CN201063641Y - High safety encryption/decryption device including human information - Google Patents

High safety encryption/decryption device including human information Download PDF

Info

Publication number
CN201063641Y
CN201063641Y CNU2007200950902U CN200720095090U CN201063641Y CN 201063641 Y CN201063641 Y CN 201063641Y CN U2007200950902 U CNU2007200950902 U CN U2007200950902U CN 200720095090 U CN200720095090 U CN 200720095090U CN 201063641 Y CN201063641 Y CN 201063641Y
Authority
CN
China
Prior art keywords
human body
encrypting
decrypting
body information
connects
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNU2007200950902U
Other languages
Chinese (zh)
Inventor
顾泽苍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ABOLUO INFORMATIN TECHNOLOGY Co Ltd TIANJIN CITY
Original Assignee
ABOLUO INFORMATIN TECHNOLOGY Co Ltd TIANJIN CITY
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ABOLUO INFORMATIN TECHNOLOGY Co Ltd TIANJIN CITY filed Critical ABOLUO INFORMATIN TECHNOLOGY Co Ltd TIANJIN CITY
Priority to CNU2007200950902U priority Critical patent/CN201063641Y/en
Application granted granted Critical
Publication of CN201063641Y publication Critical patent/CN201063641Y/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Facsimile Transmission Control (AREA)

Abstract

The utility model relates to a highly safe enciphering and deciphering device by utilization human body information, which belongs to the information security field. A human body information sensor is connected to the enciphering and deciphering device through a human body information processing unit; data containing human body information of enciphering and deciphering implementers is taken as cryptographic-key; the enciphering and deciphering device is connected with an enciphering mapping function library and a deciphering mapping function library; mapping functions can be chosen on a random basis for enciphering and deciphering processing; the enciphering and deciphering device is also directly connected with a scanner, or a flash memory storing electronic images which reads hidden images, and code after encryption is converted into screen code of two-dimensional graphic for hidden processing of images. The utility model has the characteristics of high encryption classification, quick computing speed, convenient use and so on, and can be used on a common network for transmitting information of high classification and is suitable for promotion and application in departments like party, government and army and financial enterprises and public institutions, etc.

