Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

35 results about "Fuzzy extractor" patented technology

Fuzzy extractors are a method that allows biometric data to be used as inputs to standard cryptographic techniques for security. "Fuzzy", in this context, refers to the fact that the fixed values required for cryptography will be extracted from values close to but not identical to the original key, without compromising the security required. One application is to encrypt and authenticate users records, using the biometric inputs of the user as a key.

Geosecurity methods and devices using geotags derived from noisy location data from multiple sources

In a geo-security system, a device receives RF signals from multiple distinct classes of RF communication systems and extracts location-dependent signal parameters. A current geotag is computed from the parameters by fuzzy extractors involving quantization of the parameters and Reed-Solomon decoding to provide a reproducible unique geotag. The current geotag is compared with a stored geotag, and a geo-secured function of the device is executed based on the result of the comparison. The use of multiple signal sources of different types, combined with special fuzzy extractors provides a robust geotag that allows both lower false rejection rate and lower false acceptance rate.
Owner:THE BOARD OF TRUSTEES OF THE LELAND STANFORD JUNIOR UNIV

Signcryption method of biological features of a plurality of receivers

InactiveCN102710613AOvercome the problem of forgeryPrevent leakageTransmissionDigital signatureSigncryption
The invention discloses a signcryption method of biological features of a plurality of receivers, comprising generating system parameters; extracting features; performing user log-on; encrypting by a sender; and decrypting by receivers. The method employs fuzzy extractor technique to bind the biological features and user keys to protect keys, directly authenticates user identity through the biological features, solves the safety problems of key safety and key abuse in the conventional cryptography, adds digital signature of senders during encryption, verifies identity of senders through certification during decryption, and solves the problem of counterfeiting of senders. The method improves the safety and reliability of whole systems, has the advantages of high safety, high efficiency and no need for storing any secret information by users, and can be applied to the distributed network application field.
Owner:XIDIAN UNIV

Use of biometrics and privacy preserving methods to authenticate account holders online

Embodiments are directed to a method for securely performing biometric authentication online. The method described can be used to securely perform biometric authentication on a mobile device. For protecting the privacy of the users biometric data, a cryptographic comparison protocol can be used to perform matching of encrypted templates. For example, the cryptographic comparison protocol may involve Fuzzy Extractors (FE), Homomorphic Encryption (HE), and / or Secure Multi-Party Computation (SMPC).
Owner:VISA INT SERVICE ASSOC

Novel fingerprint key generation method for digital signature

The invention relates to a novel fingerprint key generation method for a digital signature, which comprises two stages and is characterized in that the first stage is fingerprint feature extraction which comprises the steps of calculating a directional diagram of a fingerprint image, positioning a reference point of the fingerprint image, calculating a sector fingerprint feature extraction region, carrying out fingerprint image normalization, performing enhancement processing on the fingerprint image, and extracting fingerprint features; and the second stage refers to fuzzy extraction technology based fingerprint key generation which comprises the steps of constructing a security model based fuzzy extractor, constructing a Hamming distance based fuzzy extractor and generating a fingerprint key. The novel fingerprint key generation method has the advantages that the fingerprint key can be cancelled or updated for multiple times, the security is enabled to be higher, and potential safety hazards brought about by external information stealing can be avoided. Meanwhile, the novel fingerprint key generation method has important theoretical and practical values, and has wide application prospects.
Owner:XIJING UNIV

Wireless Biometric Authentication System and Method

Embodiments of the invention involve using biometric templates to wirelessly authenticate individuals. In one embodiment, a mobile device may generate a first biometric template and a first public value from a first biometric sample of a user and generate a first cryptographic key by passing the first biometric template to a fuzzy extractors generate function. An access device may generate a second biometric template from a second biometric sample of the user, generate a second secret cryptographic key by passing the second biometric template and the first public value to the fuzzy extractors reproduce function, encrypt the second biometric template with the second secret cryptographic key, and broadcast the encrypted template to a plurality of nearby mobile devices including the mobile device. If the mobile device is able to decrypt the encrypted template with the first cryptographic key, the access device can associate the user with the mobile device.
Owner:VISA INT SERVICE ASSOC

