[go: up one dir, main page]

CN104092695B - It is a kind of to improve the method that vocal print encrypts File Upload and Download - Google Patents

It is a kind of to improve the method that vocal print encrypts File Upload and Download Download PDF

Info

Publication number
CN104092695B
CN104092695B CN201410345311.1A CN201410345311A CN104092695B CN 104092695 B CN104092695 B CN 104092695B CN 201410345311 A CN201410345311 A CN 201410345311A CN 104092695 B CN104092695 B CN 104092695B
Authority
CN
China
Prior art keywords
file
user
voice print
print database
voiceprint
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201410345311.1A
Other languages
Chinese (zh)
Other versions
CN104092695A (en
Inventor
张小松
牛伟纳
鲍凯
陈瑞东
王东
罗荣森
徐浩然
柯明敏
李�杰
赖特
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201410345311.1A priority Critical patent/CN104092695B/en
Publication of CN104092695A publication Critical patent/CN104092695A/en
Application granted granted Critical
Publication of CN104092695B publication Critical patent/CN104092695B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)
  • Collating Specific Patterns (AREA)

Abstract

本发明公开了一种改进声纹加密文件上传下载的方法,属于信息安全领域。该方法是基于声纹加密,对于文件上传下载过程中保持文件的安全传递。主要有两个模块,声纹识别采集模块以及加密文件上传下载模块。其中,声纹识别采集模块用于采集和识别声纹数据,并存储在声纹数据处理服务器上;加密文件上传下载模块用于上传和下载加密文件,并完成对文件的加密过程和解密过程,最终成功完成所要求的操作。本发明实现了对声纹加密文件的过程改进,可靠性高,可以提高文件上传下载过程的安全性以及极大消除密钥丢失的风险。

The invention discloses a method for improving uploading and downloading of voiceprint encrypted files, which belongs to the field of information security. This method is based on voiceprint encryption, and maintains safe transmission of files during file upload and download. There are two main modules, voiceprint recognition collection module and encrypted file upload and download module. Among them, the voiceprint recognition acquisition module is used to collect and identify voiceprint data, and store it on the voiceprint data processing server; the encrypted file upload and download module is used to upload and download encrypted files, and complete the encryption process and decryption process of the files, Eventually the requested operation was successfully completed. The invention realizes the improvement of the process of encrypting the voiceprint file, has high reliability, can improve the security of the file uploading and downloading process, and greatly eliminates the risk of key loss.

Description

一种改进声纹加密文件上传下载的方法A method for improving the upload and download of voiceprint encrypted files

技术领域technical field

本发明提出一种改进声纹加密文件上传下载的方法,是基于声纹加密的基础上对文件上传下载方法的改进,本发明属于计算机信息安全领域。The invention proposes an improved voiceprint encrypted file upload and download method, which is an improvement to the file upload and download method based on voiceprint encryption, and the invention belongs to the field of computer information security.

背景技术Background technique

随着信息化的高速发展,人们对信息安全的需求接踵而至,人才竞争、市场竞争、金融危机、敌特机构等都给企事业单位的发展带来巨大风险,内部窃密、黑客攻击、无意识泄密等窃密手段成为了人与人之间、企业与企业之间、国与国之间的安全隐患。With the rapid development of informatization, people's demand for information security is coming one after another. Talent competition, market competition, financial crisis, and enemy agents all bring huge risks to the development of enterprises and institutions, such as internal theft, hacker attacks, and unconscious leaks. The means of stealing secrets such as secrets has become a hidden danger between people, between enterprises and between enterprises, and between countries.

