CN109446781A - A kind of iris encryption data storage device and method - Google Patents
A kind of iris encryption data storage device and method Download PDFInfo
- Publication number
- CN109446781A CN109446781A CN201811310498.6A CN201811310498A CN109446781A CN 109446781 A CN109446781 A CN 109446781A CN 201811310498 A CN201811310498 A CN 201811310498A CN 109446781 A CN109446781 A CN 109446781A
- Authority
- CN
- China
- Prior art keywords
- iris
- user
- information
- module
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Automation & Control Theory (AREA)
- Databases & Information Systems (AREA)
- Collating Specific Patterns (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
Abstract
The application discloses a kind of iris encryption data storage device and method, solves the problems, such as that current data storage device safety is high, poor user experience.The device of the application includes: camera, acquisition module, iris database, authentication module, module for reading and writing, document data bank, user interface.The present processes, the iris information obtained by iris capturing are compared with pre-stored iris information.Iris information is identical, then permits the storage and reading of user data.The present invention is encrypted using the data that iris recognition technology stores data storage device, it is ensured that personal data are perfectly safe.
Description
Technical field
This application involves field of data storage more particularly to a kind of iris encryption data storage device and methods.
Background technique
With the continuous development of information technology, office progresses into " with no paper " epoch, the various numbers that everyone is possessed
It is also more and more according to, data.Including the key message of business secret, the sensitive information comprising individual privacy, these information
It is required to reliably and securely store, once immeasurable loss will be caused to user by losing.
For data storage device, traditional encryption method has password, fingerprint etc..And there is easy to be lost, forgettings for password
The disadvantages of.The problems such as then there is fingerprint film imitation in fingerprint, finger wear is not easy to identify.Iris recognition technology is with its accuracy, non-
The inherent characteristics such as contact, In vivo detection, the shortcomings that overcoming other biological identification technologies, while specific other bio-identification skills
The advantages of art, market potential are huge.Therefore, data storage device is encrypted using iris recognition technology, was both ensure that
Data are perfectly safe, while also not influencing user experience.
Summary of the invention
The application provides a kind of iris encryption data storage device and method, solves current data storage device safety
The problem of not high, poor user experience.
Embodiments herein proposes a kind of iris encryption data storage method, includes the steps that encrypting and the step of decryption
Suddenly.
The step of encryption includes: that iris information is stored in iris database;Forbid storing and reading number of users
According to.
The step of decryption includes: acquisition iris information, and the information saved with iris database compares;If rainbow
Film information is identical, then permits to store and read user data;If iris information is different, forbid storing and reading number of users
According to.
The embodiment of the application method optimization further includes following steps: if user reaches setting using the time
The step of limiting, being then again introduced into the decryption.
The embodiment of the application method optimization further includes following steps: if user inputs character quantity reaches limitation
The step of being worth, being then again introduced into the decryption.
The embodiment of the application method optimization further includes following steps: if user's operation interval is more than setting
The step of growing, being then again introduced into the decryption.
The embodiment of the application method optimization further includes following steps: the iris information and iris database of acquisition are protected
Same number does not reach setting numerical value for the information comparison deposited, then user data is emptied.
Embodiments herein also proposes a kind of iris encryption data storage device, includes camera, acquisition module, iris
Database, authentication module, module for reading and writing, document data bank, user interface.The acquisition module, for controlling camera,
The image data of camera output is received, iris information is extracted.The authentication module, user instruction, compares iris for identification
The information that information and iris database save, starting and closing module for reading and writing.The module for reading and writing, for visiting according to user instructions
Ask document data bank, storage and reading user data.The user interface, it is described comprising input module and display module
Input module is for inputting user instruction.The display module is for showing user data.
The embodiment of the present application also provides a kind of iris encryption data storage method, for the application any one embodiment
Device, comprising the following steps:
The user interface receives user instructions;
The authentication module identifies user instruction, when user instruction includes to store or read the order of user data, opens
Dynamic acquisition module;
The acquisition module controls camera, receives the image data of camera output, extracts iris information;
The information that the authentication module compares iris information and iris database saves;
If iris information is consistent with the information that iris database saves, starting module for reading and writing accesses document data bank.
