Key generation device, key utilization device, and key generation method

A key generation device and key technology, applied to key distribution, can solve problems such as inapplicable methods, and achieve the effect of high-precision authentication

Pending Publication Date: 2022-07-15
HITACHI LTD
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] However, the method described in Non-Patent Doc

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key generation device, key utilization device, and key generation method
  • Key generation device, key utilization device, and key generation method
  • Key generation device, key utilization device, and key generation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] The biometric authentication system of this embodiment creates and registers a template and verification information for a verification key based on the biometric information of the user, restores the key using the template and the biometric information of the user newly acquired, and uses the key User authentication, data encryption and decryption, and electronic signature creation are performed.

[0031] figure 1 It is a block diagram showing a configuration example of a biometric authentication system. The biometric authentication system includes, for example, one or more key registration terminals 100 , one or more key use terminals 110 , and a DB (Data Base) server 120 connected to each other via a network 130 such as the Internet.

[0032] In addition, any two or three of the key registration terminal 100 , the key use terminal 110 , and the DB server 120 may all be installed in the same apparatus. In addition, in the case where all these three are installed in ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A key generation device is used for realizing high-precision authentication in biometric encryption and biometric signature based on a feature vector in a high-dimensional Euclidean space. The key generation device holds a first feature vector indicating a feature of the first biological information, and a parameter for determining a ball filling configuration having a density less than 1 and higher than a predetermined value, or a ball covering configuration having a density of 1 or more and lower than the predetermined value, and determines the ball filling configuration or the ball covering configuration on the basis of the parameter. A first point included in the determined ball filling configuration or ball covering configuration is selected, a predetermined first conversion is performed on the first point to generate a first key, and a template corresponding to the first biological information is generated on the basis of the first feature vector and the first point.

Description

[0001] reference-based import [0002] This application claims the priority of Japanese Patent Application No. 2019-216479 for which it applied on November 29, 2019, and the content is incorporated herein by reference. technical field [0003] The present invention relates to a key generation device, a key utilization device and a key generation method. Background technique [0004] Biometric authentication technologies that authenticate individuals based on biometric information such as fingerprints, veins, faces, and irises are widely used. In the conventional biometric authentication technology, the feature data (template) extracted from the user's biometric information at the time of user registration is registered in the system, and the feature data extracted from the user's biometric information again at the time of user authentication is combined with the user's biometric information. The templates are compared, and if the distance is sufficiently close, the authenti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/32G06F21/32
CPCG06F21/32H04L9/0866H04L9/3247H04L9/0861H04L9/3231H04L9/0643
Inventor 高桥健太
Owner HITACHI LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products