CN104092695B - It is a kind of to improve the method that vocal print encrypts File Upload and Download - Google Patents
It is a kind of to improve the method that vocal print encrypts File Upload and Download Download PDFInfo
- Publication number
- CN104092695B CN104092695B CN201410345311.1A CN201410345311A CN104092695B CN 104092695 B CN104092695 B CN 104092695B CN 201410345311 A CN201410345311 A CN 201410345311A CN 104092695 B CN104092695 B CN 104092695B
- Authority
- CN
- China
- Prior art keywords
- file
- user
- voice print
- print database
- voiceprint
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 30
- 230000001755 vocal effect Effects 0.000 title claims description 11
- 238000004364 calculation method Methods 0.000 claims description 3
- 230000002159 abnormal effect Effects 0.000 claims 1
- 229910002056 binary alloy Inorganic materials 0.000 claims 1
- 238000006243 chemical reaction Methods 0.000 claims 1
- 238000012790 confirmation Methods 0.000 claims 1
- 238000013500 data storage Methods 0.000 claims 1
- 238000013519 translation Methods 0.000 claims 1
- 230000014616 translation Effects 0.000 claims 1
- 230000005540 biological transmission Effects 0.000 abstract 1
- 238000005516 engineering process Methods 0.000 description 5
- 210000000056 organ Anatomy 0.000 description 2
- 208000003443 Unconsciousness Diseases 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 230000001788 irregular Effects 0.000 description 1
- 210000000867 larynx Anatomy 0.000 description 1
- 210000004072 lung Anatomy 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 210000003928 nasal cavity Anatomy 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 210000000515 tooth Anatomy 0.000 description 1
Landscapes
- Storage Device Security (AREA)
- Collating Specific Patterns (AREA)
Abstract
本发明公开了一种改进声纹加密文件上传下载的方法,属于信息安全领域。该方法是基于声纹加密,对于文件上传下载过程中保持文件的安全传递。主要有两个模块,声纹识别采集模块以及加密文件上传下载模块。其中,声纹识别采集模块用于采集和识别声纹数据,并存储在声纹数据处理服务器上;加密文件上传下载模块用于上传和下载加密文件,并完成对文件的加密过程和解密过程,最终成功完成所要求的操作。本发明实现了对声纹加密文件的过程改进,可靠性高,可以提高文件上传下载过程的安全性以及极大消除密钥丢失的风险。
The invention discloses a method for improving uploading and downloading of voiceprint encrypted files, which belongs to the field of information security. This method is based on voiceprint encryption, and maintains safe transmission of files during file upload and download. There are two main modules, voiceprint recognition collection module and encrypted file upload and download module. Among them, the voiceprint recognition acquisition module is used to collect and identify voiceprint data, and store it on the voiceprint data processing server; the encrypted file upload and download module is used to upload and download encrypted files, and complete the encryption process and decryption process of the files, Eventually the requested operation was successfully completed. The invention realizes the improvement of the process of encrypting the voiceprint file, has high reliability, can improve the security of the file uploading and downloading process, and greatly eliminates the risk of key loss.
Description
技术领域technical field
本发明提出一种改进声纹加密文件上传下载的方法,是基于声纹加密的基础上对文件上传下载方法的改进,本发明属于计算机信息安全领域。The invention proposes an improved voiceprint encrypted file upload and download method, which is an improvement to the file upload and download method based on voiceprint encryption, and the invention belongs to the field of computer information security.
背景技术Background technique
随着信息化的高速发展,人们对信息安全的需求接踵而至,人才竞争、市场竞争、金融危机、敌特机构等都给企事业单位的发展带来巨大风险,内部窃密、黑客攻击、无意识泄密等窃密手段成为了人与人之间、企业与企业之间、国与国之间的安全隐患。With the rapid development of informatization, people's demand for information security is coming one after another. Talent competition, market competition, financial crisis, and enemy agents all bring huge risks to the development of enterprises and institutions, such as internal theft, hacker attacks, and unconscious leaks. The means of stealing secrets such as secrets has become a hidden danger between people, between enterprises and between enterprises, and between countries.