Description

The encrypting and decrypting device that contains the high safety of human body information
Technical field
The utility model belongs to information security field, especially a kind of device of encrypting and decrypting of the high safety that contains human body information.
Background technology
In recent years, along with the fast development of computer networking technology, the research of the encrypting and decrypting method of required high safety receives the very concern of height in the data communication at computer.There are a large amount of patents and research paper to be delivered.Now set forth the present situation in this field and the problem of existence with regard to quoting several the patents of delivering recently.
With fixed rule be key with clear data by given array, thereby realize encrypting the purpose that obtains ciphertext through combination, the gimmick of the representational practicality in the world is the DES (Data Encryption Standard) of 64 bit encryptions and AES (Advanced EncryptionStandard) algorithm of 128 bit encryptions at present.Research does not in this respect have at present breakthrough progress as yet, as the up-to-date patent of Japan, " secret signal communication means; secret signal communication system, secret signal communicator and secret signal signal procedure " [spy opens 2006-333095] this patent of being delivered by the Japanology person that is entitled as only proposes the code that sets in advance in the employing equipment in the generation of key.
Japan famous copier manufacturer R society has also delivered recently and has been entitled as " facsimile machine device; personal computer and facsimile machine trusted document are joined communication system " [spy opens 2006-332902] this patent and has proposed adding the scheme of password in communicating by letter between facsimile machine and server or the computer, with the content of solution facsimile machine can be easily by the third party steal problem.
Above patent still adopts traditional gimmick on the algorithm of encrypting and decrypting.But be noted that the DES (Data Encryption Standard) of 64 traditional bit encryptions and AES (the Advanced Encryption Standard) scheduling algorithm of 128 bit encryptions, belong to the form of the block encryption (Block Cypher) of shared key.Though the method computational speed of traditional block encryption is fast, the practicality height exists by known plaintext than the shortcoming that is easier to release the ciphertext content, and utilizes special test data deducibility to encrypt the shortcoming of rule.BBS (Blum-Blum-Shub) method as the representative form of continuous encryption (Stream Cypher), the encryption that the theory of utilization value of two prime numbers of difficult deduction from the product of two enough big prime numbers realizes, encrypting with this method needs long computing time, but encrypted result is acknowledged as to make up entirely and just can cracks content expressly.Fuji Tsu adopts a large amount of big prime number heuristics but the Economic News of on September 1st, 2006 Japan has just been reported for work, and has just cracked the result of 128 bit encryptions in less than one month time.
Represent the up-to-date cryptographic algorithm of Japan, by the state-run Hiroshima University of Japan, the water university of state-run tea, the patent of researcher's co-present of chevron university is entitled as " simulation random number generation systems, secret signal system and multiple number change system " (spy opens 2006-317802).This method belongs to the form of continuous encryption (Stream Cypher), to be the PN random number series of safety inadequately that shared key generates at first by the preprepared ordered series of numbers, and then with safe inadequately PN random number series, be transformed into safe SPN random number series, concrete grammar is that last one numerical value is existed in the internal memory, obtains being called as safe SPN random number series by each that calculates the PN random number series with last one logic multiply.At last, will expressly carry out the calculating of logic XOR, draw the ciphertext after the encryption with the SPN random number series.The inventor is called Mersenne Twister simulation random number series method with this method, and its effect is that the cycle of the random number series after the encryption of exporting is 2 19937-1, longer than the cycle of traditional random number series, computational speed is fast etc.Shortcoming is that hardware spending is bigger, and 623 32 code need leave in the internal memory, and when both having needed 19936 random number series, particularly initial value to be " 0 ", state space is that the numeric ratio of " 0 " is more.Exception because of the simulation random number series that produces is to draw by fairly simple computing, therefore still exists by special ordered series of numbers, might extrapolate the problem of encryption rule.
In addition, any encryption method no matter traditionally, because of the code form before encrypting with encrypt after code form be similar binary code, therefore exist the problem that methods such as using the current language display rule all can be cracked to the file of its encryption.
Have, what make us perplexing most in the encrypting and decrypting field is that a good cryptographic algorithm has just lost its value after being disclosed again.Up to the present the algorithm that nearly all in the world algorithm all is a single form, therefore in a single day good again algorithm is disclosed, and the assailant always can seek out the means that crack according to the rule of cryptographic algorithm.Therefore, people thirst for seeking computational speed that a kind of variable multiple algorithm merges again than encryption method faster.
Deliver with the form of patent about the ordered series of numbers that utilizes human body information to generate to have true random distribution nature, its exercise question is: " containing human body information ID code generating method " (031003621).This patent does not relate to the content of the encrypting and decrypting aspect that contains human body information, and the present embodiment just is based on this method and proposes to utilize human body information to carry out the application of encrypting and decrypting.
About the representational patent of the Information Hiding Techniques of imbedding information in printing in the image respectively in Japan's (spy opens 2006-319632), the U.S. (US-2006-0256386-A1) is disclosed, in China (200610008124.X) application, be entitled as " the generation method of information embedded halftone screen code ".The present embodiment hides Info in the image at the 2 d code that is adopted after the encryption and in printing and just is based on this method and is proposed.
About in electronic image, imbedding the Information Hiding Techniques Japan representational patent " image sale device, image is bought device, method and program " (spy opens 2004-96450) of information.This patent imports and is called as the Steganography method, utilizes the bit image on upper strata that original image is influenced smaller principle, can imbed to hide Info in the bit image on upper strata.The present embodiment realizes by this method at hiding Info in electronic image.
The utility model content
The purpose of this utility model is dangerous for solving traditional encrypting and decrypting device, and can not solve problems such as management to the encrypting and decrypting person, propose a kind of human body information that utilizes and have true stochastic behaviour, characteristics such as easy to use are carried out encipherer and deciphering person's plural number human body information the device of the encrypting and decrypting of high safety as key.
Another purpose of the present utility model is the device that solves block encryptions (BlockCypher) such as traditional DES and AES, is easier to infer the ciphertext content by known plaintext ratio, or can infers the problem of encryption rule by special ordered series of numbers; And traditional BBS encrypt continuously (Stream Cypher) device, computational speed is slow, and can infer the problem of encryption rule by the prime number heuristic; And traditional encryption device algorithm is more single, relatively more fixing again not malleable, and in a single day algorithm is disclosed, than the problem that is easier to crack ciphertext.Propose a kind of block encryption (Block Cypher) and encrypt continuously that (Stream Cypher) combine, a plurality of random number serieses that will have encipherer and deciphering person's human body information are spatial mappings (Complex System Space Map) by complexity, form with multiple mapping function (Membership Function) is carried out various computings, reaches the device of nonlinear cipher round results with computing at a high speed.
It is for the plaintext before the solution encryption that the utility model also has a purpose and the ciphertext after encrypting all is same one dimension binary code, can infer the problem of password content by language rule, propose to use different space code (Order Space Code), realize the novel encrypting and decrypting device that information encryption combines with Information hiding.