As the embodiment of the application iris encryption data storage method optimization, following steps are further included:
The user instruction includes the order to ciphering user data, iris information;
Iris information in the user instruction is stored in iris database.
As another embodiment of the application iris encryption data storage method optimization, further include steps of
The user instruction includes the order to ciphering user data;
The acquisition module controls camera, receives the image data of camera output, extracts iris information, is stored in rainbow
In film database.
In the iris encryption data storage method described in the application any embodiment, it is preferable that comprise the steps of: to institute
Iris database deposit iris information is stated, forbids storing and reading user data.
The embodiment of the present application use at least one above-mentioned technical solution can reach it is following the utility model has the advantages that
The present invention provides a kind of data store encryption device based on iris recognition, which is integrated with iris capturing module
And data memory module, the data stored in iris encryption device may be implemented using the device.
The present invention may be implemented to fill storage using iris recognition for a kind of method of data store encryption by this method
The data for setting interior storage are encrypted, it is ensured that stored data is perfectly safe in device.
In an embodiment of the present invention, it is also proposed that data storage device in a computer there are many state, such as in light
It drives drive, locking disk identifier of hard disk, convert between common hard disc drive, so that user carries out data read-write operation by operation interface
When, system automatic identification, progress authentication procedure activation, iris information acquisition and certification etc., the user experience is improved.In addition by rainbow
Film acquisition module and data memory module are integrated into data storage device, are carried, are used convenient for user.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present application, constitutes part of this application, this Shen
Illustrative embodiments and their description please are not constituted an undue limitation on the present application for explaining the application.In the accompanying drawings:
Fig. 1 is the embodiment schematic diagram of iris encryption data storage device of the present invention;
Fig. 2 is another embodiment schematic diagram of iris encryption data storage device;
Fig. 3 is iris encryption data storage method embodiment ciphering process flow chart of the invention;
Fig. 4 is iris encryption data storage method embodiment decrypting process flow chart of the invention;
Fig. 5 is the embodiment flow chart that time restriction is used by the relatively rear user of iris information;
Fig. 6 is the embodiment flow chart for inputting number of characters limitation more afterwards by iris information;
Fig. 7 is the embodiment flow chart by iris information relatively rear family input interval limitation;
Fig. 8 is to compare the embodiment flow chart for implementing data hedging by iris information;
Fig. 9 is the embodiment flow chart that iris encryption data storage method is used for apparatus of the present invention.
Specific embodiment
To keep the purposes, technical schemes and advantages of the application clearer, below in conjunction with the application specific embodiment and
Technical scheme is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only the application one
Section Example, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing
Every other embodiment obtained under the premise of creative work out, shall fall in the protection scope of this application.
Below in conjunction with attached drawing, the specific embodiment of the application is described in detail.
Fig. 1 is the embodiment schematic diagram of invention iris encryption data storage device.The iris encryption data that the application proposes
Storage device includes camera 11, acquisition module 12, iris database 15, authentication module 13, module for reading and writing 14, file data
Library 16, user interface 19.
The acquisition module receives the image data of camera output, extracts iris information for controlling camera.Institute
Authentication module is stated, for identification user instruction, compares the information of iris information and iris database preservation, starting and closing read-write
Module.The module for reading and writing, for accessing document data bank, storage and reading user data according to user instructions.The user
Operation interface includes input module 17 and display module 18.The input module is for inputting user instruction.The display module
For showing user data.
The acquisition module, for example, being circuit module or computer unit that operation has data verification program.Acquisition module
The image data of camera output is identified, iris information is extracted.Iris information, refer to user's iris of both eyes image or from
The characteristic parameter extracted in iris image.Iris is the structure of human eye, is badly specked, filament, coronal, striped, crypts etc.
Minutia, constant throughout one's life, the uniqueness with identification.
