FIELD: information technology.
SUBSTANCE: method of guaranteed depersonalization of the user's electronic documents, in which: a key pair is created, some examples of the user's biometric image are read, the monitored biometric parameters are retrieved from each biometric image, training the artificial neural network based on these parameters is carried out with the purpose of subsequently converting the biometric parameters in the user's private key; thereinafter, the examples of the user's biometric image are destroyed, the parameters of the trained artificial neural network are saved in the database or in a depersonalized electronic document, the user's digital photo is received, the derivate from the private key is formed, the user's private key is destroyed, the user's digital photograph is encrypted on the derivate from his/her personal key, the encrypted digital photo is placed in the database or in the depersonalized electronic document; while carrying out the anonymous validation, the user to be checked provides his/her biometric image, then the image is transformed by the artificial neural network into the user's private key, the derivate of the private key is obtained and the digital photograph is decrypted on the derived key, then the decrypted photo is presented to the inspector and the automatic biometric authentication on the personal key is carried out and the result is reported to the inspector, additionally the inspector compares organoleptically the face of the person to be checked with the photograph decrypted, then the user's decrypted digital photo is destroyed, if the inspector makes the decision about the full match of the facial features of the person to be checked and the facial features on the photograph decrypted; if the inspector makes the decision about the mismatch of the face to be checked and the facial features on the photograph decrypted, the person's face is re-photographed and memorized together with the previously decrypted photograph; before memorizing, the pairs of photographs are encrypted on the inspector's public key and the public key of the person who will later carry out the incident analysis; after memorizing the two encrypted photographs, the original couple of photographs is destroyed.
EFFECT: effective personal data protection.
2 cl
Title | Year | Author | Number |
---|---|---|---|
METHOD OF CREATING PUBLIC KEY CERTIFICATE | 2010 |
|
RU2452013C2 |
METHOD FOR GENERATION OF ELECTRONIC BIOMETRIC ID CARD | 2008 |
|
RU2391704C1 |
METHOD FOR BIOMETRIC PROTECTION OF WITNESS ANONYMITY DURING COURT PROCEEDINGS | 2012 |
|
RU2543956C2 |
ANONYMOUS BIOMETRIC PERSON'S REGISTRATION METHOD | 2008 |
|
RU2371765C2 |
METHOD TO GENERATE AUDIT OF PERSONAL BIOMETRIC INFORMATION | 2010 |
|
RU2427921C1 |
VOTING METHOD WITH HIGH-RELIABILITY BIOMETRIC PROTECTION OF ANONYMITY OF VOTER | 2010 |
|
RU2444063C1 |
METHOD OF PROTECTING PERSONAL BIOMETRICAL IDENTIFICATION AND AUTHENTIFICATION DATA | 2007 |
|
RU2346397C1 |
METHOD FOR TRANSFER OF DOCUMENT ALONG OPEN CHANNEL OF SHARED ACCESS | 2008 |
|
RU2386216C1 |
METHOD OF FORMING OF ELECTRONIC DOCUMENTS AND DEVICE FOR ITS REALISATION | 2007 |
|
RU2365047C2 |
UNIVERSAL SYSTEM OF DISTRIBUTED SECURE REMOTE VOTING | 2019 |
|
RU2751315C2 |
Authors
Dates
2017-08-29—Published
2014-12-29—Filed