The utility model solves its technical problem and takes following technical scheme to realize:
Connect encrypting and decrypting unit 5 by communicating terminal 1, encrypting and decrypting unit 5 connects human body information transducer 6, and encrypting and decrypting unit 5 connects network 7 and constitutes the encrypting and decrypting communication terminal device that contains human body information; Computer 2 connects encrypting and decrypting unit 5, and encrypting and decrypting unit 5 connects human body information transducer 6, and encrypting and decrypting unit 5 connects network 7 and constitutes the encrypting and decrypting computer communication device that contains human body information; Server 3 connects encrypting and decrypting unit 5, and encrypting and decrypting unit 5 connects human body information transducer 6, and encrypting and decrypting unit 5 connects network 7 and constitutes the encrypting and decrypting server communication device that contains human body information; Facsimile machine, integral machine 4 connects encrypting and decrypting unit 5, and encrypting and decrypting unit 5 connects human body information transducer 6, and encrypting and decrypting unit 5 connects network 7 and constitutes the encrypting and decrypting facsimile machine that contains human body information, integral machine communication device.
And, constitute the encrypting and decrypting facsimile machine that contains human body information, the integral machine communication device has following annexation: ciphering unit (7-2) connects facsimile machine and network communication interface (7-1), the USB interface (7-6) that is connected with the flash memory of depositing the text that will encrypt is connected ciphering unit (7-2), the scanner (7-8) of input printing image connects ciphering unit (7-2) and decrypting device (7-3) respectively, the USB interface (7-10) that is connected with the flash memory of the human body information data of depositing the deciphering implementer is connected ciphering unit (7-2), encrypt mapping function storehouse (7-11) and directly connect ciphering unit (7-2), human body sensor (7-5) connects human body information processing unit (7-4), human body information processing unit (7-4) connects ciphering unit (7-2) and decrypting device (7-3) respectively, deciphering mapping function storehouse (7-13) directly connects decrypting device (7-3), the USB interface (7-12) that is connected with the flash memory of depositing the human body information data of encrypting the implementer is connected decrypting device (7-3), decrypting device (7-3) connects printing equipment (7-9), with decrypted result by printer output, decrypting device (7-3) connects LAN lan interfaces (7-7), and decrypted result is outputed to terminal or server terminal or display terminal by the LAN local area network (LAN).
And, constitute the encrypting and decrypting computer or the server communication device that contain human body information and have following annexation: cpu motherboard (9-12) connects display (9-5), keyboard (9-2) connects cpu motherboard (9-12), communication interface (9-1) and cpu motherboard (9-12) double-way connection, human body sensor (9-3) connects USB interface (9-4), USB interface (9-4) connects cpu motherboard (9-12), the flash memory (9-6) of depositing the text that will encrypt connects USB interface (9-7), USB interface (9-7) connects cpu motherboard (9-12), the flash memory (9-9) of depositing the human body information ordered series of numbers of encrypting implementer or deciphering implementer connects USB interface (9-8), USB interface (9-8) connects cpu motherboard (9-12), deposit the Information hiding image that is used to imbed concealed encrypted data, the encrypting and decrypting program, encrypt the mapping function storehouse, the random asccess memory (9-10) and two-way connection of cpu motherboard (9-12) of the intermediate object program in deciphering mapping function storehouse, deposit the Information hiding image that is used to imbed concealed encrypted data, the encrypting and decrypting program, encrypt the mapping function storehouse, the harddisk memory (9-11) in deciphering mapping function storehouse also with two-way connection of cpu motherboard (9-12).
And, constitute the encrypting and decrypting communication terminal device that contains human body information and have following annexation: ciphering unit (10-2) and decrypting device (10-3) connect communication interface (10-1), the text that will encrypt directly is sent to ciphering unit (10-2) by input interface circuit (10-11), deposit deciphering implementer's human body information random number series, the memory (10-6) that is used to imbed the Information hiding image of concealed encrypted data connects ciphering unit (10-2), encrypt mapping function storehouse (10-8) and directly connect ciphering unit (10-2), human body sensor (10-5) connects human body information processing unit (10-4), human body information processing unit (10-4) connects ciphering unit (10-2) and decrypting device (10-3) respectively, deciphering mapping function storehouse (10-9) directly connects decrypting device (10-3), the memory (10-7) of depositing the human body information random number series of encrypting the implementer connects decrypting device (10-3), decrypting device (10-3) connects output interface circuit (10-10), and decrypted result is outputed to display terminal by output interface circuit (10-10).
Advantage of the present utility model and good effect are:
The utility model proposes a kind of device of encrypting and decrypting of the high safety that contains human body information, has following characteristics:
Ciphering unit from the human body information transducer read the deciphering implementer human body information, and with human body information as key, safe and reliable, be convenient to change at any time, the random number series of key can be very long, safety need not the memory, easy to use.In addition, can carry out strict control, can the deciphering reader of ciphertext be deciphered and carry out strict control reading time encipherer or deciphering person.
2. the direct encrypted function library of ciphering unit connects, can read multiple mapping function (Membership Function) at random, carry out polytype computing, the artificial intervention easily, operational form is varied, flexible transformation, even this algorithm is disclosed, but operational form is variable, can prevent effectively that the assailant from inferring encryption rule, this is very important to the department that requires high safety, and utilizing public network to transmit the level of confidentiality file safely and fast simultaneously also becomes possibility.Simultaneously, by the intervention of multiple random parameter, the multiple calculating of being carried out, its result can obtain nonlinear cipher round results.
4. but the ciphering unit input image data can adopt different space code (Order Space Code), and the code form before encrypting is different with the code form after the encryption, can thoroughly remove the possibility of inferring the ciphertext content by unified language rule.Simultaneously, information encryption combines with Information hiding and can improve fail safe greatly.
Description of drawings
Fig. 1 is the schematic diagram that constitutes the encrypting and decrypting communication system that has human body information;
Fig. 2 is the schematic diagram that generates human body information by a line of signature;
Fig. 3 is that other pass through the physics of human body or the schematic diagram that physiological feature generates human body information;
Fig. 4 is to be the schematic diagram that the method for spatial mappings is found the solution to non-linear cryptography issue by complexity;
Fig. 5 is the schematic diagram of the minimized two-dimentional half-tone screen code of maximum similar degree between code;
Fig. 6 is that the half-tone screen code information that is used to print image is imbedded hiding schematic diagram;
Fig. 7 is the schematic diagram that adds the encrypting and decrypting unit that contains human body information in the facsimile machine integral machine
Fig. 8 is that the Steganography information that is used for e-file is imbedded hiding schematic diagram;
Fig. 9 is the schematic diagram that adds the encrypting and decrypting unit that contains human body information in computer or server;
Figure 10 is the schematic diagram that adds the encrypting and decrypting unit that contains human body information in other communication devices such as communicating terminal;
Embodiment
Below in conjunction with accompanying drawing the utility model embodiment is further described, but embodiment described in the utility model is illustrative, rather than determinate.
In Fig. 1, provided the schematic diagram that constitutes the encrypting and decrypting communication system that has human body information.The content that communication terminal or mobile phone can be posted a letter before posting a letter among the figure is delivered to earlier in the encrypting and decrypting unit that contains human body information and is carried out encryption, the encrypting and decrypting unit is according to the human body information of encrypting the implementer, or deciphering implementer's human body information, or the human body information of encrypting plural numbers such as implementer and deciphering implementer encrypts the content of posting a letter, and then the content of will posting a letter is issued the other side by communication network.
Communication terminal or mobile phone are when collecting mail, the content of collecting mail delivered to earlier in the encrypting and decrypting unit that contains human body information be decrypted processing, the encrypting and decrypting unit is according to deciphering implementer's human body information, or encryption implementer's human body information, or the human body information of encrypting plural numbers such as implementer and deciphering implementer is decrypted collection of letters content, and then the processing after collecting mail.
In addition, the content that computer or server can be posted a letter before posting a letter in Fig. 1 is delivered to earlier in the encrypting and decrypting unit that contains human body information and is carried out encryption, the encrypting and decrypting unit is according to the human body information of encrypting the implementer, or deciphering implementer's human body information, or the human body information of encrypting plural numbers such as implementer and deciphering implementer encrypts the content of posting a letter, and then the content of will posting a letter is issued the other side by communication network.
Computer or server are when collecting mail, the content that will collect mail is delivered to earlier in the encrypting and decrypting unit that contains human body information and is decrypted processing, the encrypting and decrypting unit is according to deciphering implementer's human body information, or encryption implementer's human body information, or the human body information of encrypting plural numbers such as implementer and deciphering implementer is decrypted collection of letters content, and then the processing after collecting mail.
And, the content that photocopier or integral machine can be posted a letter before posting a letter in Fig. 1 is delivered to earlier in the encrypting and decrypting unit that contains human body information and is carried out encryption, the encrypting and decrypting unit is according to the human body information of encrypting the implementer, or deciphering implementer's human body information, or the human body information of encrypting plural numbers such as implementer and deciphering implementer encrypts the content of posting a letter, and then the content of will posting a letter is issued the other side by communication network.
In like manner, photocopier or integral machine are when collecting mail, the content that will collect mail is delivered to earlier in the encrypting and decrypting unit that contains human body information and is decrypted processing, the encrypting and decrypting unit is according to deciphering implementer's human body information, or encryption implementer's human body information, or the human body information of encrypting plural numbers such as implementer and deciphering implementer is decrypted collection of letters content, and then the processing after collecting mail.
Fig. 2 is the schematic diagram that generates human body information by a line of signature.Concrete principle is; Produce the derivative value with true stochastic behaviour of a large amount of different sizes values when nib is signed along the person's handwriting of signature, we are called a line ordered series of numbers.A line ordered series of numbers is had memory conveniently as key, meet traditional certification mode, Qian Zi content can arbitrarily change again in addition, and the figure place of a line ordered series of numbers can arbitrarily prolong again.It is low to solve the too short fail safe of traditional secrete key figure place, oversize inconvenience memory, the problem of complicated operation.In addition in having the key of human body information, by comprising magnetic card, IC-card, but radio-frequency card is in the input form of the medium of interior recording of encrypted implementer or legal deciphering implementer's identity information, party's human body information and identity are together constituted the key of encrypting or deciphering, can realize encrypt file is decrypted reader's management, or be decrypted and read other management of level, be decrypted the management of reading resume, be decrypted the management of reading limited field, be decrypted correspondence of reading blacklist or the like.Have again, the acquisition of encryption or decruption key, except being undertaken the short range online acquisition by human body sensor, also can be by mediums such as flash memories, note the data of key ordered series of numbers, transmit by special delivery or mailing, or transmit by the means of communication, or by methods such as telecommunication network on-line authentications.
Fig. 3 is that other pass through the physics of human body or the schematic diagram that physiological feature generates human body information.Example as the human body information of physical features; The vocal print ordered series of numbers with randomness that the sounding (1) of human body is produced is as key, and it is convenient to have memory equally, and the content of sounding also can arbitrarily change, and the figure place of vocal print ordered series of numbers also can arbitrarily prolong.It is low also can to solve the too short fail safe of traditional secrete key figure place, oversize inconvenience memory, the problem of complicated operation.
Example as the human body information of physiological characteristic; The ordered series of numbers of electrocardio ripple brain wave that can consider the randomness that will be had by electrocardiogram (2) electroencephalogram (EEG) (3) can have fail safe, the characteristics of uniqueness as key.Simultaneously also have and to remember, the characteristics that the figure place of the ordered series of numbers of electrocardio ripple brain wave can arbitrarily prolong.Shortcoming is relatively more fixing change, the detection more complicated of being difficult for of the ordered series of numbers of electrocardio ripple brain wave.
Under the not really high situation of security requirement, can omit above-mentioned human body information input unit, adopt the manufacture method of traditional artificial simulation random number series, or the method for artificial input random number series.
Fig. 4 is to be the schematic diagram that the method for spatial mappings is found the solution to the nonlinear problem of complexity by complexity.In the encrypting and decrypting theory, always around how carrying out nonlinear encryption, but traditional encrypting and decrypting method, nearly all be to adopt single algorithm, this single algorithm exists maximum problem, the internal rule of cryptographic algorithm can be analyzed by some specific ordered series of numbers,, the slow problem of computational speed can be occurred again if adopt complicated classic algorithm.
The utility model is that the method for spatial mappings is mapped to simultaneously and comprises Linear Space according to the non-linear cryptography issue of complexity by complexity, non-linear space, probability space, geometric space, logical spaces etc. are in the computing in the interior any space with reversible character, and computational methods that can be fairly simple obtain the guiding theory of the effect of non-linear encryption than fast speeds, proposition adds in the encrypting and decrypting device encrypts the mapping function storehouse, and deciphering mapping function storehouse.Encrypt the mapping function storehouse and connect ciphering unit, deciphering mapping function storehouse connects decrypting device.The ciphering unit encryption function in the reading encrypted mapping function storehouse at random carries out encryption, and decrypting device also can be extracted the rule of encrypting mapping function according to ciphering unit, and the decryption function that reads at random in the deciphering mapping function storehouse is decrypted processing.
Fig. 5 be between code maximum similar degree at the schematic diagram of the two-dimentional half-tone screen code below 1/2.As shown in Figure 5, half-tone screen code is the two dimensional image code, so computer code can pass through 16 kinds of image direct representations.Because of the screen site is very little dot matrix, be the anti-interference and accurate recognition of energy, half-tone screen code adopts the minimized graphic form of maximum similar degree between code, be that to have dot matrix over half at least between per two codes be different, this means so long as to be no more than point over half destroyed, just can accurately discern.
Imbed when hiding at electronic image information, less because of interference ratio, also can take the coding of any type of X-Y scheme.