The iris database is the database for storing the iris information of unlock.In present specification, user
When instruction is comprising encryption order, " information that iris database saves " includes: the iris information inputted by input module
Or the iris information obtained by acquisition module.
The authentication module, for example, being circuit module or computer unit that operation has authentication procedure.Authentication module identification
User instruction will obtain the rainbow of active user when user instruction includes storage or the order read by acquisition module first
Then film information compares the information of iris information and iris database preservation, finally start according to the result of the comparison and close and read
Writing module.
The module for reading and writing, for example, being circuit device or computer unit that operation has file read-write program;According to certification
The instruction starting of module output is closed.When the information for comparing iris information with iris database saves is identical, the certification
Module issues enabling signal to the module for reading and writing;When comparing the information difference of iris information and iris database preservation, institute
It states authentication module and issues shutdown signal to the module for reading and writing.When module for reading and writing receives enabling signal, visit according to user instructions
Ask document data bank, storage and reading user data.When module for reading and writing receives shutdown signal, ignore user instruction, stops visiting
It asks document data bank, forbids storing and reading user data.
The document data bank, for example, being for storing the memory of user data, computer system or computer network
Device.The user data, refers to the data that user edits, generates, saving, using, and user data is saved in file data
In library.By the document data bank of encryption, user does not have correct decryption oprerations that can not modify, reads or store again number of users
According to.
The user interface, for example, being keyboard, mouse, display screen, touch screen, gesture recognition, the voice of computer
Identification, printer, projector, audio or video player, data forwarding device etc. are used for the computer system portion of input and output
The device of part or other user's input-output operations for identification.The user instruction refers to for example including input instruction, storage
Enable, read instruction, encrypted instruction etc..
Fig. 2 is another embodiment schematic diagram of iris encryption data storage device.The device includes computer 31, USB
Hub 32, iris information acquisition device 33 and data memory module 34.The computer 31 includes the module for reading and writing 14, uses
Family operation interface 19.The iris information acquisition device includes acquisition module 12, camera 11.
As one embodiment of the application, one end of the usb hub 32 connects 33 He of iris capturing module simultaneously
One USB port of data memory module 34, the other end and computer connects.It is multiple that the usb hub solves a USB port timesharing
With accessing iris capturing module respectively and the problem of data memory module.Using USB fabric, iris capturing module and data are deposited
Storage module is integrated into data storage device, is carried, is used convenient for user.
The data memory module further includes storage particle, is used as the iris database 15 or document data bank
16.As selectable embodiment, the data memory module had both been used as iris database and has also served as document data bank.The number
When being stored with user data according to memory module 34, encryption storage is carried out to user data.The data memory module includes iris
When database, the encryption storage of client iris registration information is completed.
Preferably, the iris database only support storage one user iris of both eyes information, it is ensured that user information and
The safety of privacy.
In the present embodiment, the data memory module is interpreted broadly, for example, being for storing user data or iris
Memory, computer system or the computer network device of information, are not specifically limited here.
Optionally, the authentication module 13 is contained in the iris information acquisition device 33.The authentication module operation
There is embedded iris authentication software, by iris information acquisition device described in the embedded iris authentication software control, obtains
Iris information carries out iris registration/identification.
Optionally, the authentication module 13 is contained in the computer 31, runs computer terminal iris authentication software.Institute
Computer terminal iris authentication software cooperation iris capturing module is stated, realizes registration/identification of client iris information.
In the present embodiment, the computer is interpreted broadly, for example, being network computer, PC, laptop, putting down
Plate computer, moveable computer installation or mobile terminal, are not specifically limited here.
For example, ciphering process, when carrying out iris registration, runs the end PC iris authentication software for the client iris information of acquisition
It is stored in data memory module, establishes iris information database.
For another example decrypting process, when carrying out iris recognition, runs the end PC iris authentication software for collected client iris
Information is compared with the personal iris information that memory module stores, and after identifying successfully, user can access data memory module
The user data of storage.
