KR-20260067286-A - BIOMETRIC AUTHENTICATION APPARATUS, BIOMETRIC AUTHENTICATION METHOD AND COMPUTER PROGRAM
Abstract
According to some embodiments, a biometric authentication device comprises: a processor; and a memory storing instructions that cause the processor to perform operations when executed by the processor, wherein the operations include: an operation of extracting feature information from original biometric information of an authentication requester to generate a feature vector; an operation of converting the feature vector into an encrypted vector using a vector operation-based encryption key; an operation of calculating multiple vector similarity values between the encrypted vector and multiple registration vectors of multiple biometric authentication users; and an operation of determining whether the biometric authentication of the authentication requester is successful based on the multiple vector similarity values.
Inventors
- 황동현
- 신대희
Assignees
- (주)비바리퍼블리카
Dates
- Publication Date
- 20260512
- Application Date
- 20250401
- Priority Date
- 20241105
Claims (20)
- In a biometric authentication device, processor; and It includes memory that stores instructions that cause the processor to perform operations when executed by the processor, and The above operations include: the operation of extracting feature information from the original biometric information of the authentication requester and generating a feature vector; An operation of converting the above feature vector into an encryption vector using a vector operation-based encryption key; The operation of calculating multiple vector similarity values between the above encryption vector and multiple registration vectors of multiple biometric authentication users; and A biometric authentication device comprising an operation to determine whether the biometric authentication of the authentication requester is successful based on the plurality of vector similarity values.
- In paragraph 1, A biometric authentication device in which the operation of converting to the above-mentioned encryption vector includes the operation of converting the feature vector using an orthogonal matrix key that converts the feature vector based on a vector rotation operation.
- In paragraph 2, A biometric authentication device wherein the operation of converting to the above encryption vector further includes the operation of converting the feature vector using a random sorting key that shuffles the arrangement order of the elements of the feature vector.
- In paragraph 3, A biometric authentication device wherein the operation of converting to the above-mentioned encryption vector further includes the operation of converting the feature vector using a scaling key that changes the vector size of the above-mentioned feature vector.
- In paragraph 3, A biometric authentication device wherein the operation of converting to the above encryption vector further includes the operation of converting the feature vector using a random noise key that adds a random noise vector to the feature vector.
- In paragraph 1, The above plurality of registration vectors are processed so that the original biometric information of the above plurality of biometric authentication users cannot be restored and are stored in a vector database, and A biometric authentication device, wherein the operation of determining the success or failure of the above biometric authentication includes the operation of determining the success or failure of the above biometric authentication based on whether there exists a registration vector among the plurality of vector similarity values that exceeds a similarity threshold.
- In paragraph 1, A biometric authentication device in which the above vector operation-based encryption key is stored in a key management system (KMS) and is queried to convert the above feature vector into the above encryption vector whenever a biometric authentication request occurs.
- In paragraph 1, The above original biometric information includes the facial recognition information of the authentication requester, and The above operations further include an operation to approve a payment request from the authentication requester when biometric authentication of the facial recognition information is successful, a biometric authentication device.
- In biometric authentication methods, A step of generating a feature vector by extracting feature information from the original biometric information of the authentication requester; A step of converting the above feature vector into an encryption vector using a vector operation-based encryption key; A step of calculating multiple vector similarity values between the above encryption vector and multiple registration vectors of multiple biometric authentication users; and A biometric authentication method comprising the step of determining whether the biometric authentication of the authentication requester is successful based on the plurality of vector similarity values.
- In Paragraph 9, A biometric authentication method comprising the step of converting to the above-mentioned encryption vector, wherein the step of converting the feature vector using an orthogonal matrix key that converts the feature vector based on a vector rotation operation.
- In Paragraph 10, A biometric authentication method, wherein the step of converting to the above-mentioned encryption vector further includes the step of converting the feature vector using a random sorting key that shuffles the arrangement order of the elements of the feature vector.
- In Paragraph 11, A biometric authentication method comprising a step of converting to the above-mentioned encryption vector, further comprising a step of converting the feature vector using a scaling key that changes the vector size of the feature vector.
- In Paragraph 11, A biometric authentication method comprising a step of converting to the above-mentioned encryption vector, further comprising a step of converting the feature vector using a random noise key that adds a random noise vector to the feature vector.
- In Paragraph 9, The above plurality of registration vectors are processed so that the original biometric information of the above plurality of biometric authentication users cannot be restored and are stored in a vector database, and A biometric authentication method comprising a step of determining whether the biometric authentication is successful based on whether there is a registration vector among the plurality of vector similarity values that exceeds a similarity threshold.
- In Paragraph 9, A biometric authentication method in which the above vector operation-based encryption key is stored in a key management system (KMS) and is queried to convert the above feature vector into the above encryption vector whenever a biometric authentication request occurs.