The schematic diagram that Fig. 6 is to use the half-tone screen code information of carrying out to imbed, as shown in Figure 6, for the screen site of printing image, under the situation of the characteristics such as gray scale that do not change the site, the shape that only changes the site just can reach the effect that information is imbedded, and the quality of image is not changed.The present embodiment is utilized These characteristics, with the secret information of having encrypted be imbedded in again one with its irrelevant image in, can reach information encryption and add hiding purpose again, thereby obtain the safe effect of height.Certainly, what enumerated here is a kind of example in the numerous half-tone screen code form, and other various forms of half-tone screen codes all can be used for enciphered message is hidden.
Fig. 7 is the encrypting and decrypting schematic representation of apparatus that contains the facsimile machine integral machine of human body information.As shown in Figure 7, it is as follows to constitute the operation principle of encrypting and decrypting device of the facsimile machine integral machine contain human body information:
At first, the operation principle of encryption section is: image reading apparatus (7-8) directly connects ciphering unit (7-2), and scanner (7-8) reads the printing image, and this image is and the irrelevant any view data of enciphered data, is mainly used in hidden data encrypted.View data is stored in the video memory in the ciphering unit.
Human body sensor (7-5) connects human body information processing unit (7-4), and human body information processing unit (7-4) connects ciphering unit (7-2) respectively, by human body sensor reading encrypted implementer's human body information.This information can be directly as the true random number row, be used for participating in cryptographic calculation directly as key, also can after the encryption of upper level safety management person's etc. human body information, participate in cryptographic calculation again as key.Under the not high situation of security requirement, human body sensor (7-5) or human body information processing unit (7-4) can omit, and change artificial input random number series into, or read random number series in equipment.
Next, the USB interface (7-10) that is connected with the flash memory of the human body information ordered series of numbers of depositing the deciphering implementer is connected ciphering unit (7-2), reads the prior deciphering implementer's who is storing human body information by storage mediums such as flash memories.This information can be directly participates in cryptographic calculation as the true random number row, also can participate in cryptographic calculation again after the encryption of upper level safety management person's etc. human body information.Under the not high situation of security requirement, USB interface (7-10) can be omitted, and changes artificial input random number series into, or reads random number series in equipment.
The USB interface (7-6) that is connected with the flash memory of depositing the text that will encrypt is connected ciphering unit (7-2), reads the document files that will encrypt in the storage mediums such as being stored in flash memory in advance, also can directly import the document files that will encrypt.
Encrypt mapping function storehouse (7-11) and directly connect ciphering unit (7-2), the pairing numerical value in human body information random number series i position according to encipherer or deciphering person, or according to pairing position i value, or the time when encrypting, or press fixed conditions such as rule, from the mapping function storehouse, read the mapping function that is used for cryptographic calculation, carry out encryption.Binary code after encrypting is transformed into half-tone screen code with reference to figure 6, reads image data from video memory, with the principle of half-tone screen code according to the characteristic of not destroying image pixel, the pixel of half-tone screen code and image to be replaced, the information of reaching is imbedded hiding purpose.
Ciphering unit (7-2) connects facsimile machine and network communication interface (7-1), and data encrypted sends to the other side by facsimile machine and network communication interface (7-1) and network, and ciphering process finishes.
Below, introduce the operation principle of decryption portion: facsimile machine and network communication interface (7-1) and scanner (7-8) connect decrypting device (7-3), the printing image that reception or scanning means (7-8) by facsimile machine and network communication interface (7-1) reads concealed encrypted information, this view data are stored in the video memory in the decrypting device.
The USB interface (7-12) that is connected with the flash memory of depositing the human body information ordered series of numbers of encrypting the implementer is connected decrypting device (7-3), reads the prior encryption implementer's who is storing human body information by storage mediums such as flash memories.This information can be directly as the true random number row, be used for participating in decrypt operation directly as key, this key is the result after the encryption of upper level safety management person's etc. human body information also.Under the not high situation of security requirement, USB interface (7-12) can be omitted, and changes artificial input random number series into, or reads random number series in equipment.
Human body sensor (7-5) connects human body information processing unit (7-4), and human body information processing unit (7-4) connects decrypting device (7-3) simultaneously, reads deciphering implementer's human body information by human body sensor.This information can be directly as the true random number row, promptly key is participated in decrypt operation directly, this key is the result after the encryption of upper level safety management person's etc. human body information also.Under the not high situation of security requirement, human body sensor (7-5) or human body information processing unit (7-4) can omit, and change artificial input random number series into, or read random number series in equipment.
After the human body information of confirming the deciphering implementer is legal information deciphering reader, the printing image of the concealed encrypted information in the reading images memory, the half-tone screen code that is imbedded in the image is identified, half-tone screen code is transformed into binary code, be reduced into the encryption ordered series of numbers.
Deciphering mapping function storehouse (7-13) directly connects decrypting device (7-3), the pairing numerical value in human body information random number series i position according to encipherer deciphering person, or according to pairing position i value, or the time when encrypting, or by establish rules and then wait condition, read the mapping function that is used for decrypt operation from the mapping function storehouse, the mapping function of this decrypt operation is the inverse function of encrypting mapping function.Be decrypted processing, the result after obtaining deciphering.
Decrypting device (7-3) connects printing equipment (7-9), and by printer output, decrypting device (7-3) connects LAN lan interfaces (7-7), and decrypted result is outputed to terminal or server terminal or display terminal by the LAN local area network (LAN) with decrypted result.
Fig. 8 is that the Steganography information that is used for e-file is imbedded hiding schematic diagram.As shown in Figure 8, Fig. 8 (a) is the former figure of image, and Fig. 8 (b) is the bit image of the lowermost layer of Fig. 8 (a), and Fig. 8 (c) is the bit image than the high one deck of Fig. 8 (b), and Fig. 8 (d) is the bit image than the high one deck of Fig. 8 (c).As can be seen from Figure 11, Fig. 8 (b) has reflected the profile of image 8 (a) more clearlyly, and along with the raising of bit image layer, becomes chaotic distribution gradually, particularly to top image 8 (d) almost be exactly the degree of random distribution.The principle of Steganography has been utilized these characteristics exactly, imbeds information in the bit image than higher level, can make visually to be difficult for discovering.Certainly, this character only is applicable to normal photographic image data, and the electrical patterns data are not had above-mentioned characteristic.
Steganography information is imbedded hiding method and is suitable for encryption to e-file, the utility model proposes the half-tone screen code that the information conversion after encrypting is become 2 d code form as shown in Figure 6, again according to the size of Steganography bit image, form by tightly combination is arranged in a two dimensional image array with half-tone screen code, with the bit image of this two dimensional image array replacement Steganography high level, the information that just can reach e-file is imbedded hiding purpose.
Fig. 9 adds the encrypting and decrypting schematic representation of apparatus that contains human body information in computer or server.As shown in Figure 9; The operation principle that adds the encrypting and decrypting device that contains human body information in computer or the server is as follows:
