Unlock instant, AI-driven research and patent intelligence for your innovation.

Private key generation and decryption method and system based on iris recognition

An iris recognition and iris technology, applied in the blockchain field, can solve problems such as theft, and achieve the effect of ensuring uniqueness and safe use

Pending Publication Date: 2020-01-03
本无链科技(深圳)有限公司
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, some schemes use the method of binding the face and the private key, which has the problem that a small number of identical twins cannot be distinguished from each other; some schemes use the method of binding the fingerprint and the private key. How to provide a private key generation method that is less likely to be lost than a human face and can distinguish identical twins without fingerprints that is leaked by external items is an urgent problem to be solved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Private key generation and decryption method and system based on iris recognition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The present invention will be described in further detail below with reference to the drawings and specific embodiments. It should be noted here that the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not conflict with each other.

[0053] At present, the private key generation method of the blockchain has been combined with human characteristics. The most commonly used method is to use human faces and fingerprints as private keys. However, there are a small number of identical twins that look the same. The problem of indistinguishability; while the method of binding fingerprints and private keys, this method has the problem of collecting fingerprints from items we touched and thus being stolen; the core idea of ​​the present invention to solve the above problems is to find more differences than fingerprints Sexual characteristics of the human body, this characteristic does ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a private key generation and decryption method based on iris recognition and a corresponding system. According to the invention, a stable association relationship is established by using the iris and the private key; iris locations are acquired and located, normalization processing is carried out on the continuous maximum iris area; regional physical characteristics are screened and drawn by utilizing a two-dimensional Gabor wave; the regional physical characteristics are converted into a two-dimensional code to form an iris code to generate a private key pair; the irisserves as the private key; the problems that the private key is forgotten, lost and stolen and the like are solved, the uniqueness of the private key is ensured, the use is safe and convenient, the defects and shortcomings of private key generation methods for distinguishing same-egg twins and leaking fingerprints by external articles and the like are overcome, and the method and system great significance in block chain development.

Description

Technical field [0001] The invention belongs to the field of blockchain, and in particular relates to a method and system for generating and decrypting a private key based on iris recognition. Background technique [0002] In the world of blockchain, the reliability of all data is based on cryptography, and the most commonly used type of encryption algorithm in the blockchain is asymmetric encryption. Asymmetric encryption relies on a pair of public keys and private keys. The key protects information security. The public key is open to the public to verify information, while the private key is held by oneself. The privacy of the private key determines the encryption reliability of this type of encryption algorithm. A long string of irregular uppercase and lowercase letters with more than 128 digits and numbers is difficult for humans to record directly by memory. They often use copying to electronic memos or hand-copying to paper notebooks to record, so that paper notebooks The ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K9/00G06F21/32
CPCG06F21/32G06V40/172G06V40/197
Inventor 杨税令
Owner 本无链科技(深圳)有限公司