Method for confidential data encryption based on biological information authorization

A technology of biological information and confidential data, applied in the field of confidential data encryption based on biological information authorization, which can solve problems such as loss

Inactive Publication Date: 2017-05-17
JINAN INSPUR HIGH TECH TECH DEV CO LTD
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Once confidential data is leaked, it often causes irreparable losses. Therefore, access to confidential dat

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for confidential data encryption based on biological information authorization
  • Method for confidential data encryption based on biological information authorization
  • Method for confidential data encryption based on biological information authorization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention provides a confidential data encryption method based on biological information authorization:

[0027] Collect biological information data, and perform feature vector hashing processing on the biological information data,

[0028] TPM is used to generate a pair of asymmetric keys, the private key is added with hashed biological information for authorization, and the public key is used to encrypt the confidential data into ciphertext through TSS.

[0029] At the same time, the present invention also provides a confidential data encryption system based on biometric information authorization, including an acquisition unit, a data processing unit, and a data encryption unit,

[0030] Wherein the collection unit collects biological information data, and the data processing unit performs feature vector hashing processing on the biological information data collected by the collection unit,

[0031] The data encryption unit uses TPM to generate a pair of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for confidential data encryption based on biological information authorization and relates to the field of safe data access. According to the invention, biological information data is collected; the biological information data is treated by characteristics vector hash processing; TPM is used to generate a pair of asymmetric secrete keys; hashed biological information is added to a private key for authorization; a public key is used; and TSS is used to encrypt the confidential data into a ciphertext. According to the invention, reliability of a TPM hardware chip and counterfeit resistance of the biological information are combined, so the confidential data becomes safer.

Description

technical field [0001] The invention discloses a method for encrypting confidential data, which relates to the field of safe access to data, in particular to a method for encrypting confidential data based on authorization of biological information. Background technique [0002] Confidential data is information that is not to be disclosed. It generally refers to commercial secrets, research results of national scientific research institutions, central data of biological research institutions, etc. Once confidential data is leaked, it often causes irreparable losses. Therefore, access to confidential data usually enables individual users or user groups to obtain data authorization, and then read or use the data. [0003] Biometrics technology is closely combined with high-tech means such as computer and optics, acoustics, biosensors and biostatistics principles, and uses the inherent physiological characteristics of the human body, such as fingerprints, face images, irises, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62G06F21/78H04L9/08
CPCG06F21/6209G06F21/78H04L9/0866H04L9/0877
Inventor 郝虹戴鸿君于治楼
Owner JINAN INSPUR HIGH TECH TECH DEV CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products