At first introduce the principle of encryption section: human body sensor (9-3) connects USB interface (9-4), the true random number row of encrypting implementer's human body information are read in the random asccess memory, the true random number of human body information is listed as encrypted secret key, participate in cryptographic calculation as stochastic variable, also can after the encryption of upper level safety management person's etc. human body information, participate in cryptographic calculation again.Human body sensor (7-5) can omit when the human body information of a line mode that adopts signature, changes the random number series that contains human body information by the form input of mouse signature into.Under the not high situation of security requirement, human body sensor (7-5) or human body information processing unit (7-4) also can omit, and change into by keyboard (9-2) input random number series, or read the random number series of prior storage from harddisk memory (9-11).
The flash memory (9-9) of depositing the human body information random number series of encrypting the implementer connects USB interface (9-8), and USB interface (9-8) connects cpu motherboard (9-12), reads the prior encryption implementer's who is storing human body information by storage mediums such as flash memories.This information can be directly participates in cryptographic calculation as stochastic variable, also can participate in cryptographic calculation again after the encryption of upper level safety management person's etc. human body information.Under the not high situation of security requirement, USB interface (9-8) can be omitted, and changes into by keyboard (9-2) input random number series, or read the random number series of prior storage from harddisk memory (9-11).
The flash memory (9-6) of depositing the text that will encrypt connects USB interface (9-7), USB interface (9-7) connects cpu motherboard (9-12), read the document files that will encrypt in the storage mediums such as being stored in flash memory in advance, because keyboard (9-2) connects cpu motherboard (9-12), therefore also can directly import the document files that to encrypt.
Deposit the Steganography image that is used to imbed concealed encrypted data, the encrypting and decrypting program, encrypt the mapping function storehouse, the random asccess memory (9-10) and two-way connection of cpu motherboard (9-12) of the intermediate object program in deciphering mapping function storehouse, deposit the Steganography image that is used to imbed concealed encrypted data, the encrypting and decrypting program is encrypted the mapping function storehouse, the harddisk memory (9-11) and two-way connection of cpu motherboard (9-12) in deciphering mapping function storehouse.The pairing numerical value in human body information random number series i position according to encipherer or deciphering person, or according to pairing position i value, or time during according to encryption, or press fixed conditions such as rule, from the mapping function storehouse, read the mapping function that is used for cryptographic calculation, carry out encryption.Binary code after encrypting is transformed into half-tone screen code with reference to figure 6, from memory, read the Steganography view data that is used to imbed concealed encrypted data, size according to the Steganography bit image, form by tightly combination is arranged in a two dimensional image array with half-tone screen code, this two dimensional image array is replaced the bit image of Steganography high level, just can realize that the information of ciphered data imbeds hidingly, the information of reaching is imbedded hiding purpose.
Communication interface (9-1) and cpu motherboard (9-12) double-way connection, data encrypted sends to the other side by communication interface (9-1) and network, and data encryption process finishes.
Next introduce the principle of decryption portion: human body sensor (9-3) connects USB interface (9-4), the true random number row of deciphering implementer's human body information are read in the random asccess memory, the true random number of human body information is listed as the key of deciphering, form with stochastic variable participates in cryptographic calculation, also can after the encryption of upper level safety management person's etc. human body information, participate in cryptographic calculation again.The same, human body sensor (7-5) can omit when the human body information of a line mode that adopts signature, changes the random number series that contains human body information by the form input of mouse signature into.Under the not high situation of security requirement, human body sensor (7-5) or human body information processing unit (7-4) also can omit, and change into by keyboard (9-2) input random number series, or read the random number series of prior storage from harddisk memory (9-11).
The flash memory (9-9) of depositing the human body information random number series of encrypting the implementer connects USB interface (9-8), and USB interface (9-8) connects cpu motherboard (9-12), reads the prior encryption implementer's who is storing human body information by storage mediums such as flash memories.This information can be directly participates in cryptographic calculation as stochastic variable, also can participate in cryptographic calculation again after the encryption of upper level safety management person's etc. human body information.Equally, under the not high situation of security requirement, USB interface (9-8) can be omitted, and changes into by keyboard (9-2) input random number series, or read the random number series of prior storage from harddisk memory (9-11).
Communication interface (9-1) and the two-way binding of cpu motherboard (9-12) receive the Steganography image of concealed encrypted data by network and communication interface (9-1), and this image is stored in the random asccess memory or in the harddisk memory.
After the human body information of confirming the deciphering implementer is legal information deciphering reader, read the Steganography image of the concealed encrypted information in the memory, will be in the high bit image of Steganography, the half-tone screen code that is arranged in a two dimensional image array tightly is transformed into binary code respectively, is reduced into the encryption ordered series of numbers.
Deposit the Steganography image that is used to imbed concealed encrypted data, the encrypting and decrypting program, encrypt the mapping function storehouse, the random asccess memory (9-10) and two-way connection of cpu motherboard (9-12) of the intermediate object program in deciphering mapping function storehouse, deposit the Steganography image that is used to imbed concealed encrypted data, the encrypting and decrypting program is encrypted the mapping function storehouse, the harddisk memory (9-11) and two-way connection of cpu motherboard (9-12) in deciphering mapping function storehouse.The pairing numerical value in human body information random number series i position according to encipherer or deciphering person, or according to pairing position i value, or time during according to encryption, or press fixed conditions such as rule, from the mapping function storehouse, read the mapping function that is used for decrypt operation, be decrypted processing.
Cpu motherboard (9-12) connects display (9-5), and the result of decryption processing can be sent to display (9-5) and show, the data decryption process finishes.
Figure 10 adds the encrypting and decrypting schematic representation of apparatus that contains human body information in other communication devices such as communicating terminal.As shown in figure 10: ciphering unit (10-2) and decrypting device (10-3) connect communication interface (10-1), the text that will encrypt directly is sent to ciphering unit (10-2) by input interface circuit (10-11), deposit deciphering implementer's human body information random number series, the memory (10-6) that is used to imbed the Steganography image of concealed encrypted data connects ciphering unit (10-2), encrypt mapping function storehouse (10-8) and directly connect ciphering unit (10-2), human body sensor (10-5) connects human body information processing unit (10-4), human body information processing unit (10-4) connects ciphering unit (10-2) and decrypting device (10-3) respectively, in like manner, under the not high situation of security requirement, human body sensor (10-5) and human body information processing unit (10-4) can omit, can change into by artificial input simulation random number series, or read the random number series that is stored in advance in the equipment, deciphering mapping function storehouse (10-9) directly connects decrypting device (10-3), the memory (10-7) of depositing the human body information random number series of encrypting the implementer connects decrypting device (10-3), decrypting device (10-3) connects output interface circuit (10-10), and decrypted result is outputed to display terminal by output interface circuit (10-10).The operation principle of Figure 10 and Fig. 9 are approximate, just no longer are elaborated.

