CN106789017A - Accounts information Explore of Unified Management Ideas based on biological feature encryption - Google Patents
Accounts information Explore of Unified Management Ideas based on biological feature encryption Download PDFInfo
- Publication number
- CN106789017A CN106789017A CN201611219710.9A CN201611219710A CN106789017A CN 106789017 A CN106789017 A CN 106789017A CN 201611219710 A CN201611219710 A CN 201611219710A CN 106789017 A CN106789017 A CN 106789017A
- Authority
- CN
- China
- Prior art keywords
- key
- accounts information
- user
- account
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0877—Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Storage Device Security (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention discloses a kind of accounts information Explore of Unified Management Ideas based on biological feature encryption, implementing step includes:1st, user account information is obtained;2nd, biological information and key are carried out by binding encryption using fuzzy safety box algorithm;3rd, accounts information clear text file is encrypted using symmetric encipherment algorithm;4th, encryption data and auxiliary information are generated;5th, realize that user account is logged in.The present invention bound user fingerprints feature and user key using fuzzy insurance box technology, and high degree protects user key and finger print safety.Meanwhile, then accounts information clear text file is encrypted by symmetric encipherment algorithm, this dual protection mechanism more ensures the security of user account information.By the inventive method, the integrated management of user account information is realized, while ensureing that accounts information is safe, brought advantage to the user.
Description
Technical field
The invention belongs to computer security technique field, more particularly to biological feature encryption and account information management method,
Can be used for the integrated management of user account information, protect user account information safety.
Background technology
In recent years, with the fast development of current internet, to meet the demand of user's various aspects, various computer ends
Using emerging in an endless stream, each user often registers many applications according to oneself demand, hobby.Common computer applications are main
Including:E-mail address, Web bank, chat software, shopping website etc..Accompanying problem is that user needs accurately to remember
The account name and password of each application, cause the management of account and memory to be inconvenient.And, often there is password typing wrong
By mistake, situations such as the mixed note of account name password, forgetting.In addition, user is also possible to by third party when account name and password is input into
Spy on, cause the accounts information of user to reveal even property loss.
Regarding to the issue above, there is some key management systems and application program account management side on the market at present
Method.
Patent document " a kind of key management system and application that extra large Ke man of great strength's information security technology Co., Ltd applies at it
Program account management method " (application number CN201510272185.6, date of application 2015.05.25, publication date
2015.09.23 a kind of key management system and application program account management method are proposed in).The method is connect by using API
Mouth is managed collectively the account of application program in the server.The method has main steps that:First, the account of application program is obtained
Information is simultaneously preserved to home server;Secondly, the mode that the application program obtains accounts information is changed, passes through application program
The server obtains the accounts information;Finally, the application program is run, application program is described by after authentication
Application program accesses the server and obtains the accounts information by api interface.The method exist weak point be:The
One, Application Authentication is that by way of token authentication, the mode of authentication is more inconvenient;Second, the account of user
There is potential safety hazard in family information, the server for having user account information is not effectively protected measure, once the server quilt
Attacker is broken through, and the accounts information of user will be caused to be stolen, and the loss that can not be envisioned is brought to user;3rd, this method
By strict protection, it is the data encrypted to be exchanged between the application program and the server to the accounts information for preserving,
Accounts information in this way it is portable not strong, it is impossible to arbitrarily copy, transplanting accounts information.
Although existing method realizes the function of application program account management to a certain extent, these methods are present
Some problems:(1) application program account management does not carry out any safeguard measure or protection in ciphering process to user key
The safe class of measure is relatively low, easily steals user account and password by attacker, there is potential safety hazard;(2) application program account
Family manages the not portable between different computers.User still needs to re-register account management authority between different computers, causes this
Key management system expansion is not strong, lacks flexibility.(3) application program account management needs the identity for carrying out user to test in itself
Card, user still needs to log in the account and password of oneself when using the key management system every time, can use the work(of the system
Can, made troubles to user.
The content of the invention
The present invention proposes a kind of accounts information Explore of Unified Management Ideas based on biological feature encryption, to solve the account of user
Various lengthy and jumbled problem so that user can directly utilize the biological information of oneself in computer end, realizes application account
Automatically log in, and on the accounts information foundation for security for ensureing user, also protect the security of user biological characteristic information.
Wherein biological characteristic is including fingerprint, face, grasp, iris etc..
