Unlock instant, AI-driven research and patent intelligence for your innovation.

Private key generation and decryption method and system based on face recognition

A face recognition and key generation technology, applied in the blockchain field, can solve the problems of lost encryption algorithm, not so safe, stolen private key, etc., achieve private key security, prevent private key from being forgotten, and ensure security Effect

Active Publication Date: 2020-01-07
本无链科技(深圳)有限公司
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the world of blockchain, the reliability of all data is based on cryptography, and the most widely used encryption algorithm type in blockchain is asymmetric encryption, which relies on a pair of public key and private key. The key protects information security. The public key is open to the public to verify information, while the private key is held by oneself. The privacy of the private key determines the encryption reliability of this type of encryption algorithm, and the private key is often used by a A long string of irregular uppercase and lowercase letters plus numbers of more than 128 characters is difficult for human beings to record directly by memory. They are often recorded by copying and copying to electronic memos or hand-written records on paper notepads. The loss and the theft of electronic memos make the originally safe encryption algorithm less secure; then is there a better private key management method to solve this problem? The correct way is to use letters or numbers that can be memorized by the human brain as seeds to generate a fixed pair of public keys and private keys. As long as this seed is remembered, the private key will be remembered. However, due to the offline nature of blockchain data, anyone can There are endless test passwords, so the seeds often need to be very complicated, such as a long poem, and such passwords are different from the passwords that people use every day, so that people will involuntarily choose to record them, and when they are recorded, they will be Theft of private keys due to torrent leaks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted here that the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute conflicts with each other.

[0049] In the field of blockchain, the use of private keys is very important. At present, private keys in the world are either too simple, which makes them very insecure, or too complicated, which makes them very difficult to remember; and outside the blockchain, the use of similar passwords is even more difficult. However, there are problems of difficulty in remembering and security in almost all applications of private key encryption, so how to provide a private key that people can hold without memorizing or copying by hand has become an urgent problem to be solved. The present invention effectively solves the abov...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a private key generation and decryption method based on face recognition. The method comprises the following steps: performing living body analysis and counterfeit analysis onface feature data through a system; backtracking the face feature data to the date when the person creates the private key, summarizing the backtracked face feature data, and extracting an abstract; the abstract is used as a random factor to generate a key pair, and the key pair is used as a private key to decrypt the data; obtaining original data before encryption; the invention further disclosesa system for generating and decrypting the private key based on face recognition, the problems that the private key is forgotten, lost and stolen and the like are prevented by collecting the face feature data and taking the face feature data as the seed of the private key or generating the private key, and the private key does not need to be memorized and copied by hand and is safe and convenientto use. And the authenticity of the face feature data is judged by using a living body verification detector, so that face photos and counterfeit face data features are prevented from decrypting thedata, and the safety of the private key is ensured.

Description

technical field [0001] The invention belongs to the field of blockchain, and in particular relates to a method and system for generating and decrypting a private key based on face recognition. Background technique [0002] In the world of blockchain, the reliability of all data is based on cryptography, and the most widely used encryption algorithm type in blockchain is asymmetric encryption, which relies on a pair of public key and private key. The key protects information security. The public key is open to the public to verify information, while the private key is held by oneself. The privacy of the private key determines the encryption reliability of this type of encryption algorithm, and the private key is often used by a A long string of irregular uppercase and lowercase letters plus numbers of more than 128 characters is difficult for human beings to record directly by memory. They are often recorded by copying and copying to electronic memos or hand-written records o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08G06K9/00
CPCH04L9/0869H04L9/0866G06V40/172
Inventor 杨税令
Owner 本无链科技(深圳)有限公司