Anti-leakage cloud storage method of address list hidden in irises

A cloud storage and address book technology, applied to electrical components, transmission systems, etc., to reduce the probability of data loss, protect user privacy, and achieve the effect of multi-cloud anti-leakage security storage

Inactive Publication Date: 2016-03-09
HUBEI UNIV OF TECH
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention makes full use of the advantages of cloud storage, solves the potential safety hazards of cloud backup of address books in mobile devices, and provides an anti-leakage cloud storage solution and system for iris-hidden address books. The problem of leakage and single point of failure can effectively prevent server administrators from stealing information and data security issues; on the other hand, using the camera of the mobile device to collect the iris of the user and encrypt the key of the user data improves the security of cloud storage data. security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-leakage cloud storage method of address list hidden in irises
  • Anti-leakage cloud storage method of address list hidden in irises
  • Anti-leakage cloud storage method of address list hidden in irises

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The following is a detailed description of the program process in conjunction with the accompanying drawings, mainly based on the embodiments of this program, and describes the core process of the program. Under the premise of no innovative work, all implementation steps of this program are carried out by those skilled in the art. scope of protection.

[0033] Such as figure 2 , Step 1: Binding stage, this step is used for the user to register when the plan is executed for the first time and for the user to update the address book during the use of the plan.

[0034] Step 1.1 collects the iris; this method uses the existing iris recognition technology to collect the iris. First, the iris of the user is scanned by using the camera of the mobile device to obtain an iris image P. The iris image P is normalized, positioned and enhanced to obtain the biometric feature C.

[0035] Step 1.2 binds the address book; this method is based on traditional key binding systems suc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an anti-leakage cloud storage method of an address list hidden in irises. Directing at an address list in a mobile device, and combined with an iris identification technology and a cryptography data storage method, safe cloud storage of the address list is realized. The anti-leakage cloud storage method of the address list hidden in irises effectively solves the single-point failure problem and information leakage problem caused by single encryption of a file, and improves security and anti-leakage performance of cloud storage.

Description

technical field [0001] The invention relates to the fields of cloud storage and address book security backup, in particular to an anti-leakage cloud storage method for iris-hidden address books. Background technique [0002] With the continuous development of technology, mobile devices are gradually playing an increasingly important role, and mobile devices store a large amount of user information (pictures, text messages, account numbers, address books). In order to ensure the security of the information stored in the mobile device and prevent the loss or damage of the mobile device, the information cannot be recovered. The usual method for users is to back up the data in the mobile device. Due to the continuous development of cloud computing concepts and the maturity of cloud storage (online storage) technology, cloud storage provides users with a more convenient and fast method to realize data cloud storage. Users can directly back up information and data to cloud server...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0428H04L63/0861H04L67/1097
Inventor 张明武陈泌文蒋炎姚瑶徐继开
Owner HUBEI UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products