CN103177207A - Method and system for protecting data based on iris identification - Google Patents

Method and system for protecting data based on iris identification Download PDF

Info

Publication number
CN103177207A
CN103177207A CN201310084586XA CN201310084586A CN103177207A CN 103177207 A CN103177207 A CN 103177207A CN 201310084586X A CN201310084586X A CN 201310084586XA CN 201310084586 A CN201310084586 A CN 201310084586A CN 103177207 A CN103177207 A CN 103177207A
Authority
CN
China
Prior art keywords
data
iris
iris information
client
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310084586XA
Other languages
Chinese (zh)
Inventor
耿振民
杨磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SUZHOU JIUGUANG INFORMATION TECHNOLOGY Co Ltd
Original Assignee
SUZHOU JIUGUANG INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SUZHOU JIUGUANG INFORMATION TECHNOLOGY Co Ltd filed Critical SUZHOU JIUGUANG INFORMATION TECHNOLOGY Co Ltd
Priority to CN201310084586XA priority Critical patent/CN103177207A/en
Publication of CN103177207A publication Critical patent/CN103177207A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention provides a method and a system for protecting data based on iris identification. The system for protecting the data based on iris identification comprises an iris collector which is used for collecting and identifying iris information, an iris information storage module which reads information from the iris collector and stores the iris information, a client-side which is used for data access or operation, and a data storage and processing module which is used for storing data and comparing the iris information read from the client-side with the iris information stored in the iris information storage module and analyzing the information to control access or operation to data from the client-side, wherein when the client-side accesses or operates data, the iris collector collects iris and outputs the iris to the client-side. According to the method and the system for protecting the data based on iris identification, operation permission is controlled, data self cannot be changed, and the speed cannot be influenced due to huge encrypted and decrypted data. Therefore, the method and the system for protection data based on iris identification are stable and the data security problem is solved conveniently and rapidly.