Claims (4)

1. encrypting and decrypting device that contains human body information, it is characterized in that: connect encrypting and decrypting unit (5) by communicating terminal (1), encrypting and decrypting unit (5) connects human body sensor (6), and encrypting and decrypting unit (5) connect network (7) and constitute the encrypting and decrypting communication terminal device that contains human body information; Computer (2) connects encrypting and decrypting unit (5), and encrypting and decrypting unit (5) connect human body sensor (6), and encrypting and decrypting unit (5) connect network (7) and constitute the encrypting and decrypting computer communication device that contains human body information; Server (3) connects encrypting and decrypting unit (5), and encrypting and decrypting unit (5) connect human body sensor (6), and encrypting and decrypting unit (5) connect network (7) and constitute the encrypting and decrypting server communication device that contains human body information; Facsimile machine, integral machine (4) connects encrypting and decrypting unit (5), and encrypting and decrypting unit (5) connect human body information transducer (6), and encrypting and decrypting unit (5) connect network (7) and constitute the encrypting and decrypting facsimile machine that contains human body information, integral machine communication device.
2. the encrypting and decrypting device that contains human body information according to claim 1, it is characterized in that: constitute the encrypting and decrypting facsimile machine that contains human body information, the integral machine communication device has following annexation: ciphering unit (7-2) connects facsimile machine and network communication interface (7-1), the USB interface (7-6) that is connected with the flash memory of depositing the text that will encrypt is connected ciphering unit (7-2), the scanner (7-8) of input printing image connects ciphering unit (7-2) and decrypting device (7-3) respectively, the USB interface (7-10) that is connected with the flash memory of the human body information data of depositing the deciphering implementer is connected ciphering unit (7-2), encrypt mapping function storehouse (7-11) and directly connect ciphering unit (7-2), human body sensor (7-5) connects human body information processing unit (7-4), human body information processing unit (7-4) connects ciphering unit (7-2) and decrypting device (7-3) respectively, deciphering mapping function storehouse (7-13) directly connects decrypting device (7-3), the USB interface (7-12) that is connected with the flash memory of depositing the human body information data of encrypting the implementer is connected decrypting device (7-3), decrypting device (7-3) connects printing equipment (7-9), with decrypted result by printer output, decrypting device (7-3) connects LAN lan interfaces (7-7), and decrypted result is outputed to terminal or server terminal or display terminal by the LAN local area network (LAN).
3. the encrypting and decrypting device that contains human body information according to claim 1, it is characterized in that: constitute the encrypting and decrypting computer or the server communication device that contain human body information and have following annexation: cpu motherboard (9-12) connects display (9-5), keyboard (9-2) connects cpu motherboard (9-12), communication interface (9-1) and cpu motherboard (9-12) double-way connection, human body sensor (9-3) connects USB interface (9-4), USB interface (9-4) connects cpu motherboard (9-12), the flash memory (9-6) of depositing the text that will encrypt connects USB interface (9-7), USB interface (9-7) connects cpu motherboard (9-12), the flash memory (9-9) of depositing the human body information ordered series of numbers of encrypting implementer or deciphering implementer connects USB interface (9-8), USB interface (9-8) connects cpu motherboard (9-12), deposit the Information hiding image that is used to imbed concealed encrypted data, the encrypting and decrypting program, encrypt the mapping function storehouse, the random asccess memory (9-10) and two-way connection of cpu motherboard (9-12) of the intermediate object program in deciphering mapping function storehouse, deposit the Information hiding image that is used to imbed concealed encrypted data, the encrypting and decrypting program, encrypt the mapping function storehouse, the harddisk memory (9-11) in deciphering mapping function storehouse also with two-way connection of cpu motherboard (9-12).
4. the encrypting and decrypting device that contains human body information according to claim 1, it is characterized in that: constitute the encrypting and decrypting communication terminal device that contains human body information and have following annexation: ciphering unit (10-2) and decrypting device (10-3) connect communication interface (10-1), the text that will encrypt directly is sent to ciphering unit (10-2) by input interface circuit (10-11), deposit deciphering implementer's human body information random number series, the memory (10-6) that is used to imbed the Information hiding image of concealed encrypted data connects ciphering unit (10-2), encrypt mapping function storehouse (10-8) and directly connect ciphering unit (10-2), human body sensor (10-5) connects human body information processing unit (10-4), human body information processing unit (10-4) connects ciphering unit (10-2) and decrypting device (10-3) respectively, deciphering mapping function storehouse (10-9) directly connects decrypting device (10-3), the memory (10-7) of depositing the human body information random number series of encrypting the implementer connects decrypting device (10-3), decrypting device (10-3) connects output interface circuit (10-10), and decrypted result is outputed to display terminal by output interface circuit (10-10).
CNU2007200950902U 2007-01-30 2007-01-30 High safety encryption/decryption device including human information Expired - Fee Related CN201063641Y (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNU2007200950902U CN201063641Y (en) 2007-01-30 2007-01-30 High safety encryption/decryption device including human information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNU2007200950902U CN201063641Y (en) 2007-01-30 2007-01-30 High safety encryption/decryption device including human information