Solid-state imaging device, method for driving solid-state imaging device, and electronic apparatus

A fuzzy extractor includes an initial key generating part including a true random number generator, and a key regenerating part. The true random number generator generates a true random number using a read-out signal read from the reading part or a pixel signal read from the pixels of the pixel part in a true random number generation mode. The initial key generating part generates helper data and an initial key based on the true random number generated by the true random number generator and variation information acquired as a response when the initial key is generated. The key regenerating part generates, when a key is regenerated, a unique key based on helper data acquired when the initial key is generated and variation information acquired as a response including an error when the key is regenerated.
Owner:BRILLNICS JAPAN +1

Practical reusable fuzzy extractor based on the learning-with-error assumption and random oracle

Described is a system for biometric authentication. The system converts biometric data into a cryptographic key r′ using a reusable fuzzy extractor process having an underlying hash function modeling a random oracle model. The system allows access to secured services when a comparison of r′ to a previously computed cryptographic key r shows a match.
Owner:HRL LAB

Internet of Things security chip trusted mechanism

The invention discloses an Internet of Things security chip trusted mechanism, and relates to the technical field of Internet of Things security. The mechanism comprises the following steps: obtaininga physical unclonable function of a chip, and extracting a plurality of excitation corresponding pairs from the physical unclonable function; extracting a response part of the excitation corresponding pair as a first entropy value, and adding the first entropy value into an entropy pool; the Internet of Things equipment extracting communication protocol information in the communication process asa second entropy value and adding the second entropy value into an entropy pool; combining the first entropy value and the second entropy value in the entropy pool to obtain physical feature information; inputting the physical feature information into a fuzzy extractor, outputting auxiliary data P and a uniform random value R by the fuzzy extractor, and registering an identity by taking the auxiliary data P and the uniform random value R as registration information. The random feature physical fingerprint in the chip production and manufacturing process is used as identity registration information, the block chain is used as an identity generation and registration platform, and the safety is high.
Owner:南京航灵信息科技有限公司

Physical unclonable function circuit structure based on multiple bunching delay

The invention discloses a physical unclonable function circuit structure based on multiple bunching delay. The physical unclonable function circuit structure includes a variable-source multiple bunching delay module, a fuzzy extractor module and a logging and recurrence module; a multiple bunching delay unit and a fuzzy extractor which is based on linear codes and a hash function family are adopted, and physical unclonable functions which are high in stability and uniqueness are achieved.
Owner:ZHEJIANG UNIV

Random number generation, regeneration and tracking method based on non-uniform random source in group, and electronic device

The invention discloses a random number generation, regeneration and tracking method based on a non-uniform random source in a group, and an electronic device. The group is composed of a trusted administrator and a plurality of generators, and the administrator maintains the group to authenticate and track the identities of the generators; fingerprints are taken as an example, each generator in the group can independently operate a fuzzy extractor, and obtains the same almost uniform random character string by utilizing the fingerprints of the generators; any generator can generate an almost uniform random character string for the group by using the fingerprint of the generator, and other generators can recover the character string through the fingerprints of themselves; and the same random source can be repeatedly used, and a plurality of random character strings are obtained. For any two legal generators, the recovered random strings are the same; the opponent cannot distinguish the generator of the extracted random string, cannot forge the group random string extracted by each generator, and cannot distinguish the extracted string and the real random string in the probability polynomial time; and an administrator may track each generator.
Owner:INST OF INFORMATION ENG CAS +1

