Encrypting method base on biology characteristic information

A biometric information and encryption method technology, applied in the field of single-factor encryption based on biometric information and encryption based on biometric information, can solve the impact of system security, improve the system error acceptance rate, and not provide enough strong data integrity Check function and other problems, to achieve the effect of improving system security, reducing system error acceptance rate, and realizing high-strength integrity check

Inactive Publication Date: 2009-01-21
XIDIAN UNIV
View PDF0 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the encryption key chosen by the user is not random or always chooses the same key, the security of the system will be greatly affected
In addition, the existing bio-based encryption methods all have a shortcoming, that is, they do no

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypting method base on biology characteristic information
  • Encrypting method base on biology characteristic information
  • Encrypting method base on biology characteristic information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0063] The specific implementation of the two-factor encryption and decryption based on biometric information and key provided by the present invention is as follows:

[0064] 1) Encryption process

[0065] Such as figure 1 As shown, use the key selected by the user and the user's biometric information E to bind a random number R randomly generated by the system to encrypt the plaintext information MSG to obtain the ciphertext information CMSG, which specifically includes the following implementation steps:

[0066] 1.1) The user randomly selects a key Key and provides the user's biometric information E;

[0067] 1.2) Use a random number generator to generate a random number R, and derive an encryption key K from the random number R 1 and an integrity check key K 2 ;

[0068] 1.3) Using encryption key K 1 Encrypt MSG to obtain information C, and use integrity verification key K 2 Calculate the integrity check code MIC for MSG, that is, perform MIC calculation;

[0069] ...

Embodiment 2

[0081] The specific implementation of the single-factor encryption and decryption based on biometric information provided by the present invention is as follows:

[0082] 1) Encryption process

[0083] Such as image 3 As shown, the user encapsulates a random number R randomly generated by the system through the biometric information E to encrypt the plaintext information MSG to obtain the information ciphertext CMSG, which specifically includes the following implementation steps:

[0084] 1.1) The user provides his own biological characteristic information E;

[0085] 1.2) Use a random number generator to generate a random number R, and derive an encryption key K from the random number R 1 and an integrity check key K 2 ;

[0086] 1.3) Using encryption key K 1 Encrypt MSG to obtain information C, and use integrity verification key K 2 Calculate the integrity check code MIC for MSG, that is, perform MIC calculation;

[0087] 1.4) Use the biometric information E to encap...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to an encryption method based on biometric information. The encryption method provides a dual-factor encryption method based on the biometric information and the secret key, and a single-factor encryption method based on the biometric information. And the encryption method can be used in the fields of network and information security, bio-certification, biometric encryption, and so on. The dual-factor encryption and decryption of the information by the user both require the biometric information and the secure secret key or password which is automatically selected; if either of the biometric information and the secure secret key is not correct, the correct plaintext information can not be decrypted. The single-factor encryption and decryption of the information by the user only requires the biometric information. The encryption method can prevent the non-intended message recipient from decrypting the information; the attacker who obtains the decryption key of the other people can not complete the correct decryption process; the decryption process and the physical identity verification are completed simultaneously; the legitimacy of the identity of the decrypting person is verified; and the system has higher security.

Description

technical field [0001] The invention belongs to the technical field of information security and biometric identification, and relates to an encryption method based on biometric information, which can be a two-factor encryption method based on biometric information and a traditional key, or a biometric-based encryption method. The single-factor encryption method of information can be applied to fields such as network and information security, biometric authentication, and biometric encryption. Background technique [0002] Today's society is a highly informationized and networked society, and information has become an indispensable and important resource in people's daily life. For example, everyone can have their own digital identity on the Internet, and use such a digital identity to replace themselves. In addition, people can use this digital identity to engage in various activities on the Internet every day, such as: online shopping, fund transfer, online meeting and so ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06G06K9/00
Inventor 庞辽军裴庆祺梁继民田捷陈宏涛刘而云李晖谢敏李慧贤范科峰张宏斌陈晨傅晓彤张志勇赵晓辉
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products