信息安全是任何国家、政府、部门、行业都必须十分重视的问题,是一个不容忽视的国家安全战略。文件加密是目前最常用的保护信息安全的方法,采用透明加解密技术,对数据进行强制加密,不改变用户原有的使用习惯;此技术对数据自身加密,不管是脱离操作系统,还是非法脱离安全环境,用户数据自身都是安全的,对环境的依赖性比较小。市面上的文件加密主要的技术分为磁盘加密、应用层加密、驱动级加密等几种技术,现在流行的RSA和AES加密算法都是完全公开的,一方取得已加密的数据,就算知到加密算法也好,若没有加密的密钥,也不能打开被加密保护的信息。Information security is an issue that any country, government, department, or industry must attach great importance to, and it is a national security strategy that cannot be ignored. File encryption is currently the most commonly used method to protect information security. It adopts transparent encryption and decryption technology to enforce data encryption without changing the user's original usage habits. This technology encrypts the data itself, whether it is separated from the operating system or illegally. In a safe environment, user data itself is safe and less dependent on the environment. The main technologies of file encryption on the market are divided into several technologies such as disk encryption, application layer encryption, and driver-level encryption. The popular RSA and AES encryption algorithms are completely open. Regardless of the algorithm, if there is no encryption key, the encrypted information cannot be opened.
但是传统的加密方发还有一定的局限性,密钥一般不容易被记忆,一旦忘记,恢复起来非常困难,现在趋势采用体征信息(如指纹)做为加密依据,而声纹与指纹一样,同样是属于生物识别技术的一种。声纹是用电声学仪器显示的携带言语信息的声波频谱。人类语言的产生是人体语言中枢与发音器官之间一个复杂的生理物理过程,人在讲话时使用的发声器官--舌、牙齿、喉头、肺、鼻腔在尺寸和形态方面每个人的差异很大,所以任何两个人的声纹图谱都有差异,在一般情况下,人们可以通过声纹来区别不同的人的声音,因此通过声纹加密文件也是一种可行的加密方法,但是现在利用声纹加密文件还是有一定局限性,专利“一种基于声纹的数码相机图片加密解密方法(申请号CN200810162156)”中提出了一种利用声纹数据信息加密解密图片信息的方法,但是这种方式也是有缺点:文件只能由同一个人来加密解密使用,不利于多人异地读取文件内容。However, the traditional encryption method still has certain limitations. The key is generally not easy to remember. Once it is forgotten, it is very difficult to recover. Now the trend is to use physical information (such as fingerprints) as the basis for encryption, and voiceprints are the same as fingerprints. It is also a kind of biometric technology. A voiceprint is a sound wave spectrum that carries speech information displayed by an electroacoustic instrument. The production of human language is a complex physiological and physical process between the language center of the human body and the vocal organs. The vocal organs used by people when speaking-tongue, teeth, larynx, lungs, and nasal cavities vary greatly from person to person in terms of size and shape. , so any two people's voiceprints are different. In general, people can distinguish the voices of different people through voiceprints. Therefore, encrypting files through voiceprints is also a feasible encryption method, but now using voiceprints Encrypted files still have certain limitations. The patent "A Digital Camera Image Encryption and Decryption Method Based on Voiceprint (Application No. CN200810162156)" proposes a method for encrypting and decrypting image information using voiceprint data information, but this method is also Disadvantages: The file can only be encrypted and decrypted by the same person, which is not conducive to multiple people reading the file content in different places.
此外,专利“基于声纹的文档加密及解密方法(申请号CN201110003202.8)”中提出使用声纹加密文档和解密文档,可以从语音中获取声纹,可以方便地使用声纹产生的数据来加解密文档。但是文档只能由同一个用户来加密及解密,文档的上传下载运用在分布式网络上将是非常的困难,并且安全性也很低。In addition, the patent "Voiceprint-Based Document Encryption and Decryption Method (Application No. CN201110003202.8)" proposes to use voiceprint to encrypt and decrypt documents, so that the voiceprint can be obtained from the voice, and the data generated by the voiceprint can be conveniently used to Encrypt and decrypt documents. However, the document can only be encrypted and decrypted by the same user. It will be very difficult to upload and download documents on a distributed network, and the security is also very low.
