Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Document encryption/decryption method and apparatus based on iris recognition and authentication

An iris recognition, encryption and decryption technology, applied in digital data authentication, computer security devices, instruments, etc., can solve the problem that full-disk encryption is not very mature, and cannot effectively distinguish between personal files and enterprise file data classification management, so as to eliminate potential safety hazards , No security risks, the effect of preventing interception

Inactive Publication Date: 2016-03-30
南京以太安全技术有限公司
View PDF4 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Relatively speaking, disk encryption technology is not yet very mature to truly achieve full disk encryption.
[0006] (3) Compared with the previous two encryption methods, driver-level encryption adopts process encryption technology to encrypt all similar files, which cannot effectively distinguish between personal files and corporate file data classification management, and parallel operation of personal computers and corporate offices.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Document encryption/decryption method and apparatus based on iris recognition and authentication
  • Document encryption/decryption method and apparatus based on iris recognition and authentication
  • Document encryption/decryption method and apparatus based on iris recognition and authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary and are intended to explain the present invention and should not be construed as limiting the present invention.

[0031] The invention proposes a document encryption and decryption method and device based on iris recognition and authentication, which uses the combination of biological iris recognition and software processing to encrypt and decrypt documents, data and information. Users don't need to worry about forgetting their passwords or being protected by documents cracked by others. Because the user's "eye" (iris) is the secret key, without the user's authorization, others cannot perform any operations on the document.

[0032] Such as...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a document encryption / decryption method and apparatus based on iris recognition and authentication. The method comprises: collecting an iris image of a user, generating iris feature data after analyzing and processing the iris image, and registering the iris feature data into an iris information feature library; encrypting a document by using the iris feature data as a key; and after it is detected that the document is requested to be decrypted, determining whether a living body iris image is collected, if so, carrying out feature extraction on the living body iris image, acquiring iris feature data corresponding to the living body iris image, comparing the iris feature data of the living body iris image with the iris feature data corresponding to the document in the iris information feature library, and if iris feature data of the living body iris image are consistent with the iris feature data corresponding to the document, then decrypting the document, otherwise, prompting that the decryption fails. According to the document encryption / decryption method and apparatus based on iris recognition and authentication, the iris image with uniqueness can be used to carry out identity recognition, thereby triggering an encryption and decryption algorithm to realize security management for the document. The entire encryption / decryption process is simple, convenient and free of potential security hazards.

Description

technical field [0001] The invention relates to the technical field of iris recognition and authentication, in particular to a document encryption and decryption method and device based on iris recognition and authentication. Background technique [0002] Document encryption and decryption are the main force of today's information security protection. Transparent encryption and decryption technology is used to enforce data encryption without changing the user's original usage habits. This technology encrypts the data itself. Whether it is separated from the operating system or illegally separated from the security environment, the user data itself is safe, and the dependence on the environment is relatively small. The main document encryption technologies on the market are divided into several encryption technologies such as disk encryption, application layer encryption, and driver level encryption. [0003] However, there are some problems with the above-mentioned document...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/60G06F21/32
CPCG06F21/6209G06F21/32G06F21/602
Inventor 陈会颜崔航张娟王文军
Owner 南京以太安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products