Description

A kind of method and system of data being protected based on iris recognition
Technical field
The present invention relates to field of information security technology, particularly relate to a kind of method and system of data being protected based on iris recognition.
Background technology
Electronic information tide take computing machine, network and movable storage device as sign has covered different social sectors, has liberated greatly yield-power, has improved speed and the validity of information interaction.Also brought certain puzzlement to enterprise in the safety problem that informationization brings, especially information is illegally abused, and comprises that the employee sells the rival with document, and data are illegally stolen etc.
Simultaneously, the data transmission method of more and more polynary change makes the security of data be subject to very large threat.Each circuit-switched data is encrypted manufacturer and has also just been become leading role in this crisis; in today that cryptographic algorithm comes into the open; key has served as the role of key and lock, and the both sides that so-called key namely transmits and receive data use identical or symmetrical key to expressly being encrypted the encryption method of decrypt operation.Key is a kind of parameter, and it is the data of inputting in expressly being converted to ciphertext or ciphertext being converted to algorithm expressly.Key is divided into two kinds: symmetric key and unsymmetrical key symmetric key encryption, claim again encrypted private key or session key algorithm, and namely the transmit leg of information and take over party go the encryption and decryption data with same key.Its sharpest edges are that enciphering/deciphering speed is fast, are suitable for big data quantity is encrypted, but cipher key management difficult.The asymmetric-key encryption system claims again public-key cryptographic keys to encrypt.It need to complete respectively encryption and decryption operations with different keys, and one publishes, i.e. public-key cryptography, and another is by the secret preservation of user oneself, i.e. private key.Information transmitter goes to encrypt with public-key cryptography, and the information receiver goes deciphering with private key.Public-key mechanism is flexible, but encryption and decryption speed than symmetrical secret key encryption slowly many.
Product take Key Encryption Technology as means is active gradually, although it is very high that all big enterprises all represent by secret key encryption data security later, security product is more stable, but still face some problems in reality is implemented: encryption/decryption speed is too slow, destroy data, unstable etc., simultaneously whether existing encryption and decryption can cause in the conversion process of encryption and decryption data to suffer irreversible damage, and during encryption and decryption data on the impact of read or write speed be also one inevitably true.So enterprise is to using security product still to entertain certain wait-and-see attitude.
Therefore, how to prevent efficiently the leakage of confidential data, become those skilled in the art's urgent problem.
Summary of the invention
The shortcoming of prior art in view of the above; the object of the present invention is to provide a kind of method and system of data being protected based on iris recognition, be used for to solve that prior art is not enough to the security that exists in the data protection, data reading speed that bring due to encryption and decryption is slow, and the problem of easy corrupt data.
Reach for achieving the above object other relevant purposes, the invention provides a kind of method of data being protected based on iris recognition, comprise the steps: at least S1, gather iris information and the iris information that gathers is stored; S2 when access or service data, carries out the iris letter and gathers identification; S3 is analyzed the iris information of identification and the iris information of storage; S4 according to the comparative analysis result, controls access or operation to data.
Alternatively, in step S1, with iris information and user name or the coding corresponding stored that gathers.
Alternatively, in step S3, in access or during service data, the iris information of confirming identification is with after the iris information of storage is consistent, and acquisition is accessed or the authority of service data.
Alternatively, in step S4, after the iris information of identification and the iris information of storage are analyzed, if the iris information of identification and the iris information of storage are complementary, allow access or service data, if fail to obtain the iris information of iris information or identification and the iris information of storage is not mated, disable access or service data.
Alternatively, in step S4, in access or service data process, forbid screenshotss, copy, one or more operations in stickup or drag and drop.
In addition, the present invention also provides a kind of system that data is protected based on iris recognition, comprising: the iris capturing device gathers and identifies iris information; The iris information memory module is connected with described iris capturing device, reads iris information and stores this iris information from described iris capturing device; Client is connected with described iris capturing device, is used for carrying out data access or operation; Described client is when carrying out data access or operation, and described iris capturing device carries out iris capturing and outputs in client; The data storage processing module, be connected with described client with described iris information memory module respectively, be used for the storage data, and the iris information of the iris information that reads from described client and the storage of described iris information memory module is analyzed, to control client to access or the operation of data.