发明内容Contents of the invention
针对上述现有技术的缺陷,本发明的目的在于提出一种改进声纹加密文件上传下载的方法,旨在提出一种新式方法,解决声纹加密文件的上传下载安全性问题。In view of the above-mentioned defects in the prior art, the purpose of the present invention is to propose an improved method for uploading and downloading encrypted voiceprint files, aiming at proposing a new method to solve the security problem of uploading and downloading encrypted voiceprint files.
为解决上述问题,本发明采用如下技术方案In order to solve the above problems, the present invention adopts the following technical solutions
一种改进声纹加密文件上传下载的方法,分为两个模块,声纹识别采集模块以及加密文件上传下载模块。A method for improving the uploading and downloading of voiceprint encrypted files is divided into two modules, a voiceprint recognition collection module and an encrypted file uploading and downloading module.
声纹识别采集模块具体步骤为:The specific steps of the voiceprint recognition collection module are as follows:
1)在用户体征状态正常的情况下,多次随机采集用户全天候24小时的声音样本,并做好样本命名标注。1) When the user's physical status is normal, randomly collect the user's voice samples 24 hours a day, and name and mark the samples.
2)将收集到的声音数据通过声纹识别设备处理转化为声纹数据。2) Convert the collected voice data into voiceprint data through voiceprint recognition equipment.
3)再将声纹数据通过一定处理转化为二进制数据。3) Then convert the voiceprint data into binary data through certain processing.
4)设置声纹数据处理服务器,将声纹数据与其对应的二进制数据一一对应存储起来。4) A voiceprint data processing server is set up to store the voiceprint data and its corresponding binary data in one-to-one correspondence.
5)依次遵循以上步骤,收集用户的声纹数据以及对应的二进制数据。5) Follow the above steps in order to collect the user's voiceprint data and corresponding binary data.
6)在声纹数据处理服务器上,建立每个用户的信任区域,包括用户名以及可信使用期(可以调用声纹数据的时间段)。6) On the voiceprint data processing server, establish a trust zone for each user, including user name and trusted usage period (time period during which voiceprint data can be called).
加密文件上传下载模块具体步骤为:The specific steps of the encrypted file upload and download module are as follows:
1)用户A在体征正常的情况下通过声纹识别设备,产生声纹数据以及相对应二进制数据。1) User A generates voiceprint data and corresponding binary data through the voiceprint recognition device when his physical signs are normal.
2)将产生的声纹数据与预留在声纹数据处理服务器中用户A预留的声纹数据进行比对。2) Compare the generated voiceprint data with the voiceprint data reserved by user A in the voiceprint data processing server.
3)如果比对成功,则可以确认A的身份信息。3) If the comparison is successful, the identity information of A can be confirmed.
4)如果多次比对不成功,则不能确定A的真实身份或者A的体征状态可能不是正常状态。4) If multiple comparisons are unsuccessful, A's true identity cannot be determined or A's sign status may not be normal.
5)将需要上传的文件转化为对应二进制数据。5) Convert the file to be uploaded into corresponding binary data.
6)将声纹数据对应的二进制数据与文件对应的二进制数据进行依次按位的异或运算,或者其他的逻辑运算,但是加密采用的逻辑运算与解密采用的逻辑运算应是对应的,也就是采用同一种逻辑运算。6) The binary data corresponding to the voiceprint data and the binary data corresponding to the file are sequentially bit-wise XOR operation, or other logical operations, but the logical operation used for encryption and the logical operation used for decryption should be corresponding, that is use the same logical operation.
7)这样文件得到了一次声纹加密形成了加密文件,打上可信时间戳。7) In this way, the file has been encrypted with a voiceprint to form an encrypted file, and a trusted time stamp is stamped on it.
8)用户A上传文件数据到文件服务器,并将下载这段数据的用户名与可信使用期上传到声纹数据处理服务器上。8) User A uploads the file data to the file server, and uploads the user name and trusted period for downloading the data to the voiceprint data processing server.
9)用户B在文件服务器上下载到用户A上传的文件数据。9) User B downloads the file data uploaded by user A on the file server.
10)用户B在通过声纹识别设备产生声纹数据,并在声纹数据处理服务器识别自己的身份信息。10) User B generates voiceprint data through the voiceprint recognition device, and identifies his identity information on the voiceprint data processing server.