Fig. 3 is iris encryption data storage method embodiment ciphering process flow chart of the invention.The embodiment of the present application mentions
Iris encryption data storage method out, the step of including the steps that encrypting and decrypt.The step of encryption includes step 300
~302:
Step 300, iris authentication function activation;
For example, the iris encryption data memory module is connected to the end PC by USB port using Fig. 2 shown device, if
Data memory module First Contact Connections comprising document data bank and iris database are not wrapped in iris database to authentication module
Containing the pre-stored iris information of user, data memory module is in unencrypted state, then can show a light at the end PC at this time
The drive of drive.User clicks the installation procedure of the end the PC iris authentication software inside CD, completes the installation of certification software, at this time
The drive at the end PC becomes locking hard disk symbol.
Iris information is stored in iris database by step 301;
For example, user has input encrypted instruction, then iris authentication program understands automatic running, and prompts user to carry out iris and adopt
Collection.The iris information of this acquisition is stored in by user by the iris information acquisition module of eye alignment Data Data encryption device
Memory module, establishes the iris database of this user, and provides the prompt succeeded in registration.
For another example user double-clicks disk identifier of hard disk, the end PC authenticates software operation, reads user from data memory module and infuses in advance
The iris information of volume.If iris database is sky, it is considered as user and has input encrypted instruction, authentication procedure control iris information is adopted
Collect module, the iris information of this acquisition is stored in memory module, establishes the iris database of this user, and provide and succeed in registration
Prompt.
Step 302 forbids storing and reading user data.
After succeeding in registration, user data is encrypted.Unless by authentication procedure control iris information acquisition module again into
Row iris recognition, system forbid storing and reading user data.
Authentication module in the present embodiment stores data according to the content of iris database storage, user interface
The selection operation of module (for example, hard disk) automatically judges and runs iris authentication function activation, iris capturing and iris information
Compare, customer experience is good.
In addition, authentication module judges that the data memory module is in encryption shape when user operates hard disk symbol
State or unencrypted state, instruction module for reading and writing work are in encrypted state in display module display data memory module or do not add
The mark of close state, such as drive are respectively common hard disc symbol or locking hard disk symbol.User's operation is intuitive, customer experience
It is good.
Fig. 4 is iris encryption data storage method embodiment decrypting process flow chart of the invention.The embodiment of the present application mentions
Iris encryption data storage method out, the step of including the steps that encrypting and decrypt.The step of decryption includes step 400
~402:
Step 400, acquisition iris information, the information saved with iris database compare;
For example, the iris encryption data storage device is connected to the end PC by USB port using Fig. 2 shown device, if
The equipment connects this PC to be non-for the first time, then the drive at the end PC directly just shows locking hard disk.User double-clicks disk identifier of hard disk, then
Iris authentication program meeting automatic running, and user is prompted to carry out iris capturing.User is by eye alignment iris information acquisition device.
If step 401, iris information are identical, permit to store and read user data;
For example, the end PC certification software goes data memory module to read the pre-registered iris data of user.If memory module
Iris database be not it is empty, then the iris image of acquisition is compared with the iris image of storage.Iris information is identical, then
It identifies successfully, then encryption key is passed to data memory module, hard disk becomes non-locking state, and user can arbitrarily read at this time
It takes, data is written.
If step 402, iris information are different, forbid storing and reading user data.
For example, recognition failures, then system forbids storing and reading user data if iris information is different.
For example, recognition failures, prompt user to identify again, until identifying successfully, otherwise system is forbidden storing and be read
Take user data.
For example, if the continuous n times recognition failures of user, data memory module can automatically empty the data of storage,
Ensure be perfectly safe (N is the integer greater than 1) of institute's storing data.
Fig. 5 is the embodiment flow chart that time restriction is used by the relatively rear user of iris information.It present embodiments provides
A kind of application method that user is limited by the use after identification, including step 500~502:
Step 500 (or 401) after passing through iris recognition, permits user's storage and reads user data;
Step 501 judges whether user arrives the setting time limit using the time;
In step 501, the time started when for example, comparing from iris and determine that iris information is identical, it is considered as user's use
Time.User using the time setting when be limited to it is preset, license user data storage and read after user can in order to avoid
Certification carries out the maximum time of storage and read operation.
If step 502, user using the time reach setting the time limit, forbid store and read user data, again into
The step of entering the decryption, such as 400~401.
Fig. 6 is the embodiment flow chart for inputting number of characters limitation more afterwards by iris information.The present embodiment is providing
A kind of application method that user is limited by the use after identification, including step 600~602:
Step 600 (or 401) after passing through iris recognition, permits user's storage and reads user data;
Step 601 judges whether user inputs character quantity reaches limitation;
In step 601, user inputs character quantity reach be limited to it is pre-set license user data storage
The character input maximum quantity of storage and read operation can be carried out with authentication-exempt with user after reading;
If step 602, user's output character reach limits value, forbid storing and reading user data.
Preferably, if the step of user inputs character quantity reaches limits value, is again introduced into the decryption, such as
400~401.
Fig. 7 is the embodiment flow chart by iris information relatively rear family input interval limitation.The present embodiment adds in iris
A kind of application method that user is limited by the use after identification, including step are provided on the basis of ciphertext data storage device
700~702:
Step 700 (or 401) after passing through iris recognition, permits user's storage and reads user data;
Step 701 judges whether user has operation within the set duration;
In step 701, user is a length of preset after the storage of license user data and reading in setting, user
The largest interval duration of the authentication-exempt allowed between operation twice;
Step 702 is not operated more than setting duration, forbids storing and reading user data.
Preferably, if user's operation interval is more than setting duration, the step of being again introduced into the decryption, such as 400
~401.
Fig. 8 is to compare the embodiment flow chart for implementing data hedging by iris information, the iris information and iris of acquisition
Same number does not reach setting numerical value for the information comparison that database saves, then user data is emptied.Comprising step 400,402,
801~802.
Step 400, acquisition iris information, compare with pre-stored iris information;
If step 402, iris information are different, forbid storing and reading user data;
Recognition failures prompt user to identify again.
Step 801 judges whether different number reaches the times N of setting;
In step 801, times N=M+1 is set, M is the continuous iris input comparison mistake of preset permission user
Maximum times.
Step 802, continuous several times comparison, number reach setting number, then empty user data.
Fig. 9 is the embodiment flow chart that iris encryption data storage method is used for apparatus of the present invention.
The present embodiment provides a kind of iris encryption data storage methods, for one kind described in the application any one embodiment
Iris encryption data storage device, specifically includes the following steps:
Step 102, the user interface receive user instructions, and user instruction includes to store or read user data
Order;
For example, user inputs operation instruction to user interface 19, user interface 19 transmits operational order.
Step 103, the authentication module identify user instruction;
For example, authentication module 13 identifies user operation instruction, and instruction is transmitted to acquisition module 12, when user instruction packet
When containing storing or read the order of user data, start acquisition module.
Step 104, the acquisition module control camera, receive the image data of camera output, extract iris information;
For example, acquisition module opens camera 11;Camera 11 acquires and exports image data to acquisition module 12;Acquisition
Module 12 receives the image data that camera 11 exports;Acquisition module 12 extracts the iris information of acquisition.
The information that step 105, the authentication module compare iris information and iris database saves;
For example, the comparison verification iris information of authentication module 13;Verification is not terminated by then process;
If step 106, iris information are consistent with the information that iris database saves, starting module for reading and writing accesses number of files
According to library.
For example, the iris information of confirmation acquisition is saved with iris database 15, information is consistent, then verification passes through, authentication module
13 authorization module for reading and writing 14 access document data bank 16 according to user instructions.
As the embodiment of the application iris encryption data storage method, the step of including following encryption:
Step 100A, the described user interface receives user instructions, and the user instruction includes to ciphering user data
Order, iris information;
Step 101A, authentication module identifies user instruction, starts module for reading and writing, by the iris information in the user instruction
It is stored in iris database.
