CPC H04L 9/3231 (2013.01) [G06N 3/02 (2013.01); G06N 5/01 (2023.01); G06V 40/50 (2022.01); H04L 9/3236 (2013.01)] | 15 Claims |
1. A user verifying method by a security token combined with biometric information processing techniques, which is performed by a server, the method comprising:
receiving an enrollment request signal including biometric information for enrollment from a user terminal;
extracting feature information from the biometric information for the enrollment and biometric information of a plurality of other persons;
embedding the feature information extracted from the biometric information for the enrollment and the biometric information of the plurality of other persons;
generating a first key composed of a random binary string;
generating projection parameters by performing high-dimensional mapping to the result of said embedding the feature information for the enrollment, wherein said performing high-dimensional mapping is performed by using Random Fourier Feature Mapping (RFFM);
determining hyperplanes using Linear Support Vector Machine (Linear SVM) such that each of the hyperplanes classifies the result of said performing high-dimensional mapping to match with each bit value of the first key, wherein the number of hyperplanes equals to the number of bits of the first key;
obtaining decision hyperplane parameters of the determined hyperplanes;
storing the projection parameters and the decision hyperplane parameters;
generating a first template by applying a cryptographic hashing function to the first key;
storing the generated first template;
receiving a verification request signal including biometric information for verification from the user terminal;
extracting feature information from the biometric information for the verification;
embedding the feature information extracted from the biometric information for the verification;
generating a second key corresponding to the first key based on the embedding result;
generating a second template by applying the cryptographic hashing function to the second key;
comparing the first template with the second template; and
completing user verification based on the comparison result.
|