Processing method for enciphered data, and apparatus thereof

A technology of encrypting data and processing methods, applied in digital data authentication, user identity/authority verification, electrical components, etc., can solve the problems of obtaining and not being able to guarantee the correct user of the user, so as to avoid theft and improve security Effect

Active Publication Date: 2015-10-07
TENCENT TECH (SHENZHEN) CO LTD +1
View PDF7 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in actual scenarios, even if biometric passwords such as fingerprint passwords and iris passwords are used, it can only guarantee that the user is the correct user at the moment of data collection, but cannot

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Processing method for enciphered data, and apparatus thereof
  • Processing method for enciphered data, and apparatus thereof
  • Processing method for enciphered data, and apparatus thereof

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0066] In order to further illustrate the technical means and effects of the present invention to achieve the intended purpose of the invention, the present invention will be further described in detail below with reference to the accompanying drawings and preferred embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0067] The embodiment of the present invention provides a method for outputting encrypted data, which can be used in an electronic terminal. Specific examples of the electronic terminal include, but are not limited to, personal computers, tablet computers, mobile phones, e-book readers, and wearable electronic devices.

[0068] figure 1 It is a structural block diagram of an electronic terminal provided by an embodiment of the present invention. Such as figure 1 As shown, the electronic terminal 100 includes a memory 102, a processor 104, a storage...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a processing method for enciphered data. The processing method for enciphered data is arranged in a first electronic terminal, and includes acquiring the first biological characteristic data of the current user through a sensor after receiving a command for outputting enciphered data; decrypting the enciphered data by means of a first secret key which is generated from the first biological characteristic data; outputting the decrypted data if the enciphered data is decrypted successfully; and detecting whether the identity of the current user changes after outputting the decrypted data, and stop outputting the decrypted data if changes of the identity of the current user are detected. The above method can improve the security of data. In addition, the invention also provides a processing apparatus for enciphered data.

Description

technical field [0001] The invention relates to data encryption technology, in particular to a method and device for outputting encrypted data. Background technique [0002] Security verification and encryption technologies are widely used in computer and network systems. Taking mobile devices as an example, widespread password verification scenarios include screen lock passwords, application login passwords, and so on. The specific passwords can be text passwords, voice passwords, gesture passwords, fingerprint passwords, iris passwords, and the like. [0003] A widespread problem in the password verification technology of the prior art is that the user obtains the corresponding authority after the password verification is passed, and the system assumes that the user is the same person during the entire login session is active. However, in actual scenarios, even if biometric passwords such as fingerprint passwords and iris passwords are used, it can only guarantee that th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06G06F21/32
Inventor 林陆一高晓洁
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products