CPC G06F 21/32 (2013.01) [G06N 3/08 (2013.01); H04L 9/3231 (2013.01); G06V 40/172 (2022.01)] | 18 Claims |
1. A method of performing identity authentication based on de-identified data, the method comprising:
receiving, by a processor, a data item from a user;
creating, by the processor, a de-identified data item by applying a de-identification function r on the data item,
training, by the processor, a transformation function p and a key generation function with a loss function of d1(f(r(xi), (p(xj, kxi)), f(xi, xj)), where (xi, xj) are a pair of training data items, d1, is a machine learning function, and f is a recognition function;
generating, by the processor, using the key generation function, an authentication key, based on the received data item and the de-identified data item;
receiving a new data item for authentication;
generating, by the processor, a new de-identified data item by applying the transformation function on the new data item and the authentication key; and
comparing, by the processor, the new de-identified data item with the de-identified data item to authenticate the identity of the user.
|