Unlock instant, AI-driven research and patent intelligence for your innovation.

A key protection method and system based on bone voiceprint

A technology of key protection and voiceprint, which is applied in the field of key protection method and system based on bone voiceprint, and can solve the problems of inapplicability, reduced security, and low usability

Active Publication Date: 2022-02-18
SHENZHEN OLYM INFORMATION SECURITY TECHOLOGY CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Using hardware security media to ensure key security, high security, but low usability, and cannot be applied in pure software environments such as smart terminals and cloud computing
[0005] The software environment key protection scheme that relies solely on PIN code protection is easy to use, but the security is reduced. Once the PIN code is leaked, it means that the key is leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A key protection method and system based on bone voiceprint
  • A key protection method and system based on bone voiceprint
  • A key protection method and system based on bone voiceprint

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0066] figure 1 A flow chart of a key protection method based on bone voiceprint is shown. In an embodiment of the present invention, a key protection method based on bone voiceprint includes:

[0067] Step S100: Receive a data encryption request containing user information, and perform security verification on the user according to the user information;

[0068] Step S200: When the user passes the security verification, open the information input port to collect the sound signal sent by the user and the bone vibration signal generated when the sound signal is sent;

[0069] Step S300: Generate bone voiceprint data according to the sound signal and the bone vibration signal;

[0070] Step S400: Perform SM3-HMAC operation on the bone voiceprint data to generate and store a key protection PIN code; wherein, the key is used to convert a ciphertext key and a plaintext key.

[0071] Voiceprint is unique and special information possessed by each person, but it is easy to decipher ...

Embodiment 2

[0112] Figure 5 It shows a structural block diagram of a key protection system based on bone voiceprint. In an embodiment of the present invention, a key protection system based on bone voiceprint, the system 10 includes:

[0113] A security verification module 11, configured to receive a data encryption request containing user information, and perform security verification on the user according to the user information;

[0114] The signal collection module 12 is used to open the information input port when the user passes the security verification, and collect the sound signal sent by the user and the bone vibration signal generated when the sound signal is sent;

[0115] A data conversion module 13, configured to generate bone voiceprint data according to the sound signal and the bone vibration signal;

[0116] The PIN code generating module 14 is used to perform SM3-HMAC operation on the bone voiceprint data, generate and store a key protection PIN code; wherein, the key ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to the field of encryption technology, and specifically discloses a key protection method and system based on bone voiceprints. The method includes: receiving a data encryption request containing user information, and performing security verification on the user according to the user information; When the user passes the security verification, open the information input port, collect the sound signal sent by the user and the bone vibration signal generated when the sound signal is sent; generate bone voiceprint data according to the sound signal and the bone vibration signal; Perform SM3-HMAC operation on the fingerprint data to generate and store the key protection PIN code; wherein, the key is used to convert the ciphertext key and the plaintext key. The invention generates a very unique PIN code with a high degree of matching with the user by collecting bone vibration signals, which has high security and is convenient for popularization and use.

Description

technical field [0001] The invention relates to the field of encryption technology, in particular to a key protection method and system based on bone voiceprints. Background technique [0002] The key is an important parameter of a cryptographic system, which is a fixed parameter input in a cryptographic algorithm that converts plaintext into ciphertext or converts ciphertext into plaintext. Cryptographic algorithms are usually public, such as the international standard algorithms RSA, AES, DES, 3DES and my country's commercial ciphers SM2, SM3, SM4, SM9, etc. After mastering the key, you can use the public cryptographic algorithm to encrypt and decrypt data and verify signatures Therefore, the key needs very reliable security measures to protect it from being stolen, so as to ensure the reliability of data encryption and electronic signature. [0003] The current mainstream key protection method is mainly to store the key in a hardware security medium, such as a chip, Ukey,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L67/02H04L67/141
CPCH04L9/3242H04L9/3231H04L67/02H04L67/141
Inventor 杜峰周海鑫周枭淳盛莉
Owner SHENZHEN OLYM INFORMATION SECURITY TECHOLOGY CO LTD