Method and system for protecting data based on iris identification

An iris recognition and iris technology, applied in the field of information security, can solve problems such as slow data reading speed, fragile data, and insufficient security, and achieve the effects of protecting security, solving data security, and fast data security

Inactive Publication Date: 2013-06-26
苏州九光信息科技有限公司
View PDF2 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In view of the shortcomings of the prior art described above, the purpose of the present invention is to provide a method and system for protecting data based on iris recognition, which is used to solve the security problems existing in data protection in the prior art, due to encryption and decryption. The data reading speed is slow and the data is easily damaged

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for protecting data based on iris identification
  • Method and system for protecting data based on iris identification
  • Method and system for protecting data based on iris identification

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0043] see figure 1 , which is a schematic flowchart of a method for protecting data based on iris recognition in the present invention. Such as figure 1 As shown, the present embodiment provides a method for protecting data based on iris recognition, and the method at least includes the following steps:

[0044] S1, collecting iris information and storing the collected iris information.

[0045] S2, when accessing or operating data, perform iris letter collection and identification.

[0046] S3, comparing and analyzing the identified iris information with the stored iris information.

[0047] S4, according to the comparative analysis results, control the access or operation to the data.

[0048] Steps S1 to S4 will be described in detail below.

[0049] [Step S1] Collect iris information and store the collected iris information.

[0050] The iris of the human eye is as unique as the fingerprint of the finger. It is impossible to surgically change the characteristics of th...

no. 2 example

[0071] see Figure 3 to Figure 4 , which is a schematic structural diagram of a system for protecting data based on iris recognition and a preferred structural diagram of the present invention. This embodiment is to realize the method in the first embodiment, such as image 3 As shown, the present embodiment provides a system for protecting data based on iris recognition, and the system 1 for protecting data includes: an iris collector 11, an iris information storage module 12, a client 13, and a data storage and processing module 14 .

[0072] The iris collector 11 collects and identifies iris information. In this embodiment, after the iris is collected by the iris collector 11, the iris collector 11 recognizes the collected iris, and the iris recognition is to convert the visual feature of the iris into a 512-byte Iris Code (iris code), This iris code is stored for later identification. The collection and identification of irises are disclosed in the prior art, and will ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a system for protecting data based on iris identification. The system for protecting the data based on iris identification comprises an iris collector which is used for collecting and identifying iris information, an iris information storage module which reads information from the iris collector and stores the iris information, a client-side which is used for data access or operation, and a data storage and processing module which is used for storing data and comparing the iris information read from the client-side with the iris information stored in the iris information storage module and analyzing the information to control access or operation to data from the client-side, wherein when the client-side accesses or operates data, the iris collector collects iris and outputs the iris to the client-side. According to the method and the system for protecting the data based on iris identification, operation permission is controlled, data self cannot be changed, and the speed cannot be influenced due to huge encrypted and decrypted data. Therefore, the method and the system for protection data based on iris identification are stable and the data security problem is solved conveniently and rapidly.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and system for protecting data based on iris recognition. Background technique [0002] The wave of electronic informatization marked by computers, networks and mobile storage devices has covered all aspects of social life, greatly liberating productivity and improving the speed and effectiveness of information interaction. The security issues brought about by informatization have also brought certain troubles to enterprises, especially the illegal misuse of information, including employees selling documents to competitors and illegal data theft. [0003] At the same time, more and more diversified data transmission methods pose a great threat to data security. Various data encryption vendors have become the protagonists in this crisis. Today, when the encryption algorithm is made public, the key acts as a key and a lock. The so-called key refers to both pa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06F21/62
Inventor 耿振民杨磊
Owner 苏州九光信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products