As another embodiment of the application iris encryption data storage method optimization, the step of including following encryption:
Step 100B, the described user interface receives user instructions, and the user instruction includes to ciphering user data
Order;
Step 101B, the described authentication module identifies user instruction, starts acquisition module;The acquisition module control camera shooting
Head receives the image data of camera output, extracts iris information, is stored in iris database.
Preferably, the acquisition module 12 extracts iris information for the first time, will be stored in iris database 15.
In the iris encryption data storage method described in the application any embodiment, it is preferable that comprise the steps of: to institute
Iris database deposit iris information is stated, forbids storing and reading user data.For example, the document data bank 16 is in rainbow for the first time
Forbid storing and reading user data after film encryption data storage device.
It should be noted that the terms "include", "comprise" or its any other variant are intended to the packet of nonexcludability
Contain, so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also including
Other elements that are not explicitly listed, or further include for this process, method, commodity or the intrinsic element of equipment.
In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including the element
Process, method, there is also other identical elements in commodity or equipment.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art
For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal
Replacement, improvement etc., should be included within the scope of the claims of this application.
Claims (10)
1. a kind of iris encryption data storage device, which is characterized in that include camera, acquisition module, iris database, certification
Module, module for reading and writing, document data bank, user interface;
The acquisition module receives the image data of camera output, extracts iris information for controlling camera;
The authentication module, user instruction, compares the information of iris information and iris database preservation, starting and pass for identification
Close module for reading and writing;
The module for reading and writing, for accessing document data bank, storage and reading user data according to user instructions;
The user interface includes input module and display module, and the input module is for inputting user instruction;
The display module is for showing user data.
2. a kind of iris encryption data storage method, which is characterized in that the step of including the steps that encrypting and decrypting;
The step of encryption includes:
Iris information is stored in iris database;
Forbid storing and reading user data;
The step of decryption includes:
Iris information is acquired, the information saved with iris database compares;
If iris information is identical, permit to store and read user data;
If iris information is different, forbid storing and reading user data.
3. iris encryption data storage method according to claim 2, which is characterized in that further include following steps:
The step of if user reaches the setting time limit using the time, is again introduced into the decryption.
4. iris encryption data storage method according to claim 2, which is characterized in that further include following steps:
If the step of user inputs character quantity reaches limits value, is again introduced into the decryption.
5. iris encryption data storage method according to claim 2, which is characterized in that further include following steps:
The step of if user's operation interval is more than setting duration, is again introduced into the decryption.
6. iris encryption data storage method according to claim 2, which is characterized in that the iris information and iris number of acquisition
Same number does not reach setting numerical value for the information comparison saved according to library, then user data is emptied.
7. a kind of iris encryption data storage method is used for claim 1 described device, which comprises the following steps:
The user interface receives user instructions;
The authentication module identifies user instruction, and when user instruction includes to store or read the order of user data, starting is adopted
Collect module;
The acquisition module controls camera, receives the image data of camera output, extracts iris information;
The information that the authentication module compares iris information and iris database saves;
If iris information is consistent with the information that iris database saves, starting module for reading and writing accesses document data bank.
8. iris encryption data storage method as claimed in claim 7, which is characterized in that further include steps of
The user instruction includes the order to ciphering user data, iris information;
Iris information in the user instruction is stored in iris database.
9. iris encryption data storage method as claimed in claim 7, which is characterized in that further include steps of
The user instruction includes the order to ciphering user data;
The acquisition module controls camera, receives the image data of camera output, extracts iris information, is stored in iris number
According in library.
