Unlock instant, AI-driven research and patent intelligence for your innovation.

Password protection method and device based on biological recognition and SM2 collaborative cryptographic algorithm

A technology of biometric identification and cryptographic algorithm, applied in the field of password protection based on biometric identification and SM2 collaborative cryptographic algorithm, can solve the problems of high risk of customer transaction password leakage

Active Publication Date: 2022-01-11
深圳市财富趋势科技股份有限公司
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides a password protection method and device based on biometric identification and SM2 cooperative password algorithm, aiming to solve the problem of high risk of customer transaction password leakage in the security storage of passwords in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password protection method and device based on biological recognition and SM2 collaborative cryptographic algorithm
  • Password protection method and device based on biological recognition and SM2 collaborative cryptographic algorithm
  • Password protection method and device based on biological recognition and SM2 collaborative cryptographic algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0021] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0022] It should also be understood that the terminology used ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a password protection method and device based on biological recognition and an SM2 collaborative cryptographic algorithm. The method comprises the following steps: a client receives biological characteristics of a user, verifies the biological characteristics, and encrypts plaintext passwords in sequence to respectively obtain a first ciphertext and a second ciphertext; when the client receives the biological characteristics and passes verification, signing a corresponding account ID through a local RSA private key to obtain signature data, performing point multiplication operation based on a local first private key component and a second ciphertext to obtain a first point multiplication result, and sending the first point multiplication result, the signature data and the account ID to a service terminal; the service terminal verifies the received signature data by using an RSA public key corresponding to the account ID, and if the verification is passed, point multiplication operation is performed by using a second private key component and the first point multiplication result to obtain a second point multiplication result, and the second point multiplication result is sent to the client; and the client decrypts the second click multiplication result to obtain a plaintext password. The method reduces the leakage risk of the user password.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a password protection method and device based on biometric identification and SM2 cooperative password algorithm. Background technique [0002] In the securities industry, for reasons such as system security and stability, the background trading system only supports transaction password login, and according to security compliance requirements, it is forbidden to store passwords and encrypted data in other mid-stage systems except the counter, thus causing customers to Terminal login, must enter the pain point of the transaction password. [0003] With the popularization of mobile devices and the maturity of biometric technology, there is a demand for biometric login trading system on securities trading mobile clients. To meet this demand, developers have provided some technical solutions, basically using RSA public key to encrypt transaction passwords Stored locally...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/30H04L9/32
CPCH04L9/0822H04L9/0894H04L9/302H04L9/3231H04L9/3247
Inventor 丁坤
Owner 深圳市财富趋势科技股份有限公司