Alternatively, described data storage processing module comprises: the iris information recognition unit, be connected with described iris information storage unit with described client respectively, the iris information of the iris information that will read from described client and the storage of described iris information memory module is analyzed; The data storage management unit, be connected with described iris information recognition unit with described client respectively, be used for the storage data and data conducted interviews or operate for client, simultaneously according to newly-built, read-write, deletion or the change operation to data of the comparative analysis output control client of described iris information recognition unit; The rights management query unit is connected with described iris information recognition unit, described data storage management unit and described client respectively, according to being that the control of authority client set of the corresponding user of described iris information is to the operation of data; The data protection control module is connected with described client with described data storage management unit, for the protection of data to avoid data to shift.
Alternatively, described data protection control module comprises: the screenshotss protection subelement that when avoiding data shown, screenshotss shift; Avoid data to be replicated the stickup copy protection subelement of pasting and shifting; The drag and drop protection subelement of avoiding data to be shifted by drag and drop.
Alternatively, described iris information memory module is with the iris information and user name or the coding corresponding stored that gather.
Alternatively, after described data storage processing module is analyzed the iris information of the iris information in client and storage, if the iris information of the iris information in client and storage is complementary, allow access or service data, do not mate if fail to obtain iris information in iris information or client and the iris information of storage, disable access or service data.
As mentioned above, a kind of method and system of data being protected based on iris recognition of the present invention have following beneficial effect:
1, the present invention passes through iris recognition technology, the data that the author who has iris is made identify, and additions and deletions change look into and the transmission of data in carry out effective rights management by iris identification, because native system just carries out management and control to the authority of operation, can not produce data itself and change, can be not huge and affect speed due to the data of encryption and decryption yet, so the present invention is more stable, solved efficiently the problem of data security.
2, the present invention by the sign of data and identification, access rights are controlled, the screenshotss protection, paste copy with the drag and drop protection, etc. function, security that can omnibearing protected data.
Description of drawings
Fig. 1 is shown as the schematic flow sheet of a kind of method of data being protected based on iris recognition of the present invention.
Fig. 2 is shown as the particular flow sheet of step S1 in a kind of method of data being protected based on iris recognition of the present invention.
Fig. 3 is shown as the structural representation of a kind of system that data is protected based on iris recognition of the present invention.
Fig. 4 is shown as the preferred structural representation of a kind of system that data is protected based on iris recognition of the present invention.
Fig. 5 is shown as the schematic diagram of the middle data protection control module of a kind of system that data is protected based on iris recognition of the present invention.
The element numbers explanation
1 pair of system that data are protected
11 iris capturing devices
12 iris information memory modules
13 clients
14 data storage processing modules
141 iris information recognition units
142 rights management query unit
143 data storage management unit
144 data protection control modules
1441 screenshotss protection subelements
1442 paste the copy protection subelement
1443 drag and drop protection subelements
S1~S4 step
Embodiment
Below by particular specific embodiment explanation embodiments of the present invention, person skilled in the art scholar can understand other advantages of the present invention and effect easily by the disclosed content of this instructions.
Notice, the appended graphic structure that illustrates of this instructions, ratio, size etc., equal contents in order to coordinate instructions to disclose only, understand and read for person skilled in the art scholar, be not to limit the enforceable qualifications of the present invention, therefore the technical essential meaning of tool not, the adjustment of the modification of any structure, the change of proportionate relationship or size, not affecting under the effect that the present invention can produce and the purpose that can reach, all should still drop on disclosed technology contents and get in the scope that can contain.Simultaneously, quote in this instructions as " on ", D score, " left side ", " right side ", " centre " reach the term of " " etc., also only for ease of understanding of narrating, but not in order to limit the enforceable scope of the present invention, the change of its relativeness or adjustment, under without essence change technology contents, when also being considered as the enforceable category of the present invention.
The object of the present invention is to provide a kind of method and system of data being protected based on iris recognition, be used for to solve that prior art is not enough to the security that exists in the data protection, data reading speed that bring due to encryption and decryption is slow, and the problem of easy corrupt data.Below will elaborate principle and the embodiment of a kind of method and system of data being protected based on iris recognition of the present invention, and make those skilled in the art not need creative work can understand a kind of method and system of data being protected based on iris recognition of the present invention.