11)下载到用户B的文件数据,再次被用户B的声纹数据进行异或运算(二次加密),并打上可信时间戳,最后上传到声纹数据处理服务器。11) The file data downloaded to user B is XORed by user B's voiceprint data again (secondary encryption), stamped with a trusted time stamp, and finally uploaded to the voiceprint data processing server.
12)在声纹数据处理服务器上,搜索用户A的信任区域搜索是否存在用户B,若存在,则将用户A与用户B的可信时间戳进行绝对值差的运算,若在可信使用期内,则将用户B上传的文件数据与用户A的声纹数据对应的二进制数据进行异或运算(一次解密)。12) On the voiceprint data processing server, search the trusted area of user A to search whether there is user B, if it exists, perform an absolute value difference calculation between the trusted time stamps of user A and user B, if within the trusted use period , the binary data corresponding to the file data uploaded by user B and the voiceprint data of user A is subjected to XOR operation (one-time decryption).
13)用户B从声纹数据处理服务器上下载到经过处理过的文件数据,并使用自己的声纹数据对应的二进制数据进行异或运算(二次解密)。13) User B downloads the processed file data from the voiceprint data processing server, and uses the binary data corresponding to his own voiceprint data to perform XOR operation (secondary decryption).
14)用户B获到用户A上传的文件,完成加密文件的上传下载。14) User B obtains the file uploaded by user A, and completes uploading and downloading of the encrypted file.
与现有技术相比,本方法具有如下优势:Compared with the prior art, this method has the following advantages:
一、密钥不会丢失遗忘,每个人的声纹数据在一段很长的时期是稳定存在,可以长期用于提取识别操作,并且不需要主动去记忆无规律冗长的密钥。1. The key will not be lost or forgotten. The voiceprint data of each person exists stably for a long period of time, and can be used for extraction and identification operations for a long time, and there is no need to actively memorize irregular and lengthy keys.
二、采集简洁方便,只需要随意或者刻意说出一段话就可以完成声纹数据的收集。2. The collection is simple and convenient. You only need to say a word casually or deliberately to complete the collection of voiceprint data.
三、加密解密过程简单有效,通过二次加密和二次解密的逻辑运算,完成了文件在上传下载各个过程都是处于加密状态,加密解密都是使用自身存在的声纹数据,并且自身的声纹数据也没有泄露出去。3. The encryption and decryption process is simple and effective. Through the logical operation of secondary encryption and secondary decryption, the file is in an encrypted state during uploading and downloading. Encryption and decryption use its own voiceprint data, and its own voice The pattern data has not been leaked.
附图说明Description of drawings
图1是声纹识别采集模块;Fig. 1 is a voiceprint recognition acquisition module;
图2是加密文件上传下载模块。Figure 2 is an encrypted file upload and download module.
具体实施方式detailed description
本说明书中公开的所有特征,除了互相排斥的特征和/或步骤以外,均可以以任何方式组合。All the features disclosed in this specification, except mutually exclusive features and/or steps, can be combined in any way.
下面结合图1、图2对本发明作详细说明。下面将结合附图及具体实施方式对本方法作进一步的描述。The present invention will be described in detail below in conjunction with FIG. 1 and FIG. 2 . The method will be further described below in conjunction with the accompanying drawings and specific embodiments.
本方法分为两个模块,声纹识别采集模块和加密文件上传下载模块This method is divided into two modules, voiceprint recognition acquisition module and encrypted file upload and download module
声纹识别采集模块具体操作步骤为:The specific operation steps of the voiceprint recognition collection module are as follows:
1.在用户体征状态正常的情况下,多次随机采集用户全天候24小时的声音样本,并做好样本命名标注。1. When the user's physical status is normal, randomly collect the user's voice samples 24 hours a day, and name and mark the samples.
2.将收集到的声音数据通过声纹识别设备处理转化为声纹数据。2. Convert the collected voice data into voiceprint data through voiceprint recognition equipment.
3.再将声纹数据通过一定处理转化为二进制数据。3. Then convert the voiceprint data into binary data through certain processing.
4.设置声纹数据处理服务器,将声纹数据与其对应的二进制数据一一对应存储起来。4. Set up a voiceprint data processing server to store the voiceprint data and its corresponding binary data in one-to-one correspondence.