10. the iris encryption data storage method as described in claim 8 or 9, which is characterized in that the deposit of Xiang Suoshu iris database
Iris information forbids storing and reading user data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811310498.6A CN109446781A (en) | 2018-11-06 | 2018-11-06 | A kind of iris encryption data storage device and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811310498.6A CN109446781A (en) | 2018-11-06 | 2018-11-06 | A kind of iris encryption data storage device and method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109446781A true CN109446781A (en) | 2019-03-08 |
Family
ID=65551170
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811310498.6A Pending CN109446781A (en) | 2018-11-06 | 2018-11-06 | A kind of iris encryption data storage device and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109446781A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111353168A (en) * | 2020-02-27 | 2020-06-30 | 闻泰通讯股份有限公司 | Multimedia file management method, device, equipment and storage medium |
Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102955745A (en) * | 2011-08-18 | 2013-03-06 | 北京爱国者信息技术有限公司 | Mobile storage terminal and data management method thereof |
CN103107986A (en) * | 2012-12-07 | 2013-05-15 | 大连奥林匹克电子城咨信商行 | On-line login identity authentication method based on iris matching |
CN103177207A (en) * | 2013-03-15 | 2013-06-26 | 苏州九光信息科技有限公司 | Method and system for protecting data based on iris identification |
CN103440448A (en) * | 2013-04-02 | 2013-12-11 | 谢济鸿 | Iris identification method for online bank |
CN103646203A (en) * | 2013-12-20 | 2014-03-19 | 中晟国计科技有限公司 | Computer safety system with human body biological characteristic recognition |
CN103699828A (en) * | 2013-12-25 | 2014-04-02 | 柳州市欧博科技有限公司 | Information security management method |
CN103927470A (en) * | 2014-04-30 | 2014-07-16 | 北京释码大华科技有限公司 | File encryption and decryption system and method based on iris recognition |
CN104091106A (en) * | 2014-07-11 | 2014-10-08 | 北京释码大华科技有限公司 | Mouse and method supporting iris encryption |
CN104182674A (en) * | 2014-08-12 | 2014-12-03 | 清华大学深圳研究生院 | Protective device for solid-state disk |
WO2014197112A1 (en) * | 2013-06-08 | 2014-12-11 | Apple Inc. | Using biometric verification to grant access to redacted content |
CN105389027A (en) * | 2015-12-10 | 2016-03-09 | 深圳先进技术研究院 | Iris encrypted mouse |
CN105447405A (en) * | 2015-11-09 | 2016-03-30 | 南京以太安全技术有限公司 | Document encryption/decryption method and apparatus based on iris recognition and authentication |
CN105631273A (en) * | 2014-10-27 | 2016-06-01 | 鸿富锦精密工业(武汉)有限公司 | Electronic apparatus security management and control system and method |
CN205594635U (en) * | 2016-04-18 | 2016-09-21 | 乐视控股(北京)有限公司 | Cell -phone based on iris discernment |
CN106095144A (en) * | 2016-07-29 | 2016-11-09 | 石家庄蜗牛科技有限公司 | The mouse of a kind of multi-enciphering and authentication method thereof |
CN106599647A (en) * | 2016-10-31 | 2017-04-26 | 北京无线电计量测试研究所 | Computer access control system based on iris recognition identity authentication |
CN106803031A (en) * | 2017-01-25 | 2017-06-06 | 维沃移动通信有限公司 | A kind of information protecting method and mobile terminal |
-
2018
- 2018-11-06 CN CN201811310498.6A patent/CN109446781A/en active Pending
Patent Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102955745A (en) * | 2011-08-18 | 2013-03-06 | 北京爱国者信息技术有限公司 | Mobile storage terminal and data management method thereof |
CN103107986A (en) * | 2012-12-07 | 2013-05-15 | 大连奥林匹克电子城咨信商行 | On-line login identity authentication method based on iris matching |
CN103177207A (en) * | 2013-03-15 | 2013-06-26 | 苏州九光信息科技有限公司 | Method and system for protecting data based on iris identification |
CN103440448A (en) * | 2013-04-02 | 2013-12-11 | 谢济鸿 | Iris identification method for online bank |
WO2014197112A1 (en) * | 2013-06-08 | 2014-12-11 | Apple Inc. | Using biometric verification to grant access to redacted content |
CN103646203A (en) * | 2013-12-20 | 2014-03-19 | 中晟国计科技有限公司 | Computer safety system with human body biological characteristic recognition |
