CN106789017A - Accounts information Explore of Unified Management Ideas based on biological feature encryption - Google Patents

Accounts information Explore of Unified Management Ideas based on biological feature encryption Download PDF

Info

Publication number
CN106789017A
CN106789017A CN201611219710.9A CN201611219710A CN106789017A CN 106789017 A CN106789017 A CN 106789017A CN 201611219710 A CN201611219710 A CN 201611219710A CN 106789017 A CN106789017 A CN 106789017A
Authority
CN
China
Prior art keywords
key
accounts information
user
account
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611219710.9A
Other languages
Chinese (zh)
Inventor
庞辽军
孙宝林
陈炯
赵伟强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN201611219710.9A priority Critical patent/CN106789017A/en
Publication of CN106789017A publication Critical patent/CN106789017A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0877Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a kind of accounts information Explore of Unified Management Ideas based on biological feature encryption, implementing step includes:1st, user account information is obtained;2nd, biological information and key are carried out by binding encryption using fuzzy safety box algorithm;3rd, accounts information clear text file is encrypted using symmetric encipherment algorithm;4th, encryption data and auxiliary information are generated;5th, realize that user account is logged in.The present invention bound user fingerprints feature and user key using fuzzy insurance box technology, and high degree protects user key and finger print safety.Meanwhile, then accounts information clear text file is encrypted by symmetric encipherment algorithm, this dual protection mechanism more ensures the security of user account information.By the inventive method, the integrated management of user account information is realized, while ensureing that accounts information is safe, brought advantage to the user.