Realizing the main thought of this method is:By fuzzy safety box algorithm (i.e. Fuzzy Vault algorithms, referring specifically to
Document:Fingerprint-based fuzzy vault:implementation and performance.IEEE
Transactions on Information Forensics and Security, 2007,2 (4), pp.744-757) in
The key Key bindings that binding algorithm randomly generates biological information UF and user, generation assistance data Helpdata and
Safety box data V.Then with key Key as encryption key, using AES E in symmetric encipherment algorithm to accounts information in plain text
File F is encrypted, and obtains accounts information cryptograph files CF.By accounts information cryptograph files CF, safety box data V and supplementary number
According to Helpdata storages in local disk or user's USB flash disk, and key Key and accounts information clear text file F is destroyed safely.With
When family carries out Account Logon, can be according to the above-mentioned encryption information stored in local disk or USB flash disk, with reference to user's own biological feature
Realize that the automatic account password of application is obtained and typing.
According to above thinking, of the invention implementing mainly includes following two steps:
(1) the Account Registration stage:
(1a) user selection needs the accounts information for managing, and constitutes accounts information clear text file F;
(1b) user randomly generates key Key, and the biological information UF of user is gathered by physical characteristics collecting instrument, makes
With the binding algorithm in fuzzy safety box algorithm, the biological information UF of user and key Key is bound, generate assistance data
Helpdata and safety box data V;
(1c) is literary in plain text to accounts information using the AES E in symmetric encipherment algorithm with key Key as encryption key
Part F is encrypted, and obtains accounts information cryptograph files CF;
(1d) stores in file Card accounts information cryptograph files CF, safety box data V and assistance data Helpdata
In, during file Card is saved in into local disk or user's USB flash disk, meanwhile, destroy key Key and accounts information clear text file F;
(2) account logon phase:
During (2a) User logs in account, the application name SN of the acquisition and account name u of input;
(2b) gathers the biological information UF ' of login user by physical characteristics collecting instrument, is calculated using fuzzy safety box
Solution binding algorithm in method, with reference to the information in assistance data Helpdata, key Key is unbinded out from safety box data V;
(2c) is literary to accounts information ciphertext using the decipherment algorithm D in symmetrical decipherment algorithm with key Key as decruption key
Part CF is decrypted, and decrypts accounts information clear text file F;
(2d) is according to application name SN and account name u, in inquiry accounts information clear text file F and application name
The corresponding account password pw of SN and account name u are claimed to complete Account Logon.
The present invention has the following advantages that compared with prior art:
1.th because user of the invention is in each login application program, and being both needed to checking biological information can pass through
Checking, overcomes the problem of Application Authentication inconvenience in the prior art so that this method improves user should in login
Convenience during, improves the operating efficiency of user.
2.th is combined user biological feature and user key using fuzzy insurance box technology due to the present invention, is ensured
The security of user biological characteristic information, it is to avoid the risk that user biological characteristic information is stolen.Utilize symmetric cryptography simultaneously
Algorithm combination user key is encrypted to accounts information plaintext F.Overcome accounts information in the prior art and there is potential safety hazard
Problem.So that this double-deck guarantee of fuzzy safety box combination symmetric encipherment algorithm of the invention improves user key information
Security, enhance the protection to privacy of user.
3.th only needs to copy the accounts information file Card in disk or USB flash disk due to user of the invention, it is possible to another
One computer end, realizes that the automatic of application program logs in using biological characteristic, and need not re-register checking, autgmentability and flexible
Property it is stronger, overcome the portable not strong problem of accounts information in existing method.
Brief description of the drawings
Fig. 1 is flow chart of the present invention;
Fig. 2 is the flow chart of registration phase of the present invention;
Fig. 3 is the flow chart of account logon phase of the present invention.
Specific embodiment
The physical significance of the noun being related in the embodiment of the present invention defines as follows.
SN:Application name;
F:Accounts information clear text file;
CF:Accounts information cryptograph files;
Key:Key, for encrypting accounts information clear text file F or decryption accounts information cryptograph files CF;
u:The account name stored in accounts information clear text file F;
pw:The account password stored in accounts information clear text file F;
UF:User biological characteristic information;
UF’:The biological information of the user for resurveying;
V:By obscuring the safety box data that safety box algorithm is generated;
Helpdata:The assistance data of fuzzy safety box generation;
E and D:The AES and decipherment algorithm in symmetric encipherment algorithm are represented respectively, and symmetric encipherment algorithm can be
DES, AES etc.;
Card:For the file of store account information cryptograph files CF, safety box data V and assistance data Helpdata;
f:Binding algorithm (Vault encoding) in fuzzy safety box algorithm;
g:Solution in fuzzy safety box algorithm binds algorithm (Vault decoding).