5.依次遵循以上步骤,收集用户的声纹数据以及对应的二进制数据。5. Follow the above steps in order to collect the user's voiceprint data and the corresponding binary data.
6.在声纹数据处理服务器上,建立每个用户的信任区域,包括用户名以及可信使用期(可以调用声纹数据的时间段)。6. On the voiceprint data processing server, establish a trust zone for each user, including user name and trusted usage period (time period during which voiceprint data can be called).
加密文件上传下载模块具体步骤为:The specific steps of the encrypted file upload and download module are as follows:
1.用户A在体征正常的情况下通过声纹识别设备,产生声纹数据以及相对应的二进制数据。1. User A generates voiceprint data and corresponding binary data through the voiceprint recognition device when his physical signs are normal.
2.将产生的声纹数据与预留在声纹数据处理服务器中用户A预留的声纹数据进行比对。2. Compare the generated voiceprint data with the voiceprint data reserved by user A in the voiceprint data processing server.
3.如果比对成功,则可以确认A的身份信息。3. If the comparison is successful, the identity information of A can be confirmed.
4.如果多次比对不成功,则不能确定A的真实身份或者A的体征状态可能不是正常状态。4. If multiple comparisons are unsuccessful, A's true identity cannot be determined or A's physical status may not be normal.
5.将需要上传的文件转化为对应二进制数据。5. Convert the files to be uploaded into corresponding binary data.
6.将声纹数据对应的二进制数据与文件对应的二进制数据进行依次按位的异或运算,或者其他的逻辑运算,但是加密采用的逻辑运算与解密采用的逻辑运算应是对应的,也就是采用同一种逻辑运算。6. The binary data corresponding to the voiceprint data and the binary data corresponding to the file are sequentially bit-wise XOR operations, or other logical operations, but the logical operations used for encryption and the logical operations used for decryption should correspond, that is use the same logical operation.
7.这样文件得到了一次声纹加密形成了加密文件,打上可信时间戳。7. In this way, the file has been encrypted with a voiceprint to form an encrypted file, and a trusted time stamp is stamped on it.
8.用户A上传文件数据到文件服务器,并将下载这段数据的用户名与可信使用期上传到声纹数据处理服务器上。8. User A uploads the file data to the file server, and uploads the user name and trusted period of time for downloading this data to the voiceprint data processing server.
9.用户B在文件服务器上下载到用户A上传的文件数据。9. User B downloads the file data uploaded by user A on the file server.
10.用户B在通过声纹识别设备产生声纹数据,并在声纹数据处理服务器识别自己的身份信息。10. User B generates voiceprint data through the voiceprint recognition device, and identifies his identity information on the voiceprint data processing server.
11.下载到用户B的文件数据,再次被用户B的声纹数据进行异或运算(二次加密),并打上可信时间戳,最后上传到声纹数据处理服务器。11. The file data downloaded to user B is XORed by user B's voiceprint data again (secondary encryption), stamped with a trusted time stamp, and finally uploaded to the voiceprint data processing server.
12.在声纹数据处理服务器上,搜索用户A的信任区域搜索是否存在用户B,若存在,则将用户A与用户B的可信时间戳进行绝对值差的运算,若在可信使用期内,则将用户B上传的文件数据与用户A的声纹数据对应的二进制数据进行异或运算(一次解密)。12. On the voiceprint data processing server, search the trusted area of user A to find whether user B exists. If it exists, perform an absolute value difference calculation between the trusted time stamps of user A and user B. , the binary data corresponding to the file data uploaded by user B and the voiceprint data of user A is subjected to XOR operation (one-time decryption).
13.用户B从声纹数据处理服务器上下载到经过处理过的文件数据,并使用自己的声纹数据对应的二进制数据进行异或运算(二次解密)。13. User B downloads the processed file data from the voiceprint data processing server, and uses the binary data corresponding to his own voiceprint data to perform XOR operation (secondary decryption).
用户B获到用户A上传的文件,完成加密文件的上传下载。User B obtains the file uploaded by user A, and completes the upload and download of the encrypted file.