Publications (1)

Publication Number Publication Date
CN201063641Y true CN201063641Y (en) 2008-05-21

Family

ID=39452028

Family Applications (1)

Application Number Title Priority Date Filing Date
CNU2007200950902U Expired - Fee Related CN201063641Y (en) 2007-01-30 2007-01-30 High safety encryption/decryption device including human information

Country Status (1)

Country Link
CN (1) CN201063641Y (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103390184A (en) * 2012-05-09 2013-11-13 天津市阿波罗信息技术有限公司 Image information embedding method suitable for anti-fake codes identified through mobile phone
CN103390183A (en) * 2012-05-09 2013-11-13 顾泽苍 Generation method for anti-fake code applied to mobile phone recognition
CN105959106A (en) * 2016-06-13 2016-09-21 四川特伦特科技股份有限公司 Low-complexity digital encryption method
CN108601021A (en) * 2018-03-13 2018-09-28 广东欧珀移动通信有限公司 Network safety managing method and Related product

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103390184A (en) * 2012-05-09 2013-11-13 天津市阿波罗信息技术有限公司 Image information embedding method suitable for anti-fake codes identified through mobile phone
CN103390183A (en) * 2012-05-09 2013-11-13 顾泽苍 Generation method for anti-fake code applied to mobile phone recognition
CN105959106A (en) * 2016-06-13 2016-09-21 四川特伦特科技股份有限公司 Low-complexity digital encryption method
CN105959106B (en) * 2016-06-13 2019-04-02 四川特伦特科技股份有限公司 A kind of low-complexity digital encryption method
CN108601021A (en) * 2018-03-13 2018-09-28 广东欧珀移动通信有限公司 Network safety managing method and Related product
CN108601021B (en) * 2018-03-13 2021-06-04 Oppo广东移动通信有限公司 Network security management method and related product

Similar Documents

Publication Publication Date Title
CN105847629B (en) A kind of reversible information hidden method of encrypted image
CN103679436B (en) A kind of electronic contract security system and method based on biological information identification
CN101030852B (en) Method for enciphering and deciphering human-body safety
CN101295343B (en) Two-dimensional code multi-enciphering anti-fake printing method
CN105323064B (en) In on line add instant file dynamic labels, encrypted system and method
CN101355684B (en) Method for transmitting and receiving image series digital content as well as transmitter and receiver
CN104253694B (en) A kind of time slot scrambling for network data transmission
Lee et al. Digital image sharing by diverse image media
CN105100083B (en) A kind of secret protection and support user's revocation based on encryption attribute method and system
Malik et al. Novel authentication system using visual cryptography
CN102063587A (en) Cloud storage data storage and retrieval method, device and system
CN101206542B (en) Ciphering signature writing pad with press keys and display screen
CN1778065A (en) Security method and apparatus using biometric data
CN107770407B (en) The image encryption method and device of joint zero watermarking insertion
Punithavathi et al. Visual cryptography: A brief survey
CN201063641Y (en) High safety encryption/decryption device including human information
CN100546239C (en) The application cryptogram diagram technology carries out method of encrypting to data
CN110493259A (en) A kind of encrypting and deciphering system and method ensureing cloud electronic data security
CN116049792A (en) Face registration and recognition method and face data protection system
CN108881300A (en) A kind of file encryption that supporting mobile phone terminal security cooperation and sharing method and system
Blesswin et al. Original Research Article Secure transmission of grayscale images with triggered error visual sharing
CN111541652B (en) System for improving security of secret information keeping and transmission
Penubadi et al. Sustainable electronic document security: A comprehensive framework integrating encryption, digital signature and watermarking algorithms
JP5767003B2 (en) Holder authentication system, holder authentication terminal, authentication image disassembling apparatus, and recording medium used for authentication of holder
Tian et al. Amount-Based Covert Communication Over Blockchain

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
DD01 Delivery of document by public notice

Addressee: Aboluo Informatin Technology Co., Ltd., Tianjin City

Document name: Notification of Passing Examination on Formalities

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20080521

Termination date: 20130130