Unlock instant, AI-driven research and patent intelligence for your innovation.

A file browsing method based on face recognition

A face recognition and document technology, applied in the field of document reading based on face recognition, can solve problems such as the inability to guarantee the legitimacy of the reader's identity, relatively high user requirements, and user safety hazards, etc., so as to improve the confidentiality effect and increase the Difficulty, the effect of increasing confidentiality

Active Publication Date: 2021-04-16
一石数字技术成都有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In real life, when it comes to the protection of important files, passwords, digital certificates, or USB dongles are generally used to encrypt files and transmit them to the other party, and the other party uses the same method to decrypt the files, which plays a certain role in protection. However, the requirements for users are relatively high, and encryption or decryption tools must be carried with them. Once the file falls into the hands of others, it is very likely to be cracked; at the same time, this method cannot guarantee whether the identity of the reader is legal. Traditional file encryption and decryption Bring many inconveniences and potential safety hazards to users
[0003] Although the existing biometric-based file encryption scheme uses biometrics for encryption and decryption, it only replaces traditional passwords with biometrics, which is an encryption method in which passwords and files are independent of each other, and is not a file encryption algorithm. Essentially improved, the encrypted result also contains complete and accurate files, and there is also the risk of being cracked and causing file leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A file browsing method based on face recognition
  • A file browsing method based on face recognition
  • A file browsing method based on face recognition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] All features disclosed in this specification, or steps in all methods or processes disclosed, may be combined in any manner, except for mutually exclusive features and / or steps.

[0027] Any feature disclosed in this specification (including any appended claims, abstract), unless otherwise stated, may be replaced by alternative features that are equivalent or serve a similar purpose. That is, unless expressly stated otherwise, each feature is one example only of a series of equivalent or similar features.

[0028] Such as figure 1 and 2 As shown, the first embodiment discloses a face recognition-based file browsing method, including encryption steps:

[0029] Obtain the reference face feature group, which includes the face feature value of the face of the person who has the right to open the confidential file; The face of the person who reads the confidential document is used as the reference face, and the face feature extraction is performed on the reference face re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a file browsing method based on face recognition, which includes an encryption step, a decryption step and a face monitoring step, wherein the encryption step is to perform mixed coding on a reference face feature group and each file block to obtain an encrypted file. The decryption step is: decode the encrypted file, and then perform the face recognition step. If the verification is passed, the confidential file will be displayed normally. The face monitoring step is: monitor whether the person leaves, if so, display garbled characters, and re-execute the face recognition step after the person comes back. This design is based on the mixed encryption of confidential files and facial biometrics, which prevents the risk of file leakage caused by illegal cracking of encrypted files. At the same time, multiple people can be authorized to read, and the anti-leakage function can be automatically activated after people leave. The file leakage prevention effect is good, and the user experience is good.

Description

technical field [0001] The invention relates to the field of file encryption based on biometric features, in particular to a file browsing method based on face recognition. Background technique [0002] In real life, when it comes to the protection of important files, passwords, digital certificates, or USB dongles are generally used to encrypt files and transmit them to the other party, and the other party uses the same method to decrypt the files, which plays a certain role in protection. However, the requirements for users are relatively high, and encryption or decryption tools must be carried with them. Once the file falls into the hands of others, it is very likely to be cracked; at the same time, this method cannot guarantee whether the identity of the reader is legal. Traditional file encryption and decryption Bring many inconveniences and potential safety hazards to the user. [0003] Although the existing biometric-based file encryption scheme uses biometrics for e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/32
CPCG06F21/32G06F21/602G06F2221/2107
Inventor 卢荣新王泽民李珉施国鹏
Owner 一石数字技术成都有限公司