The first embodiment
See also Fig. 1, be shown as the schematic flow sheet of a kind of method of data being protected based on iris recognition of the present invention.As shown in Figure 1, the present embodiment provides a kind of method of data being protected based on iris recognition, and described method comprises the steps: at least
S1 gathers iris information and the iris information that gathers is stored.
S2 when access or service data, carries out the iris letter and gathers identification.
S3 is analyzed the iris information of identification and the iris information of storage.
S4 according to the comparative analysis result, controls access or operation to data.
Below step S1 is elaborated to step S4.
[step S1] gathers iris information and the iris information that gathers stored.
The iris of mankind's eyes is the same with the finger line, unique, can not be in the situation that vision be changed iris feature without having a strong impact on operation, more impossible iris tissue characteristic change with a people must be identical with the feature of certain special object, replaces the iris image of live body all can be tested out with the iris of photo, video recording, corpse.And can obtain the iris digital picture from certain distance, and need not user's contact arrangement, the person is not invaded, thereby easily accepted by the public.Adopt iris recognition to have the identification accuracy the highest, the advantage that recognition speed is the fastest.
Step S1 specifically comprises the steps: as described in Figure 2
Step S11 gathers iris information by the iris capturing device,
In the present embodiment, after gathering iris by the iris capturing device, the iris capturing device is identified the iris that gathers, and iris recognition is the visual properties of iris to be converted to the Iris Code(iris code of 512 bytes), this iris code is stored so that later stage identification is used.The collection of iris and to be identified as prior art disclosed does not repeat them here.
Step S12 preserves the iris information that gathers.
After obtaining iris information, this iris information is stored, after namely gathering iris and obtaining corresponding iris code, iris code is stored.
Step S13 is with the iris information and user name or the corresponding association store of encoding that gathers.In fact, be namely the storage of getting up of the form responding by user name or coding, numbering with iris information and iris owner.Namely know the people of visit data by the identification iris information, like this, logical employing iris recognition makes has the strongest advantage of antifalsification.
After the iris owner's who stores iris information and correspondence user name or coding, follow execution in step S2.
[step S2] carries out the iris letter and gathers identification when access or service data.
After the iris owner's who stores iris information and correspondence user name or coding, before data being conducted interviews or operate, adopt iris recognition to confirm access or service data person's identity.For example, when new files (data), carry out iris capturing identification, determine by gathering iris information whether the people of new files has the authority of new files, when file being checked, deleting or change, gather iris information and determine whether the people who checks, deletes or change file has such authority.Also can carry out iris information collection identification in other when operation to file, to guarantee the authority to file operation, to guarantee the safety of file data.
[step S3] is analyzed the iris information of identification and the iris information of storage.
When access or service data, when access or service data, after carrying out iris letter collection identification, the iris information of identification and the iris information of storage are analyzed, whether the iris information of confirming identification is consistent with the iris information of storage, and the result of output comparative analysis.
[step S4] controls access or operation to data according to the comparative analysis result.
In step S4, after the iris information of identification and the iris information of storage are analyzed, if the iris information of identification and the iris information of storage are complementary, allow access or service data, if fail to obtain the iris information of iris information or identification and the iris information of storage is not mated, disable access or service data.
For example, when setting up new file data, after being complementary, the iris information of confirmation identification and the iris information of storage could input data; If do not scan the iris information of iris information or identification and the iris information of storage is not mated when creating file, system can eject prompting frame, requires iris recognition, but when not obtaining mating consistent enter instruction, can't carry out writing of data; Writing of data is fashionable, and the user name related with iris can be coded in maybe that in the attribute of data, the mode with the author identifies.
In addition, after the iris information of the iris information of confirming identification and storage was complementary, the user can set the operating right to this user when file being made additions and deletions and change the instruction of looking into operation.For example, if within Data Identification carries out the scope of corresponding operating this user, can be to this document executable operations; Otherwise this Data Identification information limits the operation of this moment outside the scope of this user's corresponding operating.Under default situations, only have this talent of author's (being the iris corresponding person) to have additions and deletions to the file of making and change to look into and wait all operations authority, other users to the data of this author's making without any operating right.In addition, in the present invention, processing time, operation behavior, operation user, result can be stored in the mode of daily record.
In step S4, be the further security of protected data, in access or service data process, forbid screenshotss, copy, one or more operations in stickup or drag and drop.
The screenshotss protection is by data are arranged, determine which data does not allow to carry out screenshotss and obtains, can set the identification information of forbidding screenshotss, the file of every message identification is opened, can with the on-screen display (osd) area blackening, also just effective information can't be truncated to during screenshotss; For the file of forbidding the screenshotss identification information is not arranged, normal screenshotss.
Correspondingly; it is by data are arranged equally that stickup copies with the drag and drop protection; determine which data does not allow to paste and copy or drag and drop are obtained; can set to forbid pasting and copy or the identification information of drag and drop; when this document is operated; just can not paste and copy or the operation of drag and drop, effectively protect the security of data.Copy or the data of the identification information of drag and drop for not setting to forbid pasting, when these data are operated, can paste and copy or the operation of drag and drop.
Therefore, but the security of the method general protection data (data) of data being protected based on iris recognition of the present invention.
The second embodiment
See also Fig. 3 to Fig. 4, be shown as structural representation and a kind of preferred structural representation of a kind of system that data is protected based on iris recognition of the present invention.The present embodiment is the method that realizes in the first embodiment; as shown in Figure 3; the present embodiment provides a kind of system that data is protected based on iris recognition, and the described system 1 that data are protected comprises: iris capturing device 11, iris information memory module 12, client 13 and data storage processing module 14.
Described iris capturing device 11 gathers and identifies iris information.In the present embodiment, after gathering iris by iris capturing device 11, the iris of 11 pairs of collections of iris capturing device is identified, iris recognition is the visual properties of iris to be converted to the Iris Code(iris code of 512 bytes), this iris code is stored so that later stage identification is used.The collection of iris and to be identified as prior art disclosed does not repeat them here.
Iris information memory module 12 is connected with described iris capturing device 11, reads iris information and stores this iris information from described iris capturing device 11.After obtaining iris information, 12 pairs of these iris information of iris information memory module are stored, and after namely gathering iris and obtaining corresponding iris code, iris code are stored.
In the present embodiment, particularly, described iris information memory module 12 is with the iris information and user name or the coding corresponding stored that gather.In fact, be namely the storage of getting up of the form responding by user name or coding, numbering with iris information and iris owner.Namely know the people of visit data by the identification iris information, like this, logical employing iris recognition makes has the strongest advantage of antifalsification.
Client 13 is connected with described iris capturing device 11, is used for carrying out data access or operation; Described client 13 is when carrying out data access or operation, and described iris capturing device 11 carries out iris capturing and outputs in client 13.Be client 13 when access or service data, described iris capturing device 11 carries out the iris letter and gathers identification.
After the iris owner's who stores iris information and correspondence user name or coding, before data being conducted interviews or operate, adopt iris recognition to confirm access or service data person's identity.For example, when new files, carry out iris capturing identification, determine by gathering iris information whether the people of newdata has the authority of new files, when file being checked, deleting or change, gather iris information and determine whether the people who checks, deletes or change file has such authority.Also can carry out iris information collection identification in other when operation to file, to guarantee the authority to file operation, to guarantee the safety of file data.
Data storage processing module 14, be connected with described client 13 with described iris information memory module 12 respectively, be used for the storage data, and the iris information of the iris information that reads from described client 13 and 12 storages of described iris information memory module is analyzed, to control access or the operation of 13 pairs of files of client.
When access or service data, when access or service data, after carrying out iris letter collection identification, the iris information of identification and the iris information of storage are analyzed, whether the iris information of confirming identification is consistent with the iris information of storage, and the result of output comparative analysis.
Particularly, in the present embodiment, as shown in Figure 4, described data storage processing module 14 comprises: iris information recognition unit 141, data storage management unit 143, rights management query unit 142 and data protection control module 144.
Iris information recognition unit 141 is connected with described iris information storage unit with described client 13 respectively, and the iris information of the iris information that will read from described client 13 and 12 storages of described iris information memory module is analyzed.
Data storage management unit 143, be connected with described client 13, described iris information recognition unit 141 and described iris information memory module 12 respectively, be used for the storage data and conduct interviews or operate for 13 pairs of data of client, simultaneously according to newly-built, read-write, deletion or the change operation of 13 pairs of data of comparative analysis output control client of described iris information recognition unit 141.