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410345311.1A CN104092695B (en) | 2014-07-21 | 2014-07-21 | It is a kind of to improve the method that vocal print encrypts File Upload and Download |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410345311.1A CN104092695B (en) | 2014-07-21 | 2014-07-21 | It is a kind of to improve the method that vocal print encrypts File Upload and Download |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104092695A CN104092695A (en) | 2014-10-08 |
CN104092695B true CN104092695B (en) | 2017-09-26 |
Family
ID=51640376
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410345311.1A Expired - Fee Related CN104092695B (en) | 2014-07-21 | 2014-07-21 | It is a kind of to improve the method that vocal print encrypts File Upload and Download |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104092695B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108123801A (en) * | 2017-12-29 | 2018-06-05 | 重庆小犀智能科技有限公司 | A kind of block chain wallet uses audio encryption private key system and method |
CN109802942B (en) * | 2018-12-17 | 2021-06-25 | 西安电子科技大学 | A privacy-preserving voiceprint authentication method |
CN113158213B (en) * | 2021-04-30 | 2022-11-29 | 重庆市科学技术研究院 | A data transmission method and system based on living body verification |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102473210A (en) * | 2009-07-01 | 2012-05-23 | 芒达·帕蒂尔 | Method for Remotely Controlling and Monitoring Desktop Software Data |
CN103166958A (en) * | 2013-02-26 | 2013-06-19 | 深圳创维数字技术股份有限公司 | Protection method and protection system of file |
CN103391201A (en) * | 2013-08-05 | 2013-11-13 | 公安部第三研究所 | System and method for realizing smart card authentication based on voiceprint recognition |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8392580B2 (en) * | 2008-02-20 | 2013-03-05 | Research In Motion Limited | Methods and systems for facilitating transfer of sessions between user devices |
-
2014
- 2014-07-21 CN CN201410345311.1A patent/CN104092695B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102473210A (en) * | 2009-07-01 | 2012-05-23 | 芒达·帕蒂尔 | Method for Remotely Controlling and Monitoring Desktop Software Data |
CN103166958A (en) * | 2013-02-26 | 2013-06-19 | 深圳创维数字技术股份有限公司 | Protection method and protection system of file |
CN103391201A (en) * | 2013-08-05 | 2013-11-13 | 公安部第三研究所 | System and method for realizing smart card authentication based on voiceprint recognition |
Also Published As
Publication number | Publication date |
---|---|
CN104092695A (en) | 2014-10-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11263415B2 (en) | Transferring data files using a series of visual codes | |
CN110414203A (en) | An Internet medical identity authentication method based on blockchain technology | |
US8959357B2 (en) | Biometric encryption and key generation | |
CN105429761B (en) | A kind of key generation method and device | |
US20160269178A1 (en) | Privacy-Enhanced Biometrics-Secret Binding Scheme | |
CN107113170B (en) | Biometric template storage and verification method, biometric identification device and terminal | |
CN101093626B (en) | Palm key system | |
WO2017044554A1 (en) | Biometric verification of a blockchain database transaction contributor | |
CN101976321A (en) | Generated encrypting method based on face feature key | |
CN104935429A (en) | A data processing method and system using multiple encryption | |
CN103606047A (en) | Password management system | |
CN111242611B (en) | Method and system for recovering digital wallet key | |
CN105337742B (en) | LFSR file encryption and decryption method based on face image features and GPS information | |
CN106921489B (en) | A data encryption method and device | |
CN102194066A (en) | Method for taking fingerprint information as key | |
CN104092695B (en) | It is a kind of to improve the method that vocal print encrypts File Upload and Download | |
CN106778292B (en) | A Quick Restoration Method of Word Encrypted Document | |
CN110535630B (en) | Key generation method, device and storage medium | |
CN100520671C (en) | Finger print encryption and decryption method of electron decument | |
CN118886066B (en) | A privacy protection method for multimodal data | |
WO2015196642A1 (en) | Data encryption method, decryption method and device | |
CN109039650A (en) | A kind of method and its system merging the online information trustship of biological feature encryption technology | |
WO2017207998A1 (en) | Method of associating a person with a digital object | |
Byeon et al. | Deep learning and encryption algorithms based model for enhancing biometric security for artificial intelligence era | |
CN116484412A (en) | Encryption algorithm, medium and storage device for handwriting signing of passive electromagnetic touch screen |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20170926 |