Data encryption and decryption method, device and electronic equipment
A data encryption and data key technology, applied in the field of data processing, can solve problems such as files cannot be decrypted normally, data cannot be used, and key security is poor
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach
[0048] As an implementation, the method may also include:
[0049] Step S150: Generate an iris key according to the encrypted file to be encrypted.
[0050] In order to further improve the security of the iris template, the encrypted file to be encrypted in the above steps generates an iris key according to the encrypted file to be encrypted, and the generation method can adopt a fuzzy algorithm or a fuzzy extractor to perform iris key generate.
[0051] Step S160: Perform secondary encryption on the iris template according to the iris key.
[0052] If carry out primary encryption to iris template in step S130 and adopt iris module (chip model is AES256 / 128) to encrypt, then in this step iris template is carried out secondary encryption and adopt national secret algorithm (SM1, SM2, SM3, SM4 , SM7) etc. to encrypt, if in step S130 the iris template is encrypted once and is to adopt national secret algorithm (SM1, SM2, SM3, SM4, SM7) etc. to encrypt, then in this step, the ir...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