In addition, iris information recognition unit 141 in native system by collecting client 13 iris information and the iris information of iris information memory module 12 compare, result feedback is carried out to client 13, and by data storage management unit 143, processing time, operation behavior, operation user, result are uploaded to iris information memory module 12 in the mode of daily record and preserve.
After described data storage processing module 14 is analyzed the iris information of the iris information in client 13 and storage, if the iris information in client 13 and the iris information of storage are complementary, allow access or service data, do not mate if fail to obtain iris information in iris information or client 13 and the iris information of storage, disable access or service data.
For example, when new document creation, after being complementary, the iris information of confirmation identification and the iris information of storage could input data; If do not scan the iris information of iris information or identification and the iris information of storage is not mated when creating file, system can eject prompting frame, requires iris recognition, but when not obtaining mating consistent enter instruction, can't carry out writing of data; Writing of data is fashionable, and the user name related with iris can be coded in maybe that in the attribute of data, the mode with the author identifies.
Rights management query unit 142 is connected with described iris information recognition unit 141, described data storage management unit 143 and described client 13 respectively, according to the operation that is 13 pairs of files of control of authority client of the corresponding user's setting of described iris information.
After the iris information of the iris information of confirming identification and storage was complementary, the user can set the operating right to this user when data being made additions and deletions and change the instruction of looking into operation.For example, if within Data Identification carries out the scope of corresponding operating this user, can be to this data executable operations; Otherwise this Data Identification information limits the operation of this moment outside the scope of this user's corresponding operating.Under default situations, only have this talent of author's (being the iris corresponding person) to have additions and deletions to the data of making and change to look into and wait all operations authority, other users to the data of this author's making without any operating right.
Data protection control module 144 is connected with described client 13 with described data storage management unit 143, for the protection of data to avoid data to shift.
Particularly, as shown in Figure 5, described data protection control module 144 comprises: the screenshotss protection subelement 1441 that when avoiding data (file) shown, screenshotss shift; Avoid data to be replicated the stickup copy protection subelement 1442 of pasting and shifting; The drag and drop protection subelement 1443 of avoiding data to be shifted by drag and drop.
Screenshotss protection subelement 1441 is by arranging data, determine which data does not allow to carry out screenshotss and obtains, can set the identification information of forbidding screenshotss, the data of every message identification are opened, can with the on-screen display (osd) area blackening, also just effective information can't be truncated to during screenshotss; For the data of forbidding the screenshotss identification information are not arranged, normal screenshotss.
Correspondingly; pasting copy protection subelement 1442 and drag and drop protection subelement 1443 is by data are arranged equally; determine which data does not allow to paste and copy or drag and drop are obtained; can set to forbid pasting and copy or the identification information of drag and drop; when these data are operated; just can not paste and copy or the operation of drag and drop, effectively protect the security of data.Copy or the data of the identification information of drag and drop for not setting to forbid pasting, when these data are operated, can paste and copy or the operation of drag and drop.But so security of system's general protection data of the present invention (data).
In sum, a kind of method and system of data being protected based on iris recognition of the present invention have following beneficial effect:
1, the present invention passes through iris recognition technology, the data that the author who has iris is made identify, and additions and deletions change look into and the transmission of data in carry out effective rights management by iris identification, because native system just carries out management and control to the authority of operation, can not produce data itself and change, can be not huge and affect speed due to the data of encryption and decryption yet, so the present invention is more stable, solved efficiently the problem of data security.
2, the present invention by the sign of data and identification, access rights are controlled, the screenshotss protection, paste copy with the drag and drop protection, etc. function, security that can omnibearing protected data.
So the present invention has effectively overcome various shortcoming of the prior art and the tool high industrial utilization.
Above-described embodiment is illustrative principle of the present invention and effect thereof only, but not is used for restriction the present invention.Any person skilled in the art scholar all can under spirit of the present invention and category, modify or change above-described embodiment.Therefore, have in technical field under such as and know that usually the knowledgeable modifies or changes not breaking away from all equivalences of completing under disclosed spirit and technological thought, must be contained by claim of the present invention.