Description

Accounts information Explore of Unified Management Ideas based on biological feature encryption
Technical field
The invention belongs to computer security technique field, more particularly to biological feature encryption and account information management method, Can be used for the integrated management of user account information, protect user account information safety.
Background technology
In recent years, with the fast development of current internet, to meet the demand of user's various aspects, various computer ends Using emerging in an endless stream, each user often registers many applications according to oneself demand, hobby.Common computer applications are main Including:E-mail address, Web bank, chat software, shopping website etc..Accompanying problem is that user needs accurately to remember The account name and password of each application, cause the management of account and memory to be inconvenient.And, often there is password typing wrong By mistake, situations such as the mixed note of account name password, forgetting.In addition, user is also possible to by third party when account name and password is input into Spy on, cause the accounts information of user to reveal even property loss.
Regarding to the issue above, there is some key management systems and application program account management side on the market at present Method.
Patent document " a kind of key management system and application that extra large Ke man of great strength's information security technology Co., Ltd applies at it Program account management method " (application number CN201510272185.6, date of application 2015.05.25, publication date 2015.09.23 a kind of key management system and application program account management method are proposed in).The method is connect by using API Mouth is managed collectively the account of application program in the server.The method has main steps that:First, the account of application program is obtained Information is simultaneously preserved to home server;Secondly, the mode that the application program obtains accounts information is changed, passes through application program The server obtains the accounts information;Finally, the application program is run, application program is described by after authentication Application program accesses the server and obtains the accounts information by api interface.The method exist weak point be:The One, Application Authentication is that by way of token authentication, the mode of authentication is more inconvenient;Second, the account of user There is potential safety hazard in family information, the server for having user account information is not effectively protected measure, once the server quilt Attacker is broken through, and the accounts information of user will be caused to be stolen, and the loss that can not be envisioned is brought to user;3rd, this method By strict protection, it is the data encrypted to be exchanged between the application program and the server to the accounts information for preserving, Accounts information in this way it is portable not strong, it is impossible to arbitrarily copy, transplanting accounts information.
Although existing method realizes the function of application program account management to a certain extent, these methods are present Some problems:(1) application program account management does not carry out any safeguard measure or protection in ciphering process to user key The safe class of measure is relatively low, easily steals user account and password by attacker, there is potential safety hazard;(2) application program account Family manages the not portable between different computers.User still needs to re-register account management authority between different computers, causes this Key management system expansion is not strong, lacks flexibility.(3) application program account management needs the identity for carrying out user to test in itself Card, user still needs to log in the account and password of oneself when using the key management system every time, can use the work(of the system Can, made troubles to user.
The content of the invention
The present invention proposes a kind of accounts information Explore of Unified Management Ideas based on biological feature encryption, to solve the account of user Various lengthy and jumbled problem so that user can directly utilize the biological information of oneself in computer end, realizes application account Automatically log in, and on the accounts information foundation for security for ensureing user, also protect the security of user biological characteristic information. Wherein biological characteristic is including fingerprint, face, grasp, iris etc..
Realizing the main thought of this method is:By fuzzy safety box algorithm (i.e. Fuzzy Vault algorithms, referring specifically to Document:Fingerprint-based fuzzy vault:implementation and performance.IEEE Transactions on Information Forensics and Security, 2007,2 (4), pp.744-757) in The key Key bindings that binding algorithm randomly generates biological information UF and user, generation assistance data Helpdata and Safety box data V.Then with key Key as encryption key, using AES E in symmetric encipherment algorithm to accounts information in plain text File F is encrypted, and obtains accounts information cryptograph files CF.By accounts information cryptograph files CF, safety box data V and supplementary number According to Helpdata storages in local disk or user's USB flash disk, and key Key and accounts information clear text file F is destroyed safely.With When family carries out Account Logon, can be according to the above-mentioned encryption information stored in local disk or USB flash disk, with reference to user's own biological feature Realize that the automatic account password of application is obtained and typing.
According to above thinking, of the invention implementing mainly includes following two steps:
(1) the Account Registration stage:
(1a) user selection needs the accounts information for managing, and constitutes accounts information clear text file F;
(1b) user randomly generates key Key, and the biological information UF of user is gathered by physical characteristics collecting instrument, makes With the binding algorithm in fuzzy safety box algorithm, the biological information UF of user and key Key is bound, generate assistance data Helpdata and safety box data V;
(1c) is literary in plain text to accounts information using the AES E in symmetric encipherment algorithm with key Key as encryption key Part F is encrypted, and obtains accounts information cryptograph files CF;
(1d) stores in file Card accounts information cryptograph files CF, safety box data V and assistance data Helpdata In, during file Card is saved in into local disk or user's USB flash disk, meanwhile, destroy key Key and accounts information clear text file F;
(2) account logon phase:
During (2a) User logs in account, the application name SN of the acquisition and account name u of input;
(2b) gathers the biological information UF ' of login user by physical characteristics collecting instrument, is calculated using fuzzy safety box Solution binding algorithm in method, with reference to the information in assistance data Helpdata, key Key is unbinded out from safety box data V;
(2c) is literary to accounts information ciphertext using the decipherment algorithm D in symmetrical decipherment algorithm with key Key as decruption key Part CF is decrypted, and decrypts accounts information clear text file F;
(2d) is according to application name SN and account name u, in inquiry accounts information clear text file F and application name The corresponding account password pw of SN and account name u are claimed to complete Account Logon.
The present invention has the following advantages that compared with prior art:
1.th because user of the invention is in each login application program, and being both needed to checking biological information can pass through Checking, overcomes the problem of Application Authentication inconvenience in the prior art so that this method improves user should in login Convenience during, improves the operating efficiency of user.
2.th is combined user biological feature and user key using fuzzy insurance box technology due to the present invention, is ensured The security of user biological characteristic information, it is to avoid the risk that user biological characteristic information is stolen.Utilize symmetric cryptography simultaneously Algorithm combination user key is encrypted to accounts information plaintext F.Overcome accounts information in the prior art and there is potential safety hazard Problem.So that this double-deck guarantee of fuzzy safety box combination symmetric encipherment algorithm of the invention improves user key information Security, enhance the protection to privacy of user.
3.th only needs to copy the accounts information file Card in disk or USB flash disk due to user of the invention, it is possible to another One computer end, realizes that the automatic of application program logs in using biological characteristic, and need not re-register checking, autgmentability and flexible Property it is stronger, overcome the portable not strong problem of accounts information in existing method.
Brief description of the drawings
Fig. 1 is flow chart of the present invention;
Fig. 2 is the flow chart of registration phase of the present invention;
Fig. 3 is the flow chart of account logon phase of the present invention.
Specific embodiment
The physical significance of the noun being related in the embodiment of the present invention defines as follows.
