Unlock instant, AI-driven research and patent intelligence for your innovation.

Data encryption and decryption method, device and electronic equipment

A data encryption and data key technology, applied in the field of data processing, can solve problems such as files cannot be decrypted normally, data cannot be used, and key security is poor

Active Publication Date: 2019-12-06
WUHAN HONGSHI TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The mainstream encryption systems in the industry, such as PGP and True Crypt, use a mixture of multiple encryption algorithms to improve security, but these encryption systems have a significant defect, that is, if the key is forgotten or lost, the Encrypted files cannot be decrypted normally and become obsolete data and cannot be used
And in the prior art, the iris image is used to encrypt the file, and the encryption key generated by this method has the same identity. Therefore, the security of the key generated by this method is relatively poor, and the security of the data cannot be truly guaranteed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption and decryption method, device and electronic equipment
  • Data encryption and decryption method, device and electronic equipment
  • Data encryption and decryption method, device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0048] As an implementation, the method may also include:

[0049] Step S150: Generate an iris key according to the encrypted file to be encrypted.

[0050] In order to further improve the security of the iris template, the encrypted file to be encrypted in the above steps generates an iris key according to the encrypted file to be encrypted, and the generation method can adopt a fuzzy algorithm or a fuzzy extractor to perform iris key generate.

[0051] Step S160: Perform secondary encryption on the iris template according to the iris key.

[0052] If carry out primary encryption to iris template in step S130 and adopt iris module (chip model is AES256 / 128) to encrypt, then in this step iris template is carried out secondary encryption and adopt national secret algorithm (SM1, SM2, SM3, SM4 , SM7) etc. to encrypt, if in step S130 the iris template is encrypted once and is to adopt national secret algorithm (SM1, SM2, SM3, SM4, SM7) etc. to encrypt, then in this step, the ir...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Data encryption and decryption methods and apparatuses, an electronic device and a readable storage medium relate to the field of data processing. The data encryption method comprises: obtaining an iris image of a user; generating an iris template according to the iris image; generating a data key according to the iris template, and encrypting the iris template; and encrypting an obtained file to be encrypted according to the data key. As an iris template can be generated according to an iris image, a different data key can be generated for each different file to be encrypted according to a different iris template generated each time. Therefore, the security of data keys and the security of data are improved.

Description

technical field [0001] The present invention relates to the field of data processing, in particular to a data encryption and decryption method, device and electronic equipment. Background technique [0002] With the development of science and technology, computers, mobile phones, radio frequency cards and other storage media are used more and more widely, in which a large number of electronic documents of different types and involving highly confidential information are stored. Once this information is illegally stolen, it will cause immeasurable losses. , and the current common practice is to use various document security software to encrypt data. The mainstream encryption systems in the industry, such as PGP and True Crypt, use a mixture of multiple encryption algorithms to improve security, but these encryption systems have a significant defect, that is, if the key is forgotten or lost, the Encrypted files cannot be decrypted normally and become obsolete data that cannot...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/06H04L9/08H04L9/14
CPCH04L9/0631H04L9/0643H04L9/0866H04L9/088H04L9/14H04L63/0478
Inventor 易开军高俊雄托马斯·费尔兰德斯刘黎罗恒
Owner WUHAN HONGSHI TECH