Unlock instant, AI-driven research and patent intelligence for your innovation.

Information decryption method and device

A technology for information decryption and information matching, applied in the field of information decryption methods and devices, can solve problems such as improving the hardware requirements of mobile terminals, and achieve the effect of reducing difficulty and requirements

Inactive Publication Date: 2017-05-31
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the iris recognition system requires the user's eyes to face the screen to ensure that the user's iris information is collected, mobile terminals with an iris recognition system are also equipped with devices that detect whether the user's eyes are facing the mobile phone. , which also increases the hardware requirements of the mobile terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information decryption method and device
  • Information decryption method and device
  • Information decryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] see figure 1 , the information decryption method provided by the embodiment of the present invention includes:

[0027] S1: Receive the encrypted information sent by the server;

[0028] S2: Using wearable devices to obtain iris information;

[0029] S3: judging whether the obtained iris information matches the pre-stored iris information;

[0030] When the obtained iris information matches the pre-stored iris information, the encrypted information is decrypted according to the iris information; otherwise, the encrypted information is not decrypted.

[0031] Through the process of the information decryption method provided in the above-mentioned embodiments, it can be seen that since the wearable device is used to obtain the iris information, when the wearable device is used to obtain the user's iris information, the user only needs to wear the wearable device, and the eyes and the wearable device can be automatically realized. The alignment of the display screen in ...

Embodiment 2

[0038] see Figure 1 ~ Figure 3 , the present embodiment provides an information decryption device, which includes a receiving unit 1, a decryption unit 2 and an iris recognition unit 3; wherein,

[0039] The receiving unit 1 is used to receive the encrypted information sent by the server;

[0040] The iris recognition unit 3 is used to obtain iris information by using a wearable device, and judge whether the obtained iris information matches the prestored iris information;

[0041] The decryption unit 2 is configured to decrypt the encrypted information received by the receiving unit 1 according to the iris information when the obtained iris information matches the pre-stored iris information.

[0042] The implementation process of the information decryption device provided by this embodiment will be described in detail below with reference to the accompanying drawings.

[0043] S1: receiving unit 1 receives the encrypted information sent by the server;

[0044] S2: the ir...

Embodiment 3

[0065] see Figure 5 , the embodiment of the present invention provides a mobile terminal, including a processor 601, a memory 602, a transceiver 603, and a bus 604, and the processor 601, the memory 602, and the transceiver 603 communicate with each other through the bus 604;

[0066] Wherein, the transceiver 603 is used to receive the encrypted information sent by the server, and receive the iris information sent by the wearable device; the processor 601 is used to judge whether the obtained iris information matches the pre-stored iris information; When the obtained iris information matches the pre-stored iris information, the encrypted information is decrypted according to the iris information; the memory 602 is used to store the decrypted information. The memory 602 is also used to store program codes required by the processor to implement the information decryption method.

[0067] Further, the processor 601 is configured to obtain an iris feature value according to the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of information security, and discloses an information decryption method and device, which aims to reduce both the difficulty in decrypting encrypted information and hardware requirements. The method comprises the following steps: receiving the encrypted information sent by a server, and acquiring iris information through wearable equipment; judging whether the acquired iris information is matched with pre-stored iris information or not; and if the acquired iris information is matched with the pre-stored iris information, decrypting the encrypted information according to the iris information. The information decryption device implements the method adopting the technical scheme. The information decryption method provided by the invention is used for decryption of the encrypted information.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to an information decryption method and device. Background technique [0002] With the development of Internet applications, people can already use the Internet for learning, shopping, leisure, financial management and other operations, but when performing these operations, it is generally necessary to register personal identity information first, log in to the corresponding website or client, and then start Therefore, how to ensure information security has become a topic of special concern to network users. [0003] At present, the general practice is that the server encrypts the private key with the iris information obtained by the user during registration, then encrypts the communication information with the public key, and sends the communication information to the user's mobile terminal. After the information reading request, use the iris recognition syste...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
CPCH04L9/0866
Inventor 梁文栋
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD