Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

35 results about "Fuzzy extractor" patented technology

Fuzzy extractors are a method that allows biometric data to be used as inputs to standard cryptographic techniques for security. "Fuzzy", in this context, refers to the fact that the fixed values required for cryptography will be extracted from values close to but not identical to the original key, without compromising the security required. One application is to encrypt and authenticate users records, using the biometric inputs of the user as a key.

Signcryption method of biological features of a plurality of receivers

InactiveCN102710613AOvercome the problem of forgeryPrevent leakageTransmissionDigital signatureSigncryption
The invention discloses a signcryption method of biological features of a plurality of receivers, comprising generating system parameters; extracting features; performing user log-on; encrypting by a sender; and decrypting by receivers. The method employs fuzzy extractor technique to bind the biological features and user keys to protect keys, directly authenticates user identity through the biological features, solves the safety problems of key safety and key abuse in the conventional cryptography, adds digital signature of senders during encryption, verifies identity of senders through certification during decryption, and solves the problem of counterfeiting of senders. The method improves the safety and reliability of whole systems, has the advantages of high safety, high efficiency and no need for storing any secret information by users, and can be applied to the distributed network application field.
Owner:XIDIAN UNIV

Internet of Things security chip trusted mechanism

The invention discloses an Internet of Things security chip trusted mechanism, and relates to the technical field of Internet of Things security. The mechanism comprises the following steps: obtaininga physical unclonable function of a chip, and extracting a plurality of excitation corresponding pairs from the physical unclonable function; extracting a response part of the excitation corresponding pair as a first entropy value, and adding the first entropy value into an entropy pool; the Internet of Things equipment extracting communication protocol information in the communication process asa second entropy value and adding the second entropy value into an entropy pool; combining the first entropy value and the second entropy value in the entropy pool to obtain physical feature information; inputting the physical feature information into a fuzzy extractor, outputting auxiliary data P and a uniform random value R by the fuzzy extractor, and registering an identity by taking the auxiliary data P and the uniform random value R as registration information. The random feature physical fingerprint in the chip production and manufacturing process is used as identity registration information, the block chain is used as an identity generation and registration platform, and the safety is high.
Owner:南京航灵信息科技有限公司

Random number generation, regeneration and tracking method based on non-uniform random source in group, and electronic device

The invention discloses a random number generation, regeneration and tracking method based on a non-uniform random source in a group, and an electronic device. The group is composed of a trusted administrator and a plurality of generators, and the administrator maintains the group to authenticate and track the identities of the generators; fingerprints are taken as an example, each generator in the group can independently operate a fuzzy extractor, and obtains the same almost uniform random character string by utilizing the fingerprints of the generators; any generator can generate an almost uniform random character string for the group by using the fingerprint of the generator, and other generators can recover the character string through the fingerprints of themselves; and the same random source can be repeatedly used, and a plurality of random character strings are obtained. For any two legal generators, the recovered random strings are the same; the opponent cannot distinguish the generator of the extracted random string, cannot forge the group random string extracted by each generator, and cannot distinguish the extracted string and the real random string in the probability polynomial time; and an administrator may track each generator.
Owner:INST OF INFORMATION ENG CAS +1

Fingerprint biometric key generation method based on deep neural network coding

The invention discloses a fingerprint biological key generation method based on deep neural network coding. According to the method, a classic fingerprint image processing method and a deep neural network method are combined, a series of operations of blind alignment, stable feature extraction, feature sequence stabilization and the like of the fingerprint image are realized, stable feature components of different samples of the same fingerprint are extracted more accurately, and through layer-by-layer processing of the deep neural network, the method further stabilizes the fingerprint feature to the feature value, and finally realizes the high-intensity key sequence generation of the normal fingerprint image through a fingerprint key fuzzy extractor, and the length of the generated fingerprint biological key can be greater than 512 bits. According to the method, biological feature template information needing to be recorded does not exist, the risk of privacy disclosure is greatly reduced, meanwhile, a user can generate a high-safety secret key without high-intensity memory, the secret key can be used for existing public and private keys, symmetric encryption and other operations, and the safety and flexibility of fingerprint biological feature use are improved.
Owner:HANGZHOU DIANZI UNIV

Unmanned aerial vehicle group key extraction and security authentication method based on GPS signal

The invention relates to an unmanned aerial vehicle group key extraction and security authentication method based on a GPS signal, and belongs to the technical field of data information processing. The method is mainly divided into an information extraction stage and an equipment authentication stage, and during initialization, each node in a cluster system generates similar sequence information by using an artificial intelligence technology according to a GPS signal acquired by the node; unified information is generated through a fuzzy extractor; and finally, generating a session key according to the unified information. In the flight process, interaction information is encrypted through session keys among the aircrafts so as to ensure communication safety, and in the flight process, the aircrafts extract the keys again according to the GPS signals at set intervals so as to realize key updating. According to the scheme, the generation of the initial keys on all the unmanned aerial vehicles in the fleet can be realized only through a public channel, and the problem of insufficient randomness of the keys can be well solved. In addition, the authentication mechanism based on the GPS signal in the scheme can also be applied to other unmanned equipment ad hoc network scenes, and has good expansibility and commercial value.
Owner:CHONGQING UNIV

Reverse computational fuzzy extractor and method for authentication

A method and system for authenticating a first device is disclosed. The method includes the steps of: measuring a first response bit string of a physical unclonable function of the first device with respect to a challenge bit string, the physical unclonable function being provided by one of the processor of the first device and a further physical component of the first device; deriving a shared secret bit string from a uniformly distributed random vector; encoding a helper bit string by multiplying a uniformly distributed random matrix with the uniformly distributed random vector and adding the first response bit string to a result of the multiplication; and transmitting the helper bit string to a second device that is remote from the first device.
Owner:ROBERT BOSCH GMBH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products