Fingerprint biometric key generation method based on deep neural network coding

The invention discloses a fingerprint biological key generation method based on deep neural network coding. According to the method, a classic fingerprint image processing method and a deep neural network method are combined, a series of operations of blind alignment, stable feature extraction, feature sequence stabilization and the like of the fingerprint image are realized, stable feature components of different samples of the same fingerprint are extracted more accurately, and through layer-by-layer processing of the deep neural network, the method further stabilizes the fingerprint feature to the feature value, and finally realizes the high-intensity key sequence generation of the normal fingerprint image through a fingerprint key fuzzy extractor, and the length of the generated fingerprint biological key can be greater than 512 bits. According to the method, biological feature template information needing to be recorded does not exist, the risk of privacy disclosure is greatly reduced, meanwhile, a user can generate a high-safety secret key without high-intensity memory, the secret key can be used for existing public and private keys, symmetric encryption and other operations, and the safety and flexibility of fingerprint biological feature use are improved.
Owner:HANGZHOU DIANZI UNIV

Pseudo-random generation of matrices for computational fuzzy extractor and method for authentication

A method for authenticating a first device is disclosed. In one embodiment, the method includes the steps of: receiving a helper bit string from a second device that is remote from the first device; measuring a first response bit string of a physical unclonable function of the first device with respect to a challenge bit string; subtracting the first response bit string from the helper bit string;reconstructing a random matrix using a pseudo-random number generator initialized with a seed; and decoding a result of the subtraction using the random matrix, the shared secret bit string being provided from the decoding if the helper bit string was encoded using a previously measured second response bit string that is within a threshold level of similarity to the first response bit string, thedecoding outputting an error value otherwise.
Owner:ROBERT BOSCH GMBH

Solid-state imaging device, method for driving solid-state imaging device, and electronic apparatus

A solid-state imaging device includes a pixel part, a reading part for reading a pixel signal from the pixel part and a response data generating part including a fuzzy extractor. The response data generating part generates response data including a unique key in association with at least one selected from among variation information of pixels and variation information of the reading part. The response data generating part generates, when regenerating a key, a unique key using helper data acquired in generation of an initial key, variation information acquired in the regeneration of the key, and reliability information determined based on the variation information acquired in the regeneration of the key.
Owner:BRILLNICS JAPAN +1

Unmanned aerial vehicle group key extraction and security authentication method based on GPS signal

The invention relates to an unmanned aerial vehicle group key extraction and security authentication method based on a GPS signal, and belongs to the technical field of data information processing. The method is mainly divided into an information extraction stage and an equipment authentication stage, and during initialization, each node in a cluster system generates similar sequence information by using an artificial intelligence technology according to a GPS signal acquired by the node; unified information is generated through a fuzzy extractor; and finally, generating a session key according to the unified information. In the flight process, interaction information is encrypted through session keys among the aircrafts so as to ensure communication safety, and in the flight process, the aircrafts extract the keys again according to the GPS signals at set intervals so as to realize key updating. According to the scheme, the generation of the initial keys on all the unmanned aerial vehicles in the fleet can be realized only through a public channel, and the problem of insufficient randomness of the keys can be well solved. In addition, the authentication mechanism based on the GPS signal in the scheme can also be applied to other unmanned equipment ad hoc network scenes, and has good expansibility and commercial value.
Owner:CHONGQING UNIV

System and method to integrate secure and privacy-preserving biometrics with identification, authentication, and online credential systems

Described is a system for the implementation of biometric scanning in a user-privacy preserving fashion with respect to identification, authentication, and online credential systems. At enrollment, the user enrolls or initially registers at a physical location, where the user is provided a Fuzzy Extractor (FE) encrypted output (Enc(R)). The user is then registered with an online server, which creates an ID-Wallet for the user and stores the ID-Waller. During operation, the user sends an authentication request to the online server, which provides a corresponding authentication response. The user or user's client then extracts secret (R) for user authentication. The user can then be authenticated with the online server to retrieve credentials from the ID-Wallet, which can be used for a variety of online services.
Owner:HRL LAB

Multi-level secret sharing method for calculating safety under standard model and resisting memory leak

