会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Verification process of authentication or biometric identification
    • US10461935B2
    • 2019-10-29
    • US15582358
    • 2017-04-28
    • Safran Identity & Security
    • Julien Paul KeufferHerve ChabanneRoch Lescuyer
    • G06F7/02G06F19/00G06F21/32G06F21/34G06F21/83G06K9/00H04L9/32H04L29/06G06Q20/40
    • The invention proposes a method for processing biometric data, comprising verification of the result of a calculation of distance between a biometric candidate datum and at least one biometric reference datum, each comprising a number n of indexed components (ai, bi), said calculation of distance comprising that of a polynomial of the components of the biometric data,the method being executed by a proving entity and a verification entity, the method comprising steps during which: the proving entity communicates to the verification entity the result of calculation of the distance between the candidate and reference biometric data, and said data, the proving entity generates from each datum a function of a number d of variables fa(i1, . . . , id), fb(i1, . . . , id) where d=log2 n, defined for each variable on the set {0,1}, by reformulation of the index i of each component (ai, bi) in binary format, the proving entity generates from each function a polynomial of d variables ã(x1, . . . xd), {circumflex over (b)} (x1, . . . xd) defined on d where is a finite field, such that each polynomial ã, {circumflex over (b)} coincides with the corresponding function fa,fb on the set {0,1}d, and generates from the polynomials ã, {circumflex over (b)} a polynomial p(x1, . . . , xd) of d variables of the same expression as that of the distance between the data, and the proving entity and the verification entity engage in a Sumcheck protocol applied to the polynomial p to verify the result of calculation of the distance between the data.
    • 6. 发明授权
    • Multiparty secure calculation method protected against a malevolent party
    • US10411882B2
    • 2019-09-10
    • US15418352
    • 2017-01-27
    • SAFRAN IDENTITY & SECURITY
    • Constance MorelJulien BringerHerve Chabanne
    • H04L9/06G06F21/72H04L9/14H04L9/32H04L9/30
    • The invention proposes a method comprising the evaluation of a function F obtained by applying to n sub-functions fi a first operation, the evaluation comprising: the application of a series of calculation steps in which a first unit assumes a role of a client and a second unit assumes a role of a server, and the repetition of the series of calculation steps in which the roles of client and of server are exchanged between the units, each series of steps comprising: a) randomly generating, by the server, first data, and a second datum, b) for each sub-function fi, generating by the server a set of elements formed by: a result of fi evaluated in the data of the client and of the server, masked by a first datum, by applying the first operation between the result and the first datum, and masked by the second datum, by applying between the masked result and the second datum of a second operation different from the first and distributed relatively to the latter, c) recovering by oblivious transfer, by the client, an intermediate datum corresponding to one of the elements generated by the server, d) generating, by the server, a first result portion, by: masking each first datum with the second datum, applying to all the first masked data of the first operation, and e) generating by the client, a second result portion, by applying all the intermediate data of the first operation.