CN103699828A (en) * | 2013-12-25 | 2014-04-02 | 柳州市欧博科技有限公司 | Information security management method |
CN103927470A (en) * | 2014-04-30 | 2014-07-16 | 北京释码大华科技有限公司 | File encryption and decryption system and method based on iris recognition |
CN104091106A (en) * | 2014-07-11 | 2014-10-08 | 北京释码大华科技有限公司 | Mouse and method supporting iris encryption |
CN104182674A (en) * | 2014-08-12 | 2014-12-03 | 清华大学深圳研究生院 | Protective device for solid-state disk |
CN105631273A (en) * | 2014-10-27 | 2016-06-01 | 鸿富锦精密工业(武汉)有限公司 | Electronic apparatus security management and control system and method |
CN105447405A (en) * | 2015-11-09 | 2016-03-30 | 南京以太安全技术有限公司 | Document encryption/decryption method and apparatus based on iris recognition and authentication |
CN105389027A (en) * | 2015-12-10 | 2016-03-09 | 深圳先进技术研究院 | Iris encrypted mouse |
CN205594635U (en) * | 2016-04-18 | 2016-09-21 | 乐视控股(北京)有限公司 | Cell -phone based on iris discernment |
CN106095144A (en) * | 2016-07-29 | 2016-11-09 | 石家庄蜗牛科技有限公司 | The mouse of a kind of multi-enciphering and authentication method thereof |
CN106599647A (en) * | 2016-10-31 | 2017-04-26 | 北京无线电计量测试研究所 | Computer access control system based on iris recognition identity authentication |
CN106803031A (en) * | 2017-01-25 | 2017-06-06 | 维沃移动通信有限公司 | A kind of information protecting method and mobile terminal |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111353168A (en) * | 2020-02-27 | 2020-06-30 | 闻泰通讯股份有限公司 | Multimedia file management method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8970348B1 (en) | Using sequences of facial gestures to authenticate users | |
CN105184179B (en) | Embedded encrypted mobile storage device and operation method thereof | |
CN103930893B (en) | Portable storage device using fingerprint recognition and method for controlling same | |
US20110001607A1 (en) | Biometric authentication system, biometric authentication method, biometric authentication apparatus, biometric information processing apparatus | |
CN103812649B (en) | Method and system for safety access control of machine-card interface, and handset terminal | |
CN102955746A (en) | Read-only mode mobile storage device and data access method thereof | |
CN110175441A (en) | Data managing method, device, equipment and storage medium based on bio-identification | |
CN101105753A (en) | Computer safety control method based on USB flash memory disc | |
CN103400082A (en) | File encryption/decryption method and system | |
CN102955745A (en) | Mobile storage terminal and data management method thereof | |
CN101557428A (en) | Data card | |
CN103400431B (en) | A kind of intelligent concerning security matters carrier storage cabinet of two-tube dual control | |
CN108763917A (en) | A kind of data encryption/decryption method and device | |
CN110324358A (en) | Video data manages authentication method, module, equipment and platform | |
CN110533142A (en) | A kind of encrypted U disk and USB flash disk partition method | |
CN105827622A (en) | Method and device for protecting user information | |
CN105005721A (en) | Computer authorization starting control system and method based on computer starting key | |
US20230208637A1 (en) | Key management method and apparatus | |
JP2013517584A (en) | Personal portable and secure network access system | |
WO2020073916A1 (en) | Encryption method and apparatus for storage device, and storage medium | |
CN109446781A (en) | A kind of iris encryption data storage device and method | |
CN109104720A (en) | A kind of eSIM card wiring method based on SIM card user authorization | |
US20220245963A1 (en) | Method, apparatus and computer program for authenticating a user | |
WO2017137481A1 (en) | A removable security device and a method to prevent unauthorized exploitation and control access to files | |
US20230388107A1 (en) | System and method for encrypted multimedia information management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190308 |
|
RJ01 | Rejection of invention patent application after publication |