USB flash disk fingerprint authentication encryption method

A fingerprint authentication and encryption method technology, applied in the field of information security, can solve the problems of reduced security, effective information exposure, etc., and achieve the effect of reducing possibility, easy to use, and strong encryption performance

Inactive Publication Date: 2016-07-27
GUIZHOU UNIV
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] The technical solution of prior art 1 realizes restricting access to the U disk through fingerprint identification technology, but its fingerprint identification and file encryption are separated, that is, the authentication is completed through the comparison of fingerprint feature values, and the encryption key is used to implement the symmetric encryption algorithm. File encryption, it needs to store at least two information of fingerprint feature value and encryption key to complete the normal use of the U disk. The more files are stored in this way, the greater the possibility of effective information exposure, and the fingerprint authentication and encryption and decryption processes are separated , leading to reduced security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • USB flash disk fingerprint authentication encryption method
  • USB flash disk fingerprint authentication encryption method
  • USB flash disk fingerprint authentication encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] Embodiment 1: as Figure 1~Figure 3 Shown, a kind of U disk fingerprint authentication encryption method, this method comprises the following steps:

[0035] (1) Fingerprint extraction: insert the U disk, and use the fingerprint extraction device on the U disk to extract fingerprints;

[0036] (2) Generate fingerprint feature value: convert the fingerprint in step (1) into fingerprint feature value through the fingerprint feature value module;

[0037] (3) Encryption module: convert the fingerprint feature value in step (2) into a salted hash value and a normal hash value through the hash conversion module, store the salted hash value in the hidden area, and the U disk is powered on. It will write data to the encrypted area and trigger the encryption module connection;

[0038] (4) Pull out the U disk: the U disk capacitor supplies power, and uses a symmetric encryption algorithm to encrypt the confidential drive letter, and the U disk encryption is completed.

[003...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a USB flash disk fingerprint authentication encryption method. According to the method, fingerprint features of a user are extracted; a hash value is converted by adopting a hash algorithm; registering encryption is carried out by adopting a symmetric encryption algorithm; and when a USB flash disk is used next time, conversion is carried by using the extracted fingerprint features, thus realizing the comparison decryption process of the hash value. According to the method, the extracted fingerprint features are used for producing a secret key through adoption of the pseudo-random number generation symmetric encryption algorithm; a file is encrypted and decrypted by using the secrete key; in this way, only a fingerprint feature value needs to be stored; the occupancy of a storage space is recued; an information quantity is reduced; the possibility of exposing the effective information is reduced; the security of a system is improved; and the secrete quantity of the symmetric encryption algorithm reaches 128 bits, therefore, the encryption performance is high, the security is high, and the information is effectively prevented from being leaked.

Description

technical field [0001] The invention relates to a U disk fingerprint authentication and encryption method, which belongs to the field of information security. Background technique [0002] The fingerprint sensor integrated on the first-generation fingerprint identification mobile U disk is based on the capacitive fingerprint acquisition sensor, which solves the problem of living body identification better than the previous optical sensor, and can prevent fingerprints from being deceived by false fingerprint information. system problem. The first generation of fingerprint recognition U disk is just a simple fingerprint to open the disk, fingerprint lock disk, and the driver of the fingerprint sensor needs to be installed when using it. The fingerprint sensor of the second-generation fingerprint recognition U disk is based on a sliding sensor, which greatly reduces product cost and finished product volume, and adds simple additional functions, such as file encryption and decr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/78G06F21/44G06F21/60G06F21/32
CPCG06F21/32G06F21/44G06F21/602G06F21/78G06F2221/2107
Inventor 彭长根李雪松田有亮刘少彬丁红发
Owner GUIZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products