1 couple of present invention is described further below in conjunction with the accompanying drawings.
The present invention includes registration and two stages of Account Logon.
Reference picture 2, is described as follows the step of to registration phase of the present invention.
Step 1, obtains user account information.
1st step, the accounts information clear text file of Structural application program.
User's selection needs the accounts information for managing, and constitutes accounts information clear text file F.Accounts information clear text file
Each accounts information in F includes application name SN, the account name u and account password pw of the account.User is writable more
The account name and password of individual application program.Assuming that there is n application program, m is included in any application programiIndividual accounts information.Account
Family information clear text file F specific configuration forms are as follows:
2nd step, user randomly generates key Key, and gathers user biological characteristic information UF by fingerprint acquisition instrument.Obtain
User key Key and biological information UF.Biological characteristic includes any in fingerprint, face, grasp, the iris of human body
Kind.
Step 2, using fuzzy safety box algorithm as biological information UF and key Key binding AES.
The key for being randomly generated biological information UF and user using the binding algorithm f in fuzzy safety box algorithm
Key is bound, and generates assistance data Helpdata and safety box data V:V=f (UF, Key).
Fuzzy safety box algorithm is a kind of method that utilization biological characteristic is encrypted to information, and it is special by the biology of user
Reference breath UF and key Key is bound, the data V after irreversible generation encryption.The algorithm is comprised the concrete steps that:Will
The Secret splitting of 128bit is 8 16bit, then according to the inspection data of cipher key calculation crc16,9 data of 16bit is made
To obscure the coefficient of safety box constructed fuction.True detail point is brought into fuzzy safety box structure with the characteristic information of addition hash point
Make function, the fuzzy safety box of generation.Only when biological information can successful match when, key could be by respective algorithms from mould
Extracted in paste safety box.
Safety box algorithm is obscured compared with conventional cryptography mode, the characteristics of convenience with safe, decryption, therefore this reality
Example chooses the method that fuzzy safety box algorithm is combined as computer software and hardware information with biological information, common fuzzy guarantor
Dangerous case algorithm includes:Fuzzy safety box algorithm based on biological characteristic, the fuzzy safety box algorithm based on recognition of face, based on rainbow
Fuzzy safety box algorithm of film identification etc..
Embodiments of the invention using based on biological characteristic fuzzy safety box algorithm as AES, the algorithm referring to
Document Fingerprint-based fuzzy vault:implementation and performance.IEEE
Transactions on Information Forensics and Security,2007,2(4),pp.744-757.
Step 3, using symmetric encipherment algorithm encryption accounts information clear text file F.
With key Key as encryption key, the AES E in Data Encryption Standard DES symmetric encipherment algorithms is used
Accounts information clear text file F is encrypted, accounts information cryptograph files CF is obtained:CF=EKey(F)。
DES algorithms are a kind of symmetric encipherment algorithms, are the data encryptions of the computer system that NBS announces
Canonical algorithm, can provide high-quality data protection, prevent the unwarranted leakage of data and unperceived modification, have
At a relatively high complexity so that the expense of decoding exceed can obtainable income, while again be applied to different application scene.This hair
The DES algorithms of bright embodiment are that the ciphertext output that the plaintext input block of 64 is changed into 64 is fast, and the key for being used is also
64.The algorithm is referring to document:Tsunoo Y,Cryptanalysis of DES Implemented on Computers
with Cache.Proc of Ches Springer Lncs,2003,2779:62-76.
Step 4, generates encryption data and auxiliary information.
By accounts information cryptograph files CF, safety box data V and assistance data Helpdata storage in file Card, will
File Card is saved in local disk or user's USB flash disk, and key Key and accounts information clear text file F is destroyed safely.
The step of 3 pairs of account logon phases of the present invention of reference picture, is described as follows.
Step 5, the account of user is logged in.
1st step, user opens application program SN, input account name u.When user input password, start account of the invention
Family information unification management application program.User may be selected directly to be manually entered code entry, or using biological information identification
Log in.If user's selection is manually entered code entry, password can be directly inputted and realize logging in for application, accounts information unification
Management application program terminates.If the biological information identification of user's Selection utilization the inventive method is logged in, continue executing with
2nd step.
2nd step, accounts information unified management application program can be inquired about and whether there is corresponding Card in local disk or USB flash disk
File, if it does not exist, then prompting user " without correspondence Card files, asking user's registration ";If inquiry is present, continue executing with
3rd step.
3rd step, ejection physical characteristics collecting interface, resurveys the biological information UF ' of user, using fuzzy insurance
Solution binding algorithm in case algorithm, with reference to the information in assistance data Helpdata, key is unbinded out from safety box data V
Key:Key=g (V).
