AUTHENTICATION USING TRANSFORMATION VERIFICATION
摘要:
An example system includes a processor to receive, at a setup or sign-up, a first cipher including a biometric template transformed using a first transformation and encrypted using a secret key, a second cipher including a security vector encrypted using the secret key, a third cipher including the biometric template transformed using a second transformation and encrypted, and a fourth cipher including an encrypted second security vector. The processor can receive, at a runtime or sign-in, a fifth cipher and a sixth cipher. The processor can verify that the fifth cipher includes a second biometric template transformed using the first transformation and encrypted using the secret key and that the sixth cipher includes the second biometric template transformed using the second transformation by testing a format attribute of the transformation functions using comparisons of inner products. The processor can authenticate a user based on the Euclidean distance between the first cipher and the sixth cipher not exceeding a threshold in response to detecting that the transformations are verified.
公开/授权文献
信息查询
0/0