17984052. AUTHENTICATION METHOD AND AUTHENTICATION SYSTEM USING BIOMETRIC INFORMATION AND FUNCTIONAL ENCRYPTION simplified abstract (SAMSUNG ELECTRONICS CO., LTD.)

From WikiPatents
Jump to navigation Jump to search

AUTHENTICATION METHOD AND AUTHENTICATION SYSTEM USING BIOMETRIC INFORMATION AND FUNCTIONAL ENCRYPTION

Organization Name

SAMSUNG ELECTRONICS CO., LTD.

Inventor(s)

HEESEOK Eun of SUWON-SI (KR)

WIJIK Lee of SUWON-SI (KR)

AUTHENTICATION METHOD AND AUTHENTICATION SYSTEM USING BIOMETRIC INFORMATION AND FUNCTIONAL ENCRYPTION - A simplified explanation of the abstract

This abstract first appeared for US patent application 17984052 titled 'AUTHENTICATION METHOD AND AUTHENTICATION SYSTEM USING BIOMETRIC INFORMATION AND FUNCTIONAL ENCRYPTION

Simplified Explanation

The patent application describes an authentication method that involves generating secret keys and public keys using personal information, encrypting information using these keys, and performing authentication based on the similarity between the enrollment and authentication target personal information.

  • The method involves generating a master secret key and a master public key, as well as a secret key and a public key using enrollment target personal information.
  • First information is generated using the enrollment target personal information.
  • The secret key and the first information are communicated to the authentication server and stored securely.
  • A ciphertext is generated at the apparatus using authentication target personal information and the public key, along with second information.
  • The ciphertext and the second information are communicated to the authentication server.
  • The authentication server performs authentication by calculating the similarity between the enrollment and authentication target personal information using the secret key, first information, ciphertext, and second information.

Potential applications of this technology:

  • Secure authentication systems for various applications such as online banking, e-commerce, and access control.
  • Identity verification for government services, healthcare systems, and other sensitive information platforms.

Problems solved by this technology:

  • Enhances security by using personal information and encryption techniques for authentication.
  • Reduces the risk of unauthorized access and identity theft.
  • Provides a more reliable and accurate authentication process.

Benefits of this technology:

  • Improved security measures for protecting personal information.
  • Efficient and reliable authentication process.
  • Reduces the need for traditional password-based authentication methods.
  • Provides a higher level of user privacy and data protection.


Original Abstract Submitted

An authentication method including, at an apparatus—generating a master secret key and a master public key, generating a secret key and a public key using enrollment target personal information, the master secret key and the master public key, and generating first information using the enrollment target personal information. Communicating the secret key and the first information from the apparatus to the authentication server, storing the secret key and the first information in a secure area of the authentication server, generating at the apparatus, a ciphertext encrypted using authentication target personal information and the public key, second information using the authentication target personal information and communicating the ciphertext and the second information from the apparatus to the authentication server. At the authentication server, performing an authentication of the authentication target personal information using the secret key, the first information, the ciphertext and the second information, wherein the performing of the authentication of the authentication target personal information includes calculating a similarity between the enrollment target personal information and the authentication target personal information by computing an Euclidean distance of the enrollment target personal information and the authentication target personal information, and the performing of the authentication of the authentication target personal information is performed in relation to the similarity.