This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Figure 1
Biometric authentication process by FIDO: (A) Fingerprint registration process. (B) Fingerprint login process [4]. FIDO, Fast ID Online.
Figure 2
The conceptual proposed custody model of digital assets using a set-top box (home gateway). FIDO, Fast ID Online; DID, decentralized ID.
Figure 3
Design of digital asset custody service model based on home gateway: (A) simplified diagram and (B) detailed features of set-top box as a home gateway. FIDO, Fast ID Online, DID, decentralized ID.
Figure 4
The DID-based custody model: (A) custody model using home gateway, and (B) the storage of the home gateway by the DID for custody service. DID, decentralized ID.
Figure 5
Authentication process for personal digital asset custody model based on multiple DID. DID, decentralized ID.
Figure 6
Information processing of the proposed custody model configuration. CTAP, client to authenticator protocol; FIDO, Fast ID Online.
Figure 7
An example of hardware hacking prevention of biometric information in the biometric authentication process.
Figure 8
The proposed biometric sensor embedded with an encryption module to prevent hardware hacking and a system schematic to restore it.
Figure 9
LEA round function: (A) for encryption, and (B) for decryption. LEA, lightweight encryption algorithm.
Figure 10
Architecture of the LEA block cipher algorithm for IP design. LEA, lightweight encryption algorithm.
Figure 11
Round-key generation Verilog code for KeySchedule module.
Figure 12
LEA decryption C code for fingerprint image restoration. LEA, lightweight encryption algorithm.
Figure 13
Fingerprint sensor image with embedded LEA module: (A) original fingerprint image, (B) LEA encrypted image, and (C) LEA decrypted image. LEA, lightweight encryption algorithm.
Figure 14
Fingerprint information enrollment process: (A) 16 DB enrollment, (B) DB verify and lock, (C) authentication process, and (D) authentication failure with encrypted fingerprint image.
Figure 15
The proposed digital custody model with a biometric authentication device with an embedded encryption module, (A) using a set-top box as a home gateway and (B) authentication and information transfer processing.