Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data protection and data deprotection method, terminal, and computer readable storage medium

A data protection and data technology, applied in the information field, can solve the problems of low data security and high resource consumption, and achieve the effect of low computational complexity, optimized configuration, and simple process

Pending Publication Date: 2019-03-19
ZTE CORP
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiments of the present invention provide a data protection, data unlocking method, terminal, and computer-readable storage medium. The main technical problem to be solved is: to provide a data protection scheme for information to solve the problems in the prior art by upgrading encryption Algorithm complexity or multiple encryption algorithms to encrypt data, the existing data security is not high, but the problem of high resource consumption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data protection and data deprotection method, terminal, and computer readable storage medium
  • Data protection and data deprotection method, terminal, and computer readable storage medium
  • Data protection and data deprotection method, terminal, and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] In order to solve the problem of low data security and high resource consumption in the prior art when data is encrypted by increasing the complexity of the encryption algorithm or using multiple encryption algorithms, this embodiment provides a data protection method. See figure 1 :

[0030] S102. Obtain biometric data of the user.

[0031] The biological characteristics described in this embodiment can be divided into two types. The first type is the inherent physiological characteristics of the human body, including palmprint features, iris features, facial features, etc., wherein the palm prints on the surface of the palm between the wrist and the fingers Various lines, therefore, palm prints include the fingerprints on the fingertips of the palm and the lines in the middle of the palm. The second type of biological characteristics is the behavioral characteristics of the human body, including voiceprint characteristics, gait characteristics, handwriting character...

Embodiment 2

[0058] This embodiment will continue to introduce the data protection method on the basis of the foregoing embodiments, please refer to Figure 6 :

[0059] S602. Acquire biometric data of the user.

[0060] In the first embodiment, it has been introduced that for a biometric feature, the regional feature data collection process is performed in regions from the biometric image corresponding to the biometric feature. However, considering that human beings have more than one biological feature, it may be considered to combine two or more biological features to obtain biological feature data including multiple features. In this embodiment, a scheme for collecting image feature data for two or more biological feature images will be introduced.

[0061] Assuming that the biometric features in this embodiment include the user's palmprint feature and the user's iris feature, for these two biometric features, image acquisition can be performed separately to obtain the corresponding ...

Embodiment 3

[0077] This embodiment provides a computer-readable storage medium, and the computer-readable storage medium stores one or more computer programs that can be read, compiled, or executed by the memory, including a data protection program, which can be used for The processor executes so as to realize the data protection method provided in the first or second embodiment. Alternatively, the above-mentioned computer-readable storage medium may store a data unprotection program, and the data unprotection program can be executed by a processor so as to implement the data unprotection method provided in the first or second embodiment. Certainly, in an example of this embodiment, the computer-readable storage medium may simultaneously store a data protection program and a data unprotection program.

[0078] At the same time, this embodiment also provides a terminal, please refer to Figure 9 : the terminal 90 includes a processor 91, a memory 92, and a communication bus 93 for connect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a data protection and data deprotection method, a terminal, and a computer readable storage medium, which obtain the biometric data of a user, and then combineand encapsulate the biometric data and the original data to be encrypted according to a preset combination rule to obtain the combined data. In order to get the original data, the user's biometric device data must be obtained, and then the user's biometric device data must be eliminated from the data according to the preset combination rules in the data protection scheme corresponding to the scheme. Therefore, the original data can be obtained from the combined data must meet the conditions, that is, to obtain the correct user biometric device data and preset combination rules, both of whichare indispensable. Therefore, it can ensure that the original data can only be unprotected by the user himself or in the case of authorization by the user himself, and the security is high. At the same time, the processing process is simple, computational complexity is not high, and a large number of processing and time resources need not be wasted, which is conducive to the optimal allocation ofresources.

Description

technical field [0001] The present invention relates to the field of information technology, in particular to a method for data protection, data unprotection, a terminal and a computer-readable storage medium. Background technique [0002] With the development of network and Internet technology, information security is also facing more and more challenges. In order to eliminate information security threats as much as possible and provide a safe and reliable environment for various data, staff in information security research continue to propose various solutions. At present, there are two main directions to improve data security: first, improve The security level of a single encryption algorithm itself, based on this direction, the complexity of the encryption algorithm continues to increase in order to improve the security level of data encryption. But no matter how complex an encryption algorithm is, there is still a risk of being cracked. Moreover, the increased complex...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60G06F21/32
CPCG06F21/32G06F21/602
Inventor 夏天琪
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products