Supercharge Your Innovation With Domain-Expert AI Agents!

Decryption method and device

A key and key storage technology, applied in the field of information processing, can solve the problems of inability to decrypt the device, poor security, and complicated operation.

Inactive Publication Date: 2018-11-23
VISIONVERA INFORMATION TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. The user needs to enter the password every time, and the operation is cumbersome; moreover, if the user forgets the password, the device cannot be decrypted;
[0005] 2. If others know the password, others can decrypt the device without the user's knowledge, which is less secure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Decryption method and device
  • Decryption method and device
  • Decryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0070] refer to figure 1 , showing the step flow of a decryption method embodiment of the present invention Figure 1, the method is applied to the first terminal, the first terminal performs data interaction with the second terminal, the first terminal has a key database, the second terminal has a face recognition data database, and the face recognition The data database includes one or more sets of face recognition data, and each set of face recognition data has an associated key.

[0071] In the embodiment of the present invention, the second terminal needs to collect face recognition data, so it has a camera, while the first terminal does not need to collect face recognition data, so it has a camera or does not have a camera....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a decryption method and device. The method is applied to a first terminal, the first terminal performs data interaction with a second terminal, the first terminal is provided with a key database, the second terminal is provided with a face recognition data database, the face recognition data database includes one or more sets of face recognition data, and each set of face recognition data respectively has keys with an association relationship. The decryption method includes the following steps: when the first terminal enters a decryption mode, sending akey acquisition request to the second terminal; receiving a key sent by the second terminal, wherein the key is matched by the second terminal from the face recognition data database; matching the key with the key database; and if a match item exists, decrypting the first terminal by using the key. According to the embodiment of the invention, the decryption of the first terminal can be implemented in the case that a user does not input a password, the cumbersome operation that the user inputs the password can be eliminated, and the user experience can be improved.

Description

technical field [0001] The present invention relates to the technical field of information processing, in particular to a decryption method and a decryption device. Background technique [0002] With the development of science and technology, the storage capacity of computing devices, such as computers and smart phones, is increasing, and users can store more and more data, but correspondingly, user privacy is becoming more and more important. [0003] In practical applications, in order to protect their privacy, users usually encrypt their devices by setting a password to prevent others from using their devices. However, this method has two disadvantages: [0004] 1. The user needs to enter the password every time, and the operation is cumbersome; moreover, if the user forgets the password, the device cannot be decrypted; [0005] 2. If others know the password, they can also decrypt the device without the user's knowledge, which is less secure. Contents of the invention...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCG06F21/32H04L9/3231H04L9/3234
Inventor 彭宇龙彭郑君韩杰乔雪
Owner VISIONVERA INFORMATION TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More