Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

File encryption and decryption system based on c/s architecture and speaker recognition technology

A technology for speaker recognition and file encryption, which is used in instruments, digital data authentication, computing, etc. to ensure security, improve robustness, and reduce load.

Active Publication Date: 2022-02-15
JIANGSU UNIV
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of Internet technology and the popularity of smart phones, more and more people use electronic devices to record important information in daily life, such as accounting, work arrangements, reports, etc., resulting in documents, slides, etc. series of files, but the problem of network security is also bothering us from time to time. The rampant behavior of hackers has seriously affected people's daily life, so the problem of file security can no longer be ignored.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File encryption and decryption system based on c/s architecture and speaker recognition technology
  • File encryption and decryption system based on c/s architecture and speaker recognition technology
  • File encryption and decryption system based on c/s architecture and speaker recognition technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention will be further described below with reference to the accompanying drawings.

[0029] A file encryption decryption system based on C / S architecture and speaker recognition technology, mainly simplifies the operation of the client, and users only need to make the file to encrypt or decrypt the files to protect the user's personal file security and Personal privacy, which will be further described below with reference to the accompanying drawings and examples.

[0030] Client includes user login interface module, new user registration module, old user login module, file encryption, and decryption module, field voice acquisition module;

[0031] like figure 1 As shown, the user login interface module provides a channel for new user registration channels and old users log in;

[0032] The new user registration module has the following functions:

[0033] A. User Enter the username and password to register

[0034] Providing another user login method, the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a file encryption and decryption system based on C / S architecture and speaker recognition technology. Users use traditional digital passwords or biometric voiceprint passwords to remotely log in to the system. People collect voice information on the spot to extract voiceprints, and finally perform judgment processing and encrypt or decrypt files. When encrypting or decrypting operations, first confirm the identity of the speaker on site, and only use the encryption algorithm or the corresponding decryption algorithm to encrypt or decrypt the file. When encrypting, add the encryption flag to the file header, and when decrypting, the file header Remove the encryption flag in and use the decryption algorithm to decrypt the file. The present invention combines voiceprint passwords carried by people with file encryption and decryption operations, and uses a remote server to lighten the client, not only providing users with a friendly and convenient operating environment, but also ensuring the security of the user's file data.

Description

Technical field [0001] The present invention relates to the technical field of encryption and decryption of documents, and more particularly to a file encryption decryption system based on C / S architecture and speaker recognition technology. Background technique [0002] With the development of Internet technology and the popularity of smartphones, more and more people use electronic equipment to record important information in daily life, such as billing, work arrangements, reports, etc., produce documents, slides, etc. The form of the series, but the problem of network security is also in time, hacker is seriously affected by people's daily lives, so the security issue of documents cannot be ignored. [0003] According to the famous Moore Law, the computer's calculation speed will continue to speed up. If the file encryption is used in the way of the traditional digital password, it is very likely that violent cracks in high-performance computers, and the security of user fil...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/32G06F21/60
CPCG06F21/32G06F21/602
Inventor 郑志燊何洋施雨毛启容
Owner JIANGSU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products