Secret key control method in encrypted storage equipment for fingerprint authentication

A technology of fingerprint authentication and encrypted storage, which is applied in the direction of user identity/authority verification, instrument, character and pattern recognition, etc. It can solve the problems of key cracking in encrypted storage devices, achieve the effect of protecting working keys and improving security

Active Publication Date: 2013-06-05
AEROSPACE INFORMATION
View PDF6 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is to provide a key control method in an encrypted storage device for fi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key control method in encrypted storage equipment for fingerprint authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0030] The method of the present invention extracts the protection key from the fingerprint feature data calculated when registering the fingerprint through the BIT level splitting method, uses the protection key to encrypt and protect the working key for data encryption and decryption, and then encrypts the protection key The plaintext of the key and the working key is destroyed, and only the ciphertext of the working key is saved, so as to achieve the purpose of protecting the working key.

[0031] Such as figure 1 As shown, a key control method in an encrypted storage device for fingerprint authentication of the present invention includes:

[0032] Step 110, input the fingerprint, and extract the protection key of the fingerprint from the fingerprint feature value of the fingerprint database;

[0033] The protection key for extracting the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secret key control method in encrypted storage equipment for fingerprint authentication. The secret key control method comprises the steps of inputting a fingerprint, extracting a protection secret key of the fingerprint from the fingerprint characteristic value of a fingerprint database, conducting encipherment protection to a working secret key for data encryption and decryption through the obtained protection secret key, deleting the protection secret key and the working secret key, and obtaining encrypted working secret key cipher text. By using the secret key control method in the encrypted storage equipment for the fingerprint authentication, the problem that the secret key in the encrypted storage equipment is deciphered by attackers currently is solved.

Description

technical field [0001] The invention relates to the field of data encryption, in particular to a key control method in an encrypted storage device used for fingerprint authentication. Background technique [0002] Using data encryption technology to protect the data in the storage device is an effective method. After encrypting the data and storing it in the form of cipher text in the storage device, at the same time, the storage device is equipped with an identity authentication function, which can prevent unauthorized persons from access the data in the storage device. With the increasing maturity of fingerprint identification technology, the use of human fingerprints can be used to authenticate users conveniently, quickly, safely and reliably. [0003] Although it is effective to use data encryption technology to protect data security, its security mainly depends on the security of the key. The key is the key parameter to control the encryption and decryption algorithm....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32G06K9/00
Inventor 陈懿高志刚孟凡涛周强赵伟柳鹏贺正林张卉张晓佳
Owner AEROSPACE INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products