Encrypting method base on biology characteristic information
A biometric information and encryption method technology, applied in the field of single-factor encryption based on biometric information and encryption based on biometric information, can solve the impact of system security, improve the system error acceptance rate, and not provide enough strong data integrity Check function and other problems, to achieve the effect of improving system security, reducing system error acceptance rate, and realizing high-strength integrity check
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0063] The specific implementation of the two-factor encryption and decryption based on biometric information and key provided by the present invention is as follows:
[0064] 1) Encryption process
[0065] Such as figure 1 As shown, use the key selected by the user and the user's biometric information E to bind a random number R randomly generated by the system to encrypt the plaintext information MSG to obtain the ciphertext information CMSG, which specifically includes the following implementation steps:
[0066] 1.1) The user randomly selects a key Key and provides the user's biometric information E;
[0067] 1.2) Use a random number generator to generate a random number R, and derive an encryption key K from the random number R 1 and an integrity check key K 2 ;
[0068] 1.3) Using encryption key K 1 Encrypt MSG to obtain information C, and use integrity verification key K 2 Calculate the integrity check code MIC for MSG, that is, perform MIC calculation;
[0069] ...
Embodiment 2
[0081] The specific implementation of the single-factor encryption and decryption based on biometric information provided by the present invention is as follows:
[0082] 1) Encryption process
[0083] Such as image 3 As shown, the user encapsulates a random number R randomly generated by the system through the biometric information E to encrypt the plaintext information MSG to obtain the information ciphertext CMSG, which specifically includes the following implementation steps:
[0084] 1.1) The user provides his own biological characteristic information E;
[0085] 1.2) Use a random number generator to generate a random number R, and derive an encryption key K from the random number R 1 and an integrity check key K 2 ;
[0086] 1.3) Using encryption key K 1 Encrypt MSG to obtain information C, and use integrity verification key K 2 Calculate the integrity check code MIC for MSG, that is, perform MIC calculation;
[0087] 1.4) Use the biometric information E to encap...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com