The invention discloses an anti-memory leak multi-level secret sharing method for calculating safety under a standard model, which relates to the technical field of computer information safety, and comprises the following steps of: extracting the same character string which is randomly and uniformly distributed by utilizing the combined action of a physical unclonable function and a fuzzy extractor, namely generating a reliable secret share; in this way, the secret sharing method can meet the safety requirement under the environment of memory leakage. Meanwhile, according to the secret sharing method, the secret share of each participant can be used for multiple times and is used for recovering multiple secrets. According to the technical scheme, a verifiable multi-level secret sharing method which is suitable for a common access structure and is capable of resisting memory leakage is constructed instead of the idea of storing a long-term secret share in a nonvolatile memory in the prior art.
Owner:SHAANXI NORMAL UNIV

Finger vein biological key generation method based on deep neural network coding

The invention discloses a finger vein biological key generation method based on deep neural network coding. By combining a classical finger vein image processing method and a deep neural network processing method of a finger vein original image, compared with an existing classical finger vein feature point extraction method, stable feature components of different samples of the same finger vein can be extracted more accurately, and through layer-by-layer processing of the deep neural network, features are kept to be feature values. finally, through a finger vein fuzzy extractor, high-intensity key sequence generation of a normal finger vein image is realized, and the length of the generated finger vein biological key can be greater than 256 bits. Biological feature template information needing to be recorded does not exist, the risk of privacy disclosure is greatly reduced, meanwhile, a user can generate a high-safety secret key without high-intensity memory, the secret key can be used for existing public and private keys, symmetric encryption and other operations, and the safety and flexibility of finger vein biological feature use are improved.
Owner:HANGZHOU DIANZI UNIV

Backward Computational Fuzzy Extractor and Method for Authentication

Methods and systems for authenticating a first device are disclosed. The method comprises the steps of measuring a first response bit string of a physical unclonable function of the first device with respect to a challenge bit string, the physical unclonable function being determined by a processor of the first device and a further physical component of the first device Provided by one of; derives a shared secret bitstring from a uniformly distributed random vector; encoded by multiplying a uniformly distributed random matrix with a uniformly distributed random vector and adding the first response bitstring to the result of the multiplication an auxiliary bit string; and transmitting the auxiliary bit string to a second device remote from the first device.
Owner:ROBERT BOSCH GMBH

Reverse computational fuzzy extractor and method for authentication

A method and system for authenticating a first device is disclosed. The method includes the steps of: measuring a first response bit string of a physical unclonable function of the first device with respect to a challenge bit string, the physical unclonable function being provided by one of the processor of the first device and a further physical component of the first device; deriving a shared secret bit string from a uniformly distributed random vector; encoding a helper bit string by multiplying a uniformly distributed random matrix with the uniformly distributed random vector and adding the first response bit string to a result of the multiplication; and transmitting the helper bit string to a second device that is remote from the first device.
Owner:ROBERT BOSCH GMBH

Signcryption method of biological features of a plurality of receivers

InactiveCN102710613BOvercome the problem of forgeryPrevent leakageTransmissionDigital signatureSigncryption
The invention discloses a signcryption method of biological features of a plurality of receivers, comprising generating system parameters; extracting features; performing user log-on; encrypting by a sender; and decrypting by receivers. The method employs fuzzy extractor technique to bind the biological features and user keys to protect keys, directly authenticates user identity through the biological features, solves the safety problems of key safety and key abuse in the conventional cryptography, adds digital signature of senders during encryption, verifies identity of senders through certification during decryption, and solves the problem of counterfeiting of senders. The method improves the safety and reliability of whole systems, has the advantages of high safety, high efficiency and no need for storing any secret information by users, and can be applied to the distributed network application field.
Owner:XIDIAN UNIV

Method and Apparatus using Blended Biometric Data

A biometric processing system for authentication combines multiple biometric signals using machine learning to map the different signals into a common argument space that may be processed by a similar fuzzy extractor. The different biometric signals may be given weight values related to their entropy allowing them to be blended to increase security and availability while minimizing intrusiveness.
Owner:WISCONSIN ALUMNI RES FOUND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products