- In Paragraph 9, The above original biometric information includes the facial recognition information of the authentication requester, and The above biometric authentication method further includes the step of approving a payment request from the authentication requester when biometric authentication of the facial recognition information is successful.
- In a computer program stored on a computer-readable medium, When the instructions of the above computer program are executed by a processor, the processor performs operations, and The above operations include: the operation of extracting feature information from the original biometric information of the authentication requester and generating a feature vector; An operation of converting the above feature vector into an encryption vector using a vector operation-based encryption key; The operation of calculating multiple vector similarity values between the above encryption vector and multiple registration vectors of multiple biometric authentication users; and A computer program comprising an operation to determine whether the biometric authentication of the authentication requester is successful based on the plurality of vector similarity values.
- In Paragraph 17, A computer program in which the operation of converting to the above-mentioned encryption vector includes the operation of converting the feature vector using an orthogonal matrix key that converts the feature vector based on a vector rotation operation.
- In Paragraph 18, A computer program in which the operation of converting to the above encryption vector further includes the operation of converting the feature vector using a random sorting key that shuffles the array order of the elements of the above feature vector.
- In Paragraph 17, The above plurality of registration vectors are processed so that the original biometric information of the above plurality of biometric authentication users cannot be restored and are stored in a vector database, and A computer program that determines whether the above biometric authentication is successful, the operation of determining whether the above biometric authentication is successful based on whether there exists a registration vector among the plurality of vector similarity values that exceeds a similarity threshold.
Description
Biometric authentication apparatus, biometric authentication method and computer program The embodiments disclosed in this document relate to a biometric authentication device, a biometric authentication method, and a computer program. Biometric authentication technology, which verifies individuals using biometric information such as fingerprints, irises, faces, voices, and veins, is being utilized in various fields. Biometric information processed for the purpose of authentication or identification may be treated as sensitive information under relevant laws, and encryption may be mandatory for its storage. However, since computations such as data similarity calculations are impossible for biometric information encrypted in the form of strings, a decryption process may be required to proceed with authentication; consequently, it may be difficult to process authentication in real-time without delay. FIG. 1 illustrates an environment in which a biometric authentication device according to some embodiments operates. FIG. 2 illustrates elements constituting a biometric authentication device according to some embodiments. FIG. 3 illustrates a process of registering biometric information of multiple biometric authentication users according to some embodiments. FIG. 4 illustrates a process for determining whether to approve a biometric authentication request by performing a similarity search on registered biometric information according to some embodiments. FIG. 5 illustrates a process of converting a feature vector extracted from original biometric information into an encryption vector according to some embodiments. FIGS. 6 and 7 illustrate a method of processing biometric information of a plurality of biometric authentication users so that it cannot be restored in order to store it in a database according to some embodiments. FIG. 8 illustrates a method for determining the success or failure of biometric authentication of an authentication requester through vector similarity search according to some embodiments. FIG. 9 illustrates steps constituting a biometric authentication method according to some embodiments. Hereinafter, embodiments described in this document are described with reference to the accompanying drawings. However, this is not intended to limit the disclosure of this document to specific embodiments and should be understood to include various modifications, equivalents, and/or alternatives to the embodiments described in this document. The embodiments of this document and the terms used therein are not intended to limit the technical features described in this document to specific embodiments and should be understood to include various modifications, equivalents, or substitutions of said embodiments. In connection with the description of the drawings, similar reference numerals may be used for similar or related components. The singular form of a noun corresponding to an item may include one or more of said items unless the relevant context clearly indicates otherwise. In this document, each of the following phrases may include any one of the items listed together in the corresponding phrase, or any combination thereof: "A or B," "at least one of A and B," "A, B or C," "at least one of A, B and C," and "at least one of A, B, or C." Terms such as "first," "second," "first," "second," "A," "B," "(a)" or "(b)" may be used simply to distinguish a component from another component and, unless specifically stated otherwise, do not limit the components in any other aspect (e.g., importance or order). In this document, where it is stated that any (e.g., 1) component is "connected," "coupled," or "joined" to another (e.g., 2) component, with or without the terms "functionally" or "communicationly," or where it is stated that the component is "coupled" or "connected," it means that the component may be connected to the other component directly (e.g., by wire or wirelessly) or indirectly (e.g., through a 3) component. Methods according to the various embodiments disclosed in this document may be provided as part of a computer program product. The computer program product may be traded between a seller and a buyer as a product. The computer program product may be distributed in the form of a device-readable storage medium (e.g., compact disc read-only memory, CD-ROM) or distributed online (e.g., download or upload) through an application store or directly between two driver devices. In the case of online distribution, at least a portion of the computer program product may be temporarily stored or temporarily created on a device-readable storage medium, such as the memory of a manufacturer's server, an application store's server, or a relay server. According to the embodiments disclosed in this document, each component (e.g., module or program) of the components described above may include a singular or multiple entities, and some of the multiple entities may be separated and placed in other components. Accord