High-security storage access method and device based on user iris recognition

A technology for iris recognition and safe storage, which is applied in the fields of instruments, digital data authentication, and electronic digital data processing, etc. It can solve problems such as weak security and poor user experience, and achieve the effect of enhancing security

Pending Publication Date: 2021-02-12
深圳安捷力特新技术有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] To this end, it is necessary to provide a technical solution for high-security storage access based on user iris recognition to solve the current problems of weak security and poor user experience when reading and writing data in data storage units.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • High-security storage access method and device based on user iris recognition
  • High-security storage access method and device based on user iris recognition
  • High-security storage access method and device based on user iris recognition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] In order to explain in detail the technical content, structural features, achieved goals and effects of the technical solution, the following will be described in detail in conjunction with specific embodiments and accompanying drawings.

[0075] Such as Figure 9 As shown, the first aspect of the present invention provides a high-security storage access method based on user iris recognition, and the method is applied to a high-security storage access device based on user iris recognition, and the device includes: an iris recognition unit, a legal iris Information storage unit, user level storage unit, key generation unit, second encryption and decryption circuit, read and write control circuit, data storage unit;

[0076] The method comprises the steps of:

[0077] First enter step S901 iris identification unit receives the iris information of the current user collected by the iris collection unit, compares the iris information of the current user collected with the l...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a high-security storage access method and device based on user iris recognition. The device comprises an iris recognition unit, a legal iris information storage unit, a user level storage unit, a key generation unit, a second encryption and decryption circuit, a read-write control circuit and a data storage unit. The method comprises the following steps that: an iris recognition unit verifies user iris information to determine the user level of a current user, and then a key generation unit generates different access key information according to the user security level;and a read-write control circuit and a second encryption and decryption circuit encrypt the data to be written into the data storage unit or decrypt the data read from the data storage unit based on the access key information. As the access key information in the data read-write process is generated in real time according to the user level, the security of data access by the user is greatly enhanced.

Description

technical field [0001] The invention relates to the field of chip circuit design, in particular to a high-security storage access method and device based on user iris recognition. Background technique [0002] SSD data storage has gradually become the main storage medium for consumer device data storage and cloud storage. For SSD data storage, data error correction is of great significance, especially for personal key data and data related to government agencies. The SSD main control chip is the brain of the SSD storage device, and its security performance directly determines the overall final security performance of the SSD hard disk. [0003] At present, the most commonly used method for secure access to each user's data is still to set a password, and complete user authorization by verifying the password. However, an SSD storage device may be used by different users, and different users There should be different security levels in order to grant access to different stor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/32G06F21/79G06F21/64
CPCG06F21/32G06F21/79G06F21/64G06F2221/2141
Inventor 廖裕民陈娇丽骆飞刘学邹瑜文
Owner 深圳安捷力特新技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products