Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Fuzzy strong box remote identity authentication method based on face feature

A technology of fuzzy safes and facial features, applied in user identity/authority verification, character and pattern recognition, instruments, etc., can solve problems such as security degradation, intolerance of intra-class changes, cross-matching, etc., and reduce FAR recognition. rate, avoid aliasing matching, and increase the effect of success rate

Active Publication Date: 2011-10-12
BEIJING UNIV OF TECH
View PDF1 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] 1) When the confirmation is successful, the original biometric template is exposed, which is very dangerous;
[0014] 2) The method does not have the aforementioned diversity and revocability features;
[0015] 3) The non-uniform distribution characteristics of the original biological characteristics may reduce the security of the method
Relatively speaking, face features are generally ordered features, and the above scheme does not make full use of the order of face features;
[0020] 4) The intra-class variation of face features is large, and the quantization series with a certain step size is difficult to tolerate intra-class changes; many face features such as PCA, LDA, etc. are composed of some scalars distributed within a certain range. Therefore, the uniqueness between the components of the feature is not good, and it is easy to cross-match between the components

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fuzzy strong box remote identity authentication method based on face feature
  • Fuzzy strong box remote identity authentication method based on face feature
  • Fuzzy strong box remote identity authentication method based on face feature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The scheme we proposed uses face hashing to realize the randomization of facial features; furthermore, an ordered fuzzy safe encoding and decoding scheme is proposed, which makes full use of the orderliness of facial biometric features. Specific plans such as figure 1 shown.

[0047] The scheme is oriented to the client / server structure, including two stages of registration and authentication.

[0048] 1.1 Perform feature extraction on the face image to obtain an ordered sequence of face features;

[0049] 1.2 Generate multiple biological hash sequences: use the password entered by the user as a random seed to generate a series of pseudo-random numbers and form a matrix Q in a specific order, and perform random mapping on the face features, that is, multiply the face feature sequence by the matrix Q, Binarize the obtained array into a string sequence (that is, generate a biological hash sequence);

[0050] 1.3 Ordered fuzzy safe code:

[0051] 1.3.1 Generating polyn...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a fuzzy strong box remote identity authentication method based on a face feature. The method comprises: fuzzy strong box data is generated according to a human feature and a user password, wherein the fuzzy strong box data comprises a human feature value and key information; the fuzzy strong box data is stored into a server; a client obtains a user face image and a password when a user registers, and encrypts the obtained face feature to generate fuzzy strong box data, and sends the data to a database server; the database server obtains a user registration key and a user login key by computing the fuzzy strong box data, and compares the user login key with the registration key; if the user login key is the same as the registration key, the database server regards that the user can log in the system; and the user can select different passwords to protect the human feature, therefore, the cross-database search can be effectively prevented, the safety and privacy of the method can be effectively guaranteed, and the fuzzy strong box remote identity authentication method has application value.

Description

technical field [0001] The invention relates to an encrypted face-based real-name identity authentication method and system, belonging to the field of information security. Background technique [0002] With the development of social networking and informatization, people are faced with a very common problem, that is how to conduct identity authentication more quickly, conveniently and safely. Identity authentication occupies an extremely important position in the security system, and is the most basic security service, and other security services must depend on it. Once the identity authentication system is breached, all other security measures of the system will be useless. The target of hacker attacks is often the identity authentication system. Therefore, in order to speed up the construction of information security, it is even more important to strengthen the research on identity authentication theory and its application. In addition, after logging in to the system, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32G06K9/00
Inventor 毋立芳袁松龙江思源刘兴胜肖鹏周鹏
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products