Accès libre

Biometric authentication sensor with an encryption module for prevention of h/w hacking in digital custody services

À propos de cet article

Citez

Figure 1

Biometric authentication process by FIDO: (A) Fingerprint registration process. (B) Fingerprint login process [4]. FIDO, Fast ID Online.
Biometric authentication process by FIDO: (A) Fingerprint registration process. (B) Fingerprint login process [4]. FIDO, Fast ID Online.

Figure 2

The conceptual proposed custody model of digital assets using a set-top box (home gateway). FIDO, Fast ID Online; DID, decentralized ID.
The conceptual proposed custody model of digital assets using a set-top box (home gateway). FIDO, Fast ID Online; DID, decentralized ID.

Figure 3

Design of digital asset custody service model based on home gateway: (A) simplified diagram and (B) detailed features of set-top box as a home gateway. FIDO, Fast ID Online, DID, decentralized ID.
Design of digital asset custody service model based on home gateway: (A) simplified diagram and (B) detailed features of set-top box as a home gateway. FIDO, Fast ID Online, DID, decentralized ID.

Figure 4

The DID-based custody model: (A) custody model using home gateway, and (B) the storage of the home gateway by the DID for custody service. DID, decentralized ID.
The DID-based custody model: (A) custody model using home gateway, and (B) the storage of the home gateway by the DID for custody service. DID, decentralized ID.

Figure 5

Authentication process for personal digital asset custody model based on multiple DID. DID, decentralized ID.
Authentication process for personal digital asset custody model based on multiple DID. DID, decentralized ID.

Figure 6

Information processing of the proposed custody model configuration. CTAP, client to authenticator protocol; FIDO, Fast ID Online.
Information processing of the proposed custody model configuration. CTAP, client to authenticator protocol; FIDO, Fast ID Online.

Figure 7

An example of hardware hacking prevention of biometric information in the biometric authentication process.
An example of hardware hacking prevention of biometric information in the biometric authentication process.

Figure 8

The proposed biometric sensor embedded with an encryption module to prevent hardware hacking and a system schematic to restore it.
The proposed biometric sensor embedded with an encryption module to prevent hardware hacking and a system schematic to restore it.

Figure 9

LEA round function: (A) for encryption, and (B) for decryption. LEA, lightweight encryption algorithm.
LEA round function: (A) for encryption, and (B) for decryption. LEA, lightweight encryption algorithm.

Figure 10

Architecture of the LEA block cipher algorithm for IP design. LEA, lightweight encryption algorithm.
Architecture of the LEA block cipher algorithm for IP design. LEA, lightweight encryption algorithm.

Figure 11

Round-key generation Verilog code for KeySchedule module.
Round-key generation Verilog code for KeySchedule module.

Figure 12

LEA decryption C code for fingerprint image restoration. LEA, lightweight encryption algorithm.
LEA decryption C code for fingerprint image restoration. LEA, lightweight encryption algorithm.

Figure 13

Fingerprint sensor image with embedded LEA module: (A) original fingerprint image, (B) LEA encrypted image, and (C) LEA decrypted image. LEA, lightweight encryption algorithm.
Fingerprint sensor image with embedded LEA module: (A) original fingerprint image, (B) LEA encrypted image, and (C) LEA decrypted image. LEA, lightweight encryption algorithm.

Figure 14

Fingerprint information enrollment process: (A) 16 DB enrollment, (B) DB verify and lock, (C) authentication process, and (D) authentication failure with encrypted fingerprint image.
Fingerprint information enrollment process: (A) 16 DB enrollment, (B) DB verify and lock, (C) authentication process, and (D) authentication failure with encrypted fingerprint image.

Figure 15

The proposed digital custody model with a biometric authentication device with an embedded encryption module, (A) using a set-top box as a home gateway and (B) authentication and information transfer processing.
The proposed digital custody model with a biometric authentication device with an embedded encryption module, (A) using a set-top box as a home gateway and (B) authentication and information transfer processing.
eISSN:
1178-5608
Langue:
Anglais
Périodicité:
Volume Open
Sujets de la revue:
Engineering, Introductions and Overviews, other