Claims (10)

1. a method of data being protected based on iris recognition, is characterized in that, comprises the steps:
S1 gathers iris information and the iris information that gathers is stored;
S2 when access or service data, carries out the iris letter and gathers identification;
S3 is analyzed the iris information of identification and the iris information of storage;
S4 according to the comparative analysis result, controls access or operation to data.
2. the method for data being protected based on iris recognition according to claim 1, is characterized in that: in step S1, with iris information and user name or the coding corresponding stored that gathers.
3. the method for data being protected based on iris recognition according to claim 1; it is characterized in that: in step S3; in access or during service data, the iris information of confirming identification is with after the iris information of storage is consistent, and acquisition is accessed or the authority of service data.
4. the method for data being protected based on iris recognition according to claim 1; it is characterized in that: in step S4; after the iris information of identification and the iris information of storage are analyzed; if the iris information of identification and the iris information of storage are complementary; allow access or service data; if fail to obtain the iris information of iris information or identification and the iris information of storage is not mated, disable access or service data.
5. the method for data being protected based on iris recognition according to claim 1 is characterized in that: in step S4, in access or service data process, forbid screenshotss, copy, one or more operations in stickup or drag and drop.
6. a system that data is protected based on iris recognition, is characterized in that, comprising:
The iris capturing device gathers and identifies iris information;
The iris information memory module is connected with described iris capturing device, reads iris information and stores this iris information from described iris capturing device;
Client is connected with described iris capturing device, is used for carrying out data access or operation; Described client is when carrying out data access or operation, and described iris capturing device carries out iris capturing and outputs in client;
The data storage processing module, be connected with described client with described iris information memory module respectively, be used for the storage data, and the iris information of the iris information that reads from described client and the storage of described iris information memory module is analyzed, to control client to access or the operation of data.
7. the system that data is protected based on iris recognition according to claim 6, it is characterized in that: described data storage processing module comprises:
The iris information recognition unit is connected with described iris information storage unit with described client respectively, and the iris information of the iris information that will read from described client and the storage of described iris information memory module is analyzed;
The data storage management unit, be connected with described iris information recognition unit with described client respectively, be used for the storage data and data conducted interviews or operate for client, simultaneously according to newly-built, read-write, deletion or the change operation to data of the comparative analysis output control client of described iris information recognition unit;
The rights management query unit is connected with described iris information recognition unit, described data storage management unit and described client respectively, according to being that the control of authority client set of the corresponding user of described iris information is to the operation of data;
The data protection control module is connected with described client with described data storage management unit, for the protection of data to avoid data to shift.
8. the system that data is protected based on iris recognition according to claim 7, it is characterized in that: described data protection control module comprises:
The screenshotss protection subelement that when avoiding data shown, screenshotss shift;
Avoid data to be replicated the stickup copy protection subelement of pasting and shifting;
The drag and drop protection subelement of avoiding data to be shifted by drag and drop.
9. the system that can protect data based on iris recognition according to claim 6, it is characterized in that: described iris information memory module is with the iris information and user name or the corresponding stored of encoding that gather.
10. the system that can protect data based on iris recognition according to claim 6; it is characterized in that: after described data storage processing module is analyzed the iris information of the iris information in client and storage; if the iris information of the iris information in client and storage is complementary; allow access or service data; do not mate if fail to obtain iris information in iris information or client and the iris information of storage, disable access or service data.
CN201310084586XA 2013-03-15 2013-03-15 Method and system for protecting data based on iris identification Pending CN103177207A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310084586XA CN103177207A (en) 2013-03-15 2013-03-15 Method and system for protecting data based on iris identification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310084586XA CN103177207A (en) 2013-03-15 2013-03-15 Method and system for protecting data based on iris identification

