage, and achieve the effect of ensuring secure communication, reducing storage, and easy to use

Active Publication Date: 2022-06-24
ZHEJIANG UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the embodiment of the present application is to provide a privacy protection biometric authentication method and device, and electronic equipment to solve the problem of large data storage in the related art, and the two systems whose biological information of the same person is encrypted using fuzzy vault technology can unlock each other technical issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A privacy protection biological authentication method and device, electronic equipment
  • A privacy protection biological authentication method and device, electronic equipment
  • A privacy protection biological authentication method and device, electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0084] Example 1: Polynomial:

[0085] One of the most natural and simple ideas is to use polynomials , making the polynomial Satisfy , where the polynomial The coefficients are the data structure of OKVS . When decrypting, we only need to and Do the inner product, you can decrypt to get . From the description, we can know that the polynomial-based OKVS technology is a linear OKVS technology.

example 2

[0086] Example 2: Dense Matrix:

[0087] if there is a Row A random matrix of columns that satisfies , then the probability of linear correlation in this matrix is ​​less than . Based on this, we have a way to construct OKVS by putting map to domain random vector in , then solve the following system of linear equations

[0088]

[0089] Get the data structure of OKVS .

example 3

[0090] Example 3: 3H-GCT (3-Hash Garbled Cuckoo Table)

[0091] 3H-GCT is a form of hash that contains three different hash functions, , assuming this hash table we denote as ,we use represented in the hash table in the elements, then any value If inserted into 3H-GCT, then it will be represented as . The structure of 3H-GCT's OKVS is a linear OKVS. The hash table T is used as the encrypted data structure S in OKVS, and a The upper value is 1, the remaining positions are 0, and the binary vector of length equal to the length of S is used as the mapping of k .

[0092] Assuming that user A needs to use the service provided by the network platform B, then A needs to register account information on the platform and log in to enjoy the service. Both user A and network platform B want to use a privacy-preserving and convenient identity authentication method. User A hopes to use biometric information instead of traditional password keys for identity authentication...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a privacy protection biological authentication method and device, and electronic equipment. The method includes: constructing a corresponding biological data template according to a biological information data set input by a user when registering; using asymmetric cryptography technology to generate a pair of public key and private key; according to the biological data template and the private key, use the secret sharing scheme and OKVS technology to generate encrypted biological data; send the public key and encrypted biological data to the server; according to the biological data input by the user during verification and the encrypted biological data, using OKVS technology to restore the private key; according to the restored private key and the corresponding public key, construct a signature; send the signature to the server, so that the server uses the public key and signature to verify the user. It solves the technical problems in the related technology that there is a large amount of data storage, and that two systems whose biological information of the same person is encrypted using the fuzzy vault technology can unlock each other.

Description

technical field [0001] The present application relates to the field of privacy protection identity authentication, and in particular, to a privacy protection biometric authentication method and device, and electronic equipment. Background technique [0002] In today's society, information security is becoming more and more important. A system is often implemented using cryptography, but one of the security challenges of this system is maintaining the secrecy of the keys. An effective solution is to use the user's biometric information (such as a fingerprint) as authentication to obtain the key, since biometric information tends to be unique. But a biometric authentication system itself is vulnerable. Because of the requirement of authentication, it is often necessary to store the user's biometric data in the database of the server. Once the server is attacked, all the confidential information of the user will be leaked. Then, in order to solve this problem, many privacy-p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/32G06F21/60G06F21/62G06F21/64
CPCG06F21/32G06F21/602G06F21/6245G06F21/64H04L9/0825H04L9/3231H04L9/3247H04L9/085
Inventor 张秉晟王志高任奎
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products