International Business Machines Corporation
AUTHENTICATION USING TRANSFORMATION VERIFICATION

Last updated:

Abstract:

An example system includes a processor to receive, at a setup or sign-up, a first cipher including a biometric template transformed using a first transformation and encrypted using a secret key, a second cipher including a security vector encrypted using the secret key, a third cipher including the biometric template transformed using a second transformation and encrypted, and a fourth cipher including an encrypted second security vector. The processor can receive, at a runtime or sign-in, a fifth cipher and a sixth cipher. The processor can verify that the fifth cipher includes a second biometric template transformed using the first transformation and encrypted using the secret key and that the sixth cipher includes the second biometric template transformed using the second transformation by testing a format attribute of the transformation functions using comparisons of inner products. The processor can authenticate a user based on the Euclidean distance between the first cipher and the sixth cipher not exceeding a threshold in response to detecting that the transformations are verified.

Status:
Application
Type:

Utility

Filling date:

24 Mar 2020

Issue date:

30 Sep 2021