Supercharge Your Innovation With Domain-Expert AI Agents!

Communication method and system based on comprehensive identification encryption technology

A communication method and technology for encrypting information, applied in the field of communication methods and systems of encryption technology, can solve problems such as the inability of encryption passwords to be universal, and cannot meet the encryption requirements of different files, so as to achieve convenient confidential communication, high information protection security, and intelligent high degree of effect

Inactive Publication Date: 2019-05-17
上海星地通讯工程研究所
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the existing encryption passwords cannot be commonly used on the first mobile terminal and the second mobile terminal, and cannot meet the different encryption requirements of different files.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication method and system based on comprehensive identification encryption technology
  • Communication method and system based on comprehensive identification encryption technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] Such as figure 1 Shown, a kind of communication method based on the encryption technique of comprehensive identification, it comprises the following steps:

[0063] S1. The second mobile terminal receives the encrypted information sent by the first mobile terminal; pre-stores the decrypted information of the second mobile terminal, the decrypted information includes voiceprint information, fingerprint information and password information of legal users; sets each decrypted information and decrypted information Combined decryption authority weight.

[0064] Optionally,

[0065] In the step S1:

[0066] The decryption authority weights of each decryption information and combination of decryption information are as follows: the weight of voiceprint information is 1.5, the weight of fingerprint information is 1.5, the weight of password information is 1, and the weight of combination of voiceprint information and fingerprint information is 3. The weight of the combinatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provided are a communication method and system based on a comprehensively recognized encryption technology. The method comprises the steps that 1, decryption information of a second mobile terminal is prestored, and decryption permission weights of the decryption information and decryption information combinations are set, wherein the decryption information comprises voiceprint information, fingerprint information and password information of a legitimate user; 2, effective duration lengths of the decryption information are set; 3, any one or more of the voiceprint information, the fingerprint information and the password information on the second mobile terminal are monitored in real time; 4, when any one or more of the voiceprint information, the fingerprint information and the password information which are matched with the decryption information, whether the information is within the effective duration lengths of the decryption information and the decryption information combinations or not is judged, and if yes, a decryption operation instruction is generated according to the decryption permission weights of the decryption information and decryption information combinations and the effective duration lengths of the decryption information, decryption operation is executed according to the decryption operation instruction, otherwise, the user is prompted that decryption cannot be conducted. The invention further provides the communication system based on the comprehensively recognized encryption technology.

Description

technical field [0001] The present invention relates to the technical field of information encryption, in particular to a communication method and system based on the encryption technology of comprehensive identification. Background technique [0002] As the functions of the second mobile terminal become more and more perfect, the role played by the second mobile terminal in people's daily life becomes more and more important. At the same time, the security of the second mobile terminal and the privacy of the user are more and more concerned. At present, most of the second mobile terminals support the encryption function, including support for the encryption function of the screen of the second mobile terminal, such as the current password lock screen function; support for the encryption function of the files in the second mobile terminal, such as the current Album, photo album encryption function and so on. [0003] However, the existing encryption passwords cannot be comm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/32G06F21/31G06F21/60H04L29/06
CPCG06F21/31G06F21/32G06F21/602G06F2221/2107G06F2221/2113H04L63/0428H04L63/0861H04L63/105
Inventor 杨柳徐阿宏何异
Owner 上海星地通讯工程研究所
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More