4th step, with key Key as decruption key, using the decipherment algorithm D in symmetric encipherment algorithm to accounts information ciphertext
File CF is decrypted, and decrypts accounts information clear text file F:F=DKey(CF)。
5th step, according to application name SN, the application name in inquiry accounts information clear text file F, if it does not,
Prompting user " not adding this application, ask user to be manually entered code entry " simultaneously returns to input code entry interface;If deposited
Then continuing executing with the 6th step.
6th step, the account name u according to user input, corresponding account name in inquiry accounts information clear text file F, if
Do not exist, point out user's " applying account information without this, ask user to be manually entered code entry " and return to input code entry circle
Face;If it is present the password pw of corresponding account is taken out, and Auto-writing password pw, complete Account Logon.
7th step, key Key and accounts information clear text file F is destroyed safely.
Accounts information of the present invention can be modification.User can as needed change the account in accounts information clear text file F
Number and encrypted message, such as the addition of new account, the deletion of existing account and password change, and what accounts information was changed implements
It is as follows:
1st step, whether there is corresponding Card files in judging local disk or USB flash disk using the 2nd step of step 5;Repeat
The 3rd step card user fingerprints information of step 5, and unbind out key Key from safety box data V;4th step of repeat step 5
Obtain accounts information clear text file F.
2nd step, user changes accounts information clear text file F as needed.
3rd step, assistance data and safety box data are generated using step 2;Accounts information ciphertext text is obtained using step 3
Part CF;New encryption data and auxiliary information is generated using step 4.New encryption data and auxiliary information storage are arrived into file
In Card, and file Card is saved in local disk or user's USB flash disk, completes the modification of accounts information.
4th step, by key Key, original and renewal accounts information clear text file F, all safety is destroyed.
Accounts information Explore of Unified Management Ideas based on biological feature encryption of the present invention, is not limited in specification
Description.All any modifications within the spirit and principles in the present invention, made, equal replacement, improvement etc., are all contained in this hair
Within bright right.
Claims (3)
1. a kind of accounts information Explore of Unified Management Ideas based on biological feature encryption, comprises the following steps:
(1) the Account Registration stage:
(1a) user selection needs the accounts information for managing, and constitutes accounts information clear text file F;
(1b) user randomly generates key Key, and the biological information UF of user is gathered by physical characteristics collecting instrument, uses mould
Binding algorithm in paste safety box algorithm, the biological information UF of user and key Key is bound, and generates assistance data
Helpdata and safety box data V;
(1c) with key Key as encryption key, using the AES E in symmetric encipherment algorithm to accounts information clear text file F
It is encrypted, obtains accounts information cryptograph files CF;
(1d) stores in file Card accounts information cryptograph files CF, safety box data V and assistance data Helpdata, will
File Card is saved in local computer, meanwhile, destroy key Key and accounts information clear text file F;
(2) account logon phase:
During (2a) User logs in account, the application name SN of the acquisition and account name u of input;
(2b) gathers the biological information UF ' of login user by physical characteristics collecting instrument, using in fuzzy safety box algorithm
Solution binding algorithm, with reference to the information in assistance data Helpdata, key Key is unbinded out from safety box data V;
(2c) with key Key as decruption key, using the decipherment algorithm D in symmetrical decipherment algorithm to accounts information cryptograph files CF
It is decrypted, decrypts accounts information clear text file F;
(2d) is according to application name SN and account name u, in inquiry accounts information clear text file F and application name SN
Account password pw corresponding with account name u completes Account Logon.
2. the accounts information Explore of Unified Management Ideas based on biological feature encryption according to claim 1, it is characterised in that:Step
Suddenly each accounts information in the accounts information clear text file F described in (1a) includes application name SN, the account of the account
Name in an account book u and account password pw;The account name and password of the writable multiple application programs of user.
