Privacy protection biological authentication method and device and electronic equipment
A biometric authentication and privacy protection technology, applied in the field of privacy protection identity authentication, can solve the problem of large data storage, achieve the effect of ensuring safe communication, easy to use, and reduced storage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0083] Example 1: Polynomial:
[0084] One of the most natural and simple ideas is to use polynomials , so that the polynomial satisfy , where the polynomial The coefficient is the data structure of OKVS . When decrypting, we only need to and Do the inner product, you can decrypt it to get . By describing, we can know that the polynomial-based OKVS technique is a linear OKVS technique.
example 2
[0085] Example 2: Dense matrix:
[0086] if there is a Row A random matrix of columns that satisfies , then the probability of linear correlation of this matrix is less than . Based on this, we have a way to construct OKVS is to map to domain The random vector in , and then solve the following system of linear equations
[0087]
[0088] Get the data structure of OKVS .
example 3
[0089] Example 3: 3H-GCT (3-Hash Garbled Cuckoo Table)
[0090] 3H-GCT is a form of hashing that consists of three different hash functions, , assuming that this hash table we denote as ,we use represented in the hash table in the first elements, then any value If inserted into 3H-GCT, it will be represented as . The construction of OKVS of 3H-GCT is a kind of linear OKVS, the hash table T is used as the encrypted data structure S in OKVS, and a The upper value is 1, and the other positions are 0, and the binary vector whose length is equal to the length of S is used as the mapping of k .
[0091] Assuming that user A needs to use the service provided by network platform B, A needs to register account information on the platform and log in to enjoy the service. Both user A and network platform B hope to use a convenient identity authentication method with privacy protection. User A hopes to use biometric information instead of traditional password keys for i...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com