Use of biometrics and privacy preserving methods to authenticate account holders online

A biometric, user technology, applied in user identity/authority verification, digital transmission systems, secure communication devices, etc., can solve the problems of easy password theft and users' inability to change biometric identification information.

Active Publication Date: 2020-04-10
VISA INT SERVICE ASSOC
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, passwords are easily stolen
Biometric data is not used in online transactions because transmitting a user's biometric information can cause serious problems for the user because, unlike passwords, users cannot change their biometric information
Therefore, conventional systems for authentication during online transactions are flawed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Use of biometrics and privacy preserving methods to authenticate account holders online
  • Use of biometrics and privacy preserving methods to authenticate account holders online
  • Use of biometrics and privacy preserving methods to authenticate account holders online

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Embodiments relate to a method for securely performing biometric authentication online. The described method can be used to securely perform biometric authentication on a user's device (eg, a mobile device). To protect the privacy of the user's biometric data, a cryptographic comparison protocol may be used to perform matching of encrypted and / or unencrypted biometric templates. For example, the cryptographic comparison protocol may involve Fuzzy Extractor (FE), Homomorphic Encryption (HE), and / or Secure Multi-Party Computation (SMPC).

[0031] One use case may involve a user having one or more wallet applications on his or her mobile phone and being enrolled in a biometric authentication program. For example, an authentication program could be a service offered to conduct transactions using facial data (e.g., by using a front-facing camera to generate a selfie or “selfie”) or other biometric data (e.g., fingerprints, retinal scans, etc.). The user can then use a reso...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments are directed to a method for securely performing biometric authentication online. The method described can be used to securely perform biometric authentication on a mobile device. For protecting the privacy of the user biometric data, a cryptographic comparison protocol can be used to perform matching of encrypted templates. For example, the cryptographic comparison protocol may involve Fuzzy Extractors (FE), Homomorphic Encryption (HE), and / or Secure Multi-Party Computation (SMPC).

Description

[0001] Cross References to Related Applications [0002] This application claims the benefit of the filing date of U.S. Provisional Application No. 62 / 543,500, filed August 10, 2017, which is hereby incorporated by reference in its entirety for all purposes. Background technique [0003] In today's technological environment, users often carry mobile electronic devices, such as smart phones and wearable devices, with them. These mobile electronic devices are generally capable of receiving, sending, generating and storing user data. As such, it is becoming increasingly common for entities to accept digital records from mobile electronic devices. For example, it may be convenient for users to identify themselves using their mobile phone rather than presenting an identification card. However, an issue may arise where users want to verify their records without exposing any sensitive information. For example, users wish to avoid exposing their fingerprint, voice and / or facial dat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/00
CPCH04L9/008H04L9/3231H04L2209/46H04L63/0861H04L9/0866
Inventor J·布莱克赫尔斯特K·瓦格纳J·希茨蒋春曦S·S·阿罗拉
Owner VISA INT SERVICE ASSOC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products