SN:Application name;
F:Accounts information clear text file;
CF:Accounts information cryptograph files;
Key:Key, for encrypting accounts information clear text file F or decryption accounts information cryptograph files CF;
u:The account name stored in accounts information clear text file F;
pw:The account password stored in accounts information clear text file F;
UF:User biological characteristic information;
UF’:The biological information of the user for resurveying;
V:By obscuring the safety box data that safety box algorithm is generated;
Helpdata:The assistance data of fuzzy safety box generation;
E and D:The AES and decipherment algorithm in symmetric encipherment algorithm are represented respectively, and symmetric encipherment algorithm can be DES, AES etc.;
Card:For the file of store account information cryptograph files CF, safety box data V and assistance data Helpdata;
f:Binding algorithm (Vault encoding) in fuzzy safety box algorithm;
g:Solution in fuzzy safety box algorithm binds algorithm (Vault decoding).
1 couple of present invention is described further below in conjunction with the accompanying drawings.
The present invention includes registration and two stages of Account Logon.
Reference picture 2, is described as follows the step of to registration phase of the present invention.
Step 1, obtains user account information.
1st step, the accounts information clear text file of Structural application program.
User's selection needs the accounts information for managing, and constitutes accounts information clear text file F.Accounts information clear text file Each accounts information in F includes application name SN, the account name u and account password pw of the account.User is writable more The account name and password of individual application program.Assuming that there is n application program, m is included in any application programiIndividual accounts information.Account Family information clear text file F specific configuration forms are as follows:
2nd step, user randomly generates key Key, and gathers user biological characteristic information UF by fingerprint acquisition instrument.Obtain User key Key and biological information UF.Biological characteristic includes any in fingerprint, face, grasp, the iris of human body Kind.
Step 2, using fuzzy safety box algorithm as biological information UF and key Key binding AES.
The key for being randomly generated biological information UF and user using the binding algorithm f in fuzzy safety box algorithm Key is bound, and generates assistance data Helpdata and safety box data V:V=f (UF, Key).
Fuzzy safety box algorithm is a kind of method that utilization biological characteristic is encrypted to information, and it is special by the biology of user Reference breath UF and key Key is bound, the data V after irreversible generation encryption.The algorithm is comprised the concrete steps that:Will The Secret splitting of 128bit is 8 16bit, then according to the inspection data of cipher key calculation crc16,9 data of 16bit is made To obscure the coefficient of safety box constructed fuction.True detail point is brought into fuzzy safety box structure with the characteristic information of addition hash point Make function, the fuzzy safety box of generation.Only when biological information can successful match when, key could be by respective algorithms from mould Extracted in paste safety box.
Safety box algorithm is obscured compared with conventional cryptography mode, the characteristics of convenience with safe, decryption, therefore this reality Example chooses the method that fuzzy safety box algorithm is combined as computer software and hardware information with biological information, common fuzzy guarantor Dangerous case algorithm includes:Fuzzy safety box algorithm based on biological characteristic, the fuzzy safety box algorithm based on recognition of face, based on rainbow Fuzzy safety box algorithm of film identification etc..
Embodiments of the invention using based on biological characteristic fuzzy safety box algorithm as AES, the algorithm referring to Document Fingerprint-based fuzzy vault:implementation and performance.IEEE Transactions on Information Forensics and Security,2007,2(4),pp.744-757.
Step 3, using symmetric encipherment algorithm encryption accounts information clear text file F.
With key Key as encryption key, the AES E in Data Encryption Standard DES symmetric encipherment algorithms is used Accounts information clear text file F is encrypted, accounts information cryptograph files CF is obtained:CF=EKey(F)。
DES algorithms are a kind of symmetric encipherment algorithms, are the data encryptions of the computer system that NBS announces Canonical algorithm, can provide high-quality data protection, prevent the unwarranted leakage of data and unperceived modification, have At a relatively high complexity so that the expense of decoding exceed can obtainable income, while again be applied to different application scene.This hair The DES algorithms of bright embodiment are that the ciphertext output that the plaintext input block of 64 is changed into 64 is fast, and the key for being used is also 64.The algorithm is referring to document:Tsunoo Y,Cryptanalysis of DES Implemented on Computers with Cache.Proc of Ches Springer Lncs,2003,2779:62-76.
Step 4, generates encryption data and auxiliary information.
By accounts information cryptograph files CF, safety box data V and assistance data Helpdata storage in file Card, will File Card is saved in local disk or user's USB flash disk, and key Key and accounts information clear text file F is destroyed safely.
The step of 3 pairs of account logon phases of the present invention of reference picture, is described as follows.
Step 5, the account of user is logged in.
1st step, user opens application program SN, input account name u.When user input password, start account of the invention Family information unification management application program.User may be selected directly to be manually entered code entry, or using biological information identification Log in.If user's selection is manually entered code entry, password can be directly inputted and realize logging in for application, accounts information unification Management application program terminates.If the biological information identification of user's Selection utilization the inventive method is logged in, continue executing with 2nd step.
2nd step, accounts information unified management application program can be inquired about and whether there is corresponding Card in local disk or USB flash disk File, if it does not exist, then prompting user " without correspondence Card files, asking user's registration ";If inquiry is present, continue executing with 3rd step.
3rd step, ejection physical characteristics collecting interface, resurveys the biological information UF ' of user, using fuzzy insurance Solution binding algorithm in case algorithm, with reference to the information in assistance data Helpdata, key is unbinded out from safety box data V Key:Key=g (V).
4th step, with key Key as decruption key, using the decipherment algorithm D in symmetric encipherment algorithm to accounts information ciphertext File CF is decrypted, and decrypts accounts information clear text file F:F=DKey(CF)。
5th step, according to application name SN, the application name in inquiry accounts information clear text file F, if it does not, Prompting user " not adding this application, ask user to be manually entered code entry " simultaneously returns to input code entry interface;If deposited Then continuing executing with the 6th step.
6th step, the account name u according to user input, corresponding account name in inquiry accounts information clear text file F, if Do not exist, point out user's " applying account information without this, ask user to be manually entered code entry " and return to input code entry circle Face;If it is present the password pw of corresponding account is taken out, and Auto-writing password pw, complete Account Logon.
7th step, key Key and accounts information clear text file F is destroyed safely.
Accounts information of the present invention can be modification.User can as needed change the account in accounts information clear text file F Number and encrypted message, such as the addition of new account, the deletion of existing account and password change, and what accounts information was changed implements It is as follows:
1st step, whether there is corresponding Card files in judging local disk or USB flash disk using the 2nd step of step 5;Repeat The 3rd step card user fingerprints information of step 5, and unbind out key Key from safety box data V;4th step of repeat step 5 Obtain accounts information clear text file F.
2nd step, user changes accounts information clear text file F as needed.
3rd step, assistance data and safety box data are generated using step 2;Accounts information ciphertext text is obtained using step 3 Part CF;New encryption data and auxiliary information is generated using step 4.New encryption data and auxiliary information storage are arrived into file In Card, and file Card is saved in local disk or user's USB flash disk, completes the modification of accounts information.
4th step, by key Key, original and renewal accounts information clear text file F, all safety is destroyed.
Accounts information Explore of Unified Management Ideas based on biological feature encryption of the present invention, is not limited in specification Description.All any modifications within the spirit and principles in the present invention, made, equal replacement, improvement etc., are all contained in this hair Within bright right.