3. the accounts information Explore of Unified Management Ideas based on biological feature encryption according to claim 1, it is characterised in that:Step
Suddenly the local computer described in (1a) is local disk or user's USB flash disk.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611219710.9A CN106789017A (en) | 2016-12-26 | 2016-12-26 | Accounts information Explore of Unified Management Ideas based on biological feature encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611219710.9A CN106789017A (en) | 2016-12-26 | 2016-12-26 | Accounts information Explore of Unified Management Ideas based on biological feature encryption |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106789017A true CN106789017A (en) | 2017-05-31 |
Family
ID=58926296
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611219710.9A Pending CN106789017A (en) | 2016-12-26 | 2016-12-26 | Accounts information Explore of Unified Management Ideas based on biological feature encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106789017A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108960039A (en) * | 2018-05-07 | 2018-12-07 | 西安电子科技大学 | A kind of irreversible fingerprint template encryption method based on symmetrical hash |
CN109005158A (en) * | 2018-07-10 | 2018-12-14 | 成都理工大学 | Dynamic gesture Verification System and its authentication method based on fuzzy safety box |
WO2019036967A1 (en) * | 2017-08-23 | 2019-02-28 | 深圳市优品壹电子有限公司 | Device having data backup function and product related thereto |
CN110909336A (en) * | 2019-12-20 | 2020-03-24 | 上海爱信诺航芯电子科技有限公司 | Password management method and device based on fingerprint USB flash disk |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101815291A (en) * | 2010-03-22 | 2010-08-25 | 中兴通讯股份有限公司 | Method and system for logging on client automatically |
-
2016
- 2016-12-26 CN CN201611219710.9A patent/CN106789017A/en active Pending
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101815291A (en) * | 2010-03-22 | 2010-08-25 | 中兴通讯股份有限公司 | Method and system for logging on client automatically |
Non-Patent Citations (2)
Title |
---|
张镕麟等: "改进的可撤销指纹Fuzzy Vault方案", 《西安电子科技大学学报》 * |
李芬等: "基于Fuzzy Vault的身份认证", 《武汉理工大学学报》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019036967A1 (en) * | 2017-08-23 | 2019-02-28 | 深圳市优品壹电子有限公司 | Device having data backup function and product related thereto |
CN108960039A (en) * | 2018-05-07 | 2018-12-07 | 西安电子科技大学 | A kind of irreversible fingerprint template encryption method based on symmetrical hash |
CN108960039B (en) * | 2018-05-07 | 2021-08-06 | 西安电子科技大学 | Irreversible fingerprint template encryption method based on symmetric hash |
CN109005158A (en) * | 2018-07-10 | 2018-12-14 | 成都理工大学 | Dynamic gesture Verification System and its authentication method based on fuzzy safety box |
CN110909336A (en) * | 2019-12-20 | 2020-03-24 | 上海爱信诺航芯电子科技有限公司 | Password management method and device based on fingerprint USB flash disk |
CN110909336B (en) * | 2019-12-20 | 2023-11-14 | 上海航芯电子科技股份有限公司 | Password management method and device based on fingerprint USB flash disk |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP3230238U (en) | A system for securely storing electronic data | |
US20190311148A1 (en) | System and method for secure storage of electronic material | |
JP5470344B2 (en) | User authentication methods and related architectures based on the use of biometric identification technology | |
US9288044B2 (en) | Method for providing cryptographic key pairs | |
TWI486045B (en) | Method and system for on-screen authentication using secret visual message | |
KR20190075793A (en) | Authentication System for Providing Instant Access Using Block Chain | |
JP2007013433A (en) | Method for transmitting/receiving encrypted data and information processing system | |
US20100098246A1 (en) | Smart card based encryption key and password generation and management | |
US11265175B2 (en) | Apparatus and method for providing authentication, non-repudiation, governed access and twin resolution for data utilizing a data control signature | |
US20220014367A1 (en) | Decentralized computing systems and methods for performing actions using stored private data | |
CN103236930A (en) | Data encryption method and system | |
CN106789017A (en) | Accounts information Explore of Unified Management Ideas based on biological feature encryption | |
Chen et al. | A novel DRM scheme for accommodating expectations of personal use | |
AU2021266356A1 (en) | Improved Storage System | |
TWI476629B (en) | Data security and security systems and methods | |
AU2018100503A4 (en) | Split data/split storage | |
JP2000188594A (en) | Authentication system, fingerprint collation device and authentication method | |
JP2011514060A (en) | System for controlled data exchange between at least two data carriers via mobile read / write memory | |
TW200836118A (en) | User authentication method, system and computer system with atm ic-card system | |
Magdum et al. | A secure data transfer algorithm for USB mass storage devices to protect documents | |
JP5361850B2 (en) | Access management system | |
Priya et al. | Securing data on the cloud server by the user authentication and data security techniques | |
Alrashidi et al. | A Framework and Cryptography Algorithm for Protecting Sensitive Data on Cloud Service Providers | |
Hussain et al. | A smart card based security extension for the bitcoin wallets | |
Rathnavibhushana et al. | A Social Wallet Scheme with Robust Private Key Recovery |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170531 |
|
RJ01 | Rejection of invention patent application after publication |