Publications (1)

Publication Number Publication Date
CN103177207A true CN103177207A (en) 2013-06-26

Family

ID=48637054

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310084586XA Pending CN103177207A (en) 2013-03-15 2013-03-15 Method and system for protecting data based on iris identification

Country Status (1)

Country Link
CN (1) CN103177207A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105653856A (en) * 2015-12-29 2016-06-08 欧阳锡伟 Health data acquisition method
CN109446781A (en) * 2018-11-06 2019-03-08 北京无线电计量测试研究所 A kind of iris encryption data storage device and method
CN109583388A (en) * 2018-11-29 2019-04-05 武汉虹识技术有限公司 Data storage cell and system based on iris recognition
CN110222495A (en) * 2019-06-10 2019-09-10 苏州随身玩信息技术有限公司 Identity-based identification carries out the method for explanation triggering, explanation purview certification method
CN111431845A (en) * 2019-05-30 2020-07-17 杭州海康威视数字技术股份有限公司 Method, device and system for recording access log
CN114841631A (en) * 2022-07-06 2022-08-02 山东济宁烟草有限公司 Intelligent management system and method based on digital canteen

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2779485Y (en) * 2005-08-16 2006-05-10 北京捷联浩迪科技有限公司 High-security mobile data storage device
CN102930221A (en) * 2011-08-09 2013-02-13 三星电子(中国)研发中心 Method for protecting data in handheld equipment

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2779485Y (en) * 2005-08-16 2006-05-10 北京捷联浩迪科技有限公司 High-security mobile data storage device
CN102930221A (en) * 2011-08-09 2013-02-13 三星电子(中国)研发中心 Method for protecting data in handheld equipment

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105653856A (en) * 2015-12-29 2016-06-08 欧阳锡伟 Health data acquisition method
CN109446781A (en) * 2018-11-06 2019-03-08 北京无线电计量测试研究所 A kind of iris encryption data storage device and method
CN109583388A (en) * 2018-11-29 2019-04-05 武汉虹识技术有限公司 Data storage cell and system based on iris recognition
CN109583388B (en) * 2018-11-29 2020-10-23 武汉虹识技术有限公司 Data storage unit and system based on iris recognition
CN111431845A (en) * 2019-05-30 2020-07-17 杭州海康威视数字技术股份有限公司 Method, device and system for recording access log
CN111431845B (en) * 2019-05-30 2022-11-04 杭州海康威视数字技术股份有限公司 Method, device and system for recording access log
CN110222495A (en) * 2019-06-10 2019-09-10 苏州随身玩信息技术有限公司 Identity-based identification carries out the method for explanation triggering, explanation purview certification method
CN114841631A (en) * 2022-07-06 2022-08-02 山东济宁烟草有限公司 Intelligent management system and method based on digital canteen

Similar Documents

Publication Publication Date Title
CN102687133B (en) Containerless data for trustworthy computing and data services
CN103177207A (en) Method and system for protecting data based on iris identification
CN107292183A (en) A kind of data processing method and equipment
CN105323064B (en) In on line add instant file dynamic labels, encrypted system and method
TWI528217B (en) A method and system for adding dynamic labels to a file and encrypting the file
US20120317414A1 (en) Method and system for securing documents on a remote shared storage resource
CN107315968A (en) A kind of data processing method and equipment
CN106104562A (en) Safety of secret data stores and recovery system and method
TWI493950B (en) Conditional electric document right management system and method
US20150244778A1 (en) Assembling of Isolated Remote Data
CN104239820A (en) Secure storage device
CN102930194A (en) Data security operating system and method based on authority management and control
CN103455744A (en) Vein identification technology-based data security protection method and system
CN101807195B (en) Information gathering system, terminal unit, program for information gathering, and program for a terminal
AU2020386382B2 (en) Cryptographic key management
CN113779592A (en) Intelligent equipment shear plate data encryption system and method
CN109005196A (en) Data transmission method, data decryption method, device and electronic equipment
CN105187379B (en) Password based on multi-party mutual mistrust splits management method
CN110069907A (en) Big data source tracing method and system based on digital watermarking
Snyder et al. Cloudsweeper: enabling data-centric document management for secure cloud archives
CN102034040A (en) Log implementation method in encryption card
Rifqi et al. Smart blockchain technology in image processing between challenges, transformation and digital-based learning solutions
CN103838986A (en) Multimedia file encryption method and device
Simpson et al. Electronic Record Key Management for Digital Rights Management
Ulybyshev Data Protection in Transit and at Rest with Leakage Detection

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20130626