Claims (3)

1. a kind of accounts information Explore of Unified Management Ideas based on biological feature encryption, comprises the following steps:
(1) the Account Registration stage:
(1a) user selection needs the accounts information for managing, and constitutes accounts information clear text file F;
(1b) user randomly generates key Key, and the biological information UF of user is gathered by physical characteristics collecting instrument, uses mould Binding algorithm in paste safety box algorithm, the biological information UF of user and key Key is bound, and generates assistance data Helpdata and safety box data V;
(1c) with key Key as encryption key, using the AES E in symmetric encipherment algorithm to accounts information clear text file F It is encrypted, obtains accounts information cryptograph files CF;
(1d) stores in file Card accounts information cryptograph files CF, safety box data V and assistance data Helpdata, will File Card is saved in local computer, meanwhile, destroy key Key and accounts information clear text file F;
(2) account logon phase:
During (2a) User logs in account, the application name SN of the acquisition and account name u of input;
(2b) gathers the biological information UF ' of login user by physical characteristics collecting instrument, using in fuzzy safety box algorithm Solution binding algorithm, with reference to the information in assistance data Helpdata, key Key is unbinded out from safety box data V;
(2c) with key Key as decruption key, using the decipherment algorithm D in symmetrical decipherment algorithm to accounts information cryptograph files CF It is decrypted, decrypts accounts information clear text file F;
(2d) is according to application name SN and account name u, in inquiry accounts information clear text file F and application name SN Account password pw corresponding with account name u completes Account Logon.
2. the accounts information Explore of Unified Management Ideas based on biological feature encryption according to claim 1, it is characterised in that:Step Suddenly each accounts information in the accounts information clear text file F described in (1a) includes application name SN, the account of the account Name in an account book u and account password pw;The account name and password of the writable multiple application programs of user.
3. the accounts information Explore of Unified Management Ideas based on biological feature encryption according to claim 1, it is characterised in that:Step Suddenly the local computer described in (1a) is local disk or user's USB flash disk.
CN201611219710.9A 2016-12-26 2016-12-26 Accounts information Explore of Unified Management Ideas based on biological feature encryption Pending CN106789017A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611219710.9A CN106789017A (en) 2016-12-26 2016-12-26 Accounts information Explore of Unified Management Ideas based on biological feature encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611219710.9A CN106789017A (en) 2016-12-26 2016-12-26 Accounts information Explore of Unified Management Ideas based on biological feature encryption

