Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Electronic data protection method and device based on biological characteristic and mobile cryptographic key

A biometric, electronic data technology, applied in the direction of public key, electrical components, character and pattern recognition of secure communication, can solve the problems of high additional risk, easy to be stolen, inconvenient memory, etc., to improve security and reliability. protective effect

Inactive Publication Date: 2009-01-14
SHENZHEN GRADUATE SCHOOL TSINGHUA UNIV
View PDF4 Cites 40 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] 1. Password protection method: In order to ensure safety performance, complex passwords must be set, which is inconvenient to remember
[0013] 2. Traditional key encryption and decryption protection methods: the encryption and decryption keys are stored in the local computer and are easy to be stolen
[0015] 4. Network-based protection method: heavily dependent on the network, with high additional risks and high maintenance costs
[0016] 5. Protection method based on biometric identification technology: the biometric template data is stored in the local computer, which is easy to steal
[0019] 2. The general protection program adopts a relatively fixed path for key storage, so that it can be called at any time (the key storage method of dynamic path is almost impossible to use, because it will greatly increase the workload of the protection program)
After that, the protection program will become a decryption program, and there will be no protection function

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electronic data protection method and device based on biological characteristic and mobile cryptographic key
  • Electronic data protection method and device based on biological characteristic and mobile cryptographic key
  • Electronic data protection method and device based on biological characteristic and mobile cryptographic key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The present invention will be described in detail below in conjunction with the accompanying drawings.

[0055] refer to Figure 5 As shown, the system of the present invention includes a local computer, a biometric feature collection device, and a mobile key device. The mobile key device can be connected to the communication interface of the local computer through a USB interface, and the biometric feature collection device is connected to the input terminal of the local computer. The software part includes user registration, data encryption, data decryption, program humanized operation style program and so on. Among them, the mobile key device such as Figure 9 , the mobile key device includes: a communication unit, whose serial data port is connected to a USB interface; memory, used to store biometric template ciphertext and its secondary key; and, a main control unit, the communication unit and the memory Connect to the corresponding port of the main control unit ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A electronic data protection method based on biological characteristic and mobile key comprises that user accesses mobile key device to local computer for register, storing mixedly of biological characteristic template ciphertext and secondary key in the device; enciphering or deciphering the access file, accessing the device for detecting communication pipeline safety; analyzing the ciphertext and secondary key, deciphering biological characteristic template using secondary cipher and returning to local computer; inputting user biological characteristic, checking validity of key ownership; if checking is passing, enciphering or deciphering the file using the biological characteristic template cleartext, or operation is forbidden. In the invention, the biological characteristic and secondary key are transferred to mobile device, correlation is introduced to key and owner, key safety is promoted. The local computer has not key and has only ciphered data, even if deciphering guard system obtains enciphered data, it can not decipher the enciphered data for lack of key.

Description

technical field [0001] The invention relates to electronic data protection technology, in particular to an electronic data protection method and device based on biometric features and mobile keys. Background technique [0002] With the development of information technology, the proportion of electronic information is getting higher and higher, and its status is becoming more and more important. With the support of electronic computers, portable digital assistants, multifunctional mobile phones and other carriers, the data volume of electronic materials has grown rapidly. How to protect the security of such a large amount of electronic data has become a prominent issue in the field of electronic information security today. [0003] The traditional electronic data security protection technology adopts the password protection mechanism. The mutual conversion of plaintext data to ciphertext data is completed through the encryption and decryption of data by passwords, so as to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L29/06G06K9/00
Inventor 林喜荣崔铭常谭汝谋李建荣黄永听
Owner SHENZHEN GRADUATE SCHOOL TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products