Method for performing identity authentication and file encryption and decryption based on fingerprint UsbKey

An identity authentication, encryption and decryption technology, applied in the field of identity authentication and file encryption and decryption based on fingerprint UsbKey, can solve the problems of small cracking, easy password cracking, and troublesome application operation, so as to improve the identification method and realize encryption protection. , the effect of easy authentication

Inactive Publication Date: 2014-09-03
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

General users are reluctant to use these applications because they are cumbersome to operate, not tightly integrated with the overall system, and vulnerable to attacks.
[0004]Current network identity authentication methods are divided into single-factor authentication / two-factor authentication / multi-factor authentication. The more factors, the higher the security. The most widely used single-factor authentication is password , it has security risks such as small difficulty in cracking, hard to remember, and the same password for multiple accounts; two-factor authentication methods include USB-KEY / IC card / dynamic password card, etc. The most typical method of multi-factor authentication is certificate + usbkey, they There are potential safety hazards such as easy loss, difficult accountability, and easy password cracking; the fingerprint UsbKey+ certificate just solves the above problems, so the fingerprint UsbKey+ certificate is the most secure and convenient way in multi-factor authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for performing identity authentication and file encryption and decryption based on fingerprint UsbKey
  • Method for performing identity authentication and file encryption and decryption based on fingerprint UsbKey

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention will be described in detail below through specific embodiments and accompanying drawings. The present invention is a method for identity authentication and file encryption and decryption based on fingerprint UsbKey. In the server security environment, since the password and key file are stored in the server file, it is easy to forget or lose. Once lost, it may not be possible to log in. to the security management platform or unable to use encrypted files, causing losses to customers. Therefore, in the process of identity authentication and file encryption and decryption, using the fingerprint of the administrator will not cause the situation of forgetting and losing, and if the administrator changes, it can be reconfigured through the UsbKey management software, realizing safe and convenient Identity authentication and file encryption and decryption methods.

[0035] Working principle of the present invention:

[0036] 1. During identity authenti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for performing identity authentication and file encryption and decryption based on a fingerprint UsbKey, relating to the field of computer information security. A memory unit, a fingerprint identifier and an indication light are integrated on U disc-like equipment with USB interfaces, configuration management is performed by special PC (personal computer for running Windows, Linux and other normal operation systems) terminal management software, and the U disc-like equipment has a memory function of an ordinary U disc, enables a user to perform identity authentication and file encryption and decryption through fingerprints and also can be taken as the ordinary U disc. Password and key management are performed by the safe and convenient method, and loss caused by the fact that a password or a key is lost is avoided.

Description

[0001] technical field [0002] The invention relates to a method for realizing identity authentication and file encryption and decryption based on fingerprint UsbKey, which belongs to the field of computer information security. By integrating a storage unit, a fingerprint reader, and an indicator light on a U disk-like device with a USB interface, the method is controlled by a special PC. (Personal computers running Windows, Linux and other common operating systems) UsbKey management software to configure and manage, with the storage function of ordinary U disks, so that users can quickly and conveniently perform identity authentication and file encryption and decryption through fingerprints. Background technique [0003] In recent years, with the popularity of personal computers and office automation, protecting sensitive files from leakage has become a hot issue that people pay attention to. In addition to directly stealing physical storage devices, intruders can also s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06F21/34
CPCG06F21/32G06F21/34G06F2221/2107
Inventor 杨晨光
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products