Publications (1)

Publication Number Publication Date
CN106789017A true CN106789017A (en) 2017-05-31

Family

ID=58926296

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611219710.9A Pending CN106789017A (en) 2016-12-26 2016-12-26 Accounts information Explore of Unified Management Ideas based on biological feature encryption

Country Status (1)

Country Link
CN (1) CN106789017A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108960039A (en) * 2018-05-07 2018-12-07 西安电子科技大学 A kind of irreversible fingerprint template encryption method based on symmetrical hash
CN109005158A (en) * 2018-07-10 2018-12-14 成都理工大学 Dynamic gesture Verification System and its authentication method based on fuzzy safety box
WO2019036967A1 (en) * 2017-08-23 2019-02-28 深圳市优品壹电子有限公司 Device having data backup function and product related thereto
CN110909336A (en) * 2019-12-20 2020-03-24 上海爱信诺航芯电子科技有限公司 Password management method and device based on fingerprint USB flash disk

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101815291A (en) * 2010-03-22 2010-08-25 中兴通讯股份有限公司 Method and system for logging on client automatically

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101815291A (en) * 2010-03-22 2010-08-25 中兴通讯股份有限公司 Method and system for logging on client automatically

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
张镕麟等: "改进的可撤销指纹Fuzzy Vault方案", 《西安电子科技大学学报》 *
李芬等: "基于Fuzzy Vault的身份认证", 《武汉理工大学学报》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019036967A1 (en) * 2017-08-23 2019-02-28 深圳市优品壹电子有限公司 Device having data backup function and product related thereto
CN108960039A (en) * 2018-05-07 2018-12-07 西安电子科技大学 A kind of irreversible fingerprint template encryption method based on symmetrical hash
CN108960039B (en) * 2018-05-07 2021-08-06 西安电子科技大学 Irreversible fingerprint template encryption method based on symmetric hash
CN109005158A (en) * 2018-07-10 2018-12-14 成都理工大学 Dynamic gesture Verification System and its authentication method based on fuzzy safety box
CN110909336A (en) * 2019-12-20 2020-03-24 上海爱信诺航芯电子科技有限公司 Password management method and device based on fingerprint USB flash disk
CN110909336B (en) * 2019-12-20 2023-11-14 上海航芯电子科技股份有限公司 Password management method and device based on fingerprint USB flash disk

Similar Documents

Publication Publication Date Title
JP3230238U (en) A system for securely storing electronic data
US20190311148A1 (en) System and method for secure storage of electronic material
JP5470344B2 (en) User authentication methods and related architectures based on the use of biometric identification technology
US9288044B2 (en) Method for providing cryptographic key pairs
TWI486045B (en) Method and system for on-screen authentication using secret visual message
KR20190075793A (en) Authentication System for Providing Instant Access Using Block Chain
JP2007013433A (en) Method for transmitting/receiving encrypted data and information processing system
US20100098246A1 (en) Smart card based encryption key and password generation and management
US11265175B2 (en) Apparatus and method for providing authentication, non-repudiation, governed access and twin resolution for data utilizing a data control signature
US20220014367A1 (en) Decentralized computing systems and methods for performing actions using stored private data
CN103236930A (en) Data encryption method and system
CN106789017A (en) Accounts information Explore of Unified Management Ideas based on biological feature encryption
Chen et al. A novel DRM scheme for accommodating expectations of personal use
AU2021266356A1 (en) Improved Storage System
TWI476629B (en) Data security and security systems and methods
AU2018100503A4 (en) Split data/split storage
JP2000188594A (en) Authentication system, fingerprint collation device and authentication method
JP2011514060A (en) System for controlled data exchange between at least two data carriers via mobile read / write memory
TW200836118A (en) User authentication method, system and computer system with atm ic-card system
Magdum et al. A secure data transfer algorithm for USB mass storage devices to protect documents
JP5361850B2 (en) Access management system
Priya et al. Securing data on the cloud server by the user authentication and data security techniques
Alrashidi et al. A Framework and Cryptography Algorithm for Protecting Sensitive Data on Cloud Service Providers
Hussain et al. A smart card based security extension for the bitcoin wallets
Rathnavibhushana et al. A Social Wallet Scheme with Robust Private Key Recovery

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170531

RJ01 Rejection of invention patent application after publication