信息安全是任何国家、政府、部门、行业都必须十分重视的问题,是一个不容忽视的国家安全战略。文件加密是目前最常用的保护信息安全的方法,采用透明加解密技术,对数据进行强制加密,不改变用户原有的使用习惯;此技术对数据自身加密,不管是脱离操作系统,还是非法脱离安全环境,用户数据自身都是安全的,对环境的依赖性比较小。市面上的文件加密主要的技术分为磁盘加密、应用层加密、驱动级加密等几种技术,现在流行的RSA和AES加密算法都是完全公开的,一方取得已加密的数据,就算知到加密算法也好,若没有加密的密钥,也不能打开被加密保护的信息。Information security is an issue that any country, government, department, or industry must attach great importance to, and it is a national security strategy that cannot be ignored. File encryption is currently the most commonly used method to protect information security. It adopts transparent encryption and decryption technology to enforce data encryption without changing the user's original usage habits. This technology encrypts the data itself, whether it is separated from the operating system or illegally. In a safe environment, user data itself is safe and less dependent on the environment. The main technologies of file encryption on the market are divided into several technologies such as disk encryption, application layer encryption, and driver-level encryption. The popular RSA and AES encryption algorithms are completely open. Regardless of the algorithm, if there is no encryption key, the encrypted information cannot be opened.

但是传统的加密方发还有一定的局限性,密钥一般不容易被记忆,一旦忘记,恢复起来非常困难,现在趋势采用体征信息(如指纹)做为加密依据,而声纹与指纹一样,同样是属于生物识别技术的一种。声纹是用电声学仪器显示的携带言语信息的声波频谱。人类语言的产生是人体语言中枢与发音器官之间一个复杂的生理物理过程,人在讲话时使用的发声器官--舌、牙齿、喉头、肺、鼻腔在尺寸和形态方面每个人的差异很大,所以任何两个人的声纹图谱都有差异,在一般情况下,人们可以通过声纹来区别不同的人的声音,因此通过声纹加密文件也是一种可行的加密方法,但是现在利用声纹加密文件还是有一定局限性,专利“一种基于声纹的数码相机图片加密解密方法(申请号CN200810162156)”中提出了一种利用声纹数据信息加密解密图片信息的方法,但是这种方式也是有缺点:文件只能由同一个人来加密解密使用,不利于多人异地读取文件内容。However, the traditional encryption method still has certain limitations. The key is generally not easy to remember. Once it is forgotten, it is very difficult to recover. Now the trend is to use physical information (such as fingerprints) as the basis for encryption, and voiceprints are the same as fingerprints. It is also a kind of biometric technology. A voiceprint is a sound wave spectrum that carries speech information displayed by an electroacoustic instrument. The production of human language is a complex physiological and physical process between the language center of the human body and the vocal organs. The vocal organs used by people when speaking-tongue, teeth, larynx, lungs, and nasal cavities vary greatly from person to person in terms of size and shape. , so any two people's voiceprints are different. In general, people can distinguish the voices of different people through voiceprints. Therefore, encrypting files through voiceprints is also a feasible encryption method, but now using voiceprints Encrypted files still have certain limitations. The patent "A Digital Camera Image Encryption and Decryption Method Based on Voiceprint (Application No. CN200810162156)" proposes a method for encrypting and decrypting image information using voiceprint data information, but this method is also Disadvantages: The file can only be encrypted and decrypted by the same person, which is not conducive to multiple people reading the file content in different places.

此外,专利“基于声纹的文档加密及解密方法(申请号CN201110003202.8)”中提出使用声纹加密文档和解密文档,可以从语音中获取声纹,可以方便地使用声纹产生的数据来加解密文档。但是文档只能由同一个用户来加密及解密,文档的上传下载运用在分布式网络上将是非常的困难,并且安全性也很低。In addition, the patent "Voiceprint-Based Document Encryption and Decryption Method (Application No. CN201110003202.8)" proposes to use voiceprint to encrypt and decrypt documents, so that the voiceprint can be obtained from the voice, and the data generated by the voiceprint can be conveniently used to Encrypt and decrypt documents. However, the document can only be encrypted and decrypted by the same user. It will be very difficult to upload and download documents on a distributed network, and the security is also very low.

发明内容Contents of the invention

针对上述现有技术的缺陷,本发明的目的在于提出一种改进声纹加密文件上传下载的方法,旨在提出一种新式方法,解决声纹加密文件的上传下载安全性问题。In view of the above-mentioned defects in the prior art, the purpose of the present invention is to propose an improved method for uploading and downloading encrypted voiceprint files, aiming at proposing a new method to solve the security problem of uploading and downloading encrypted voiceprint files.

为解决上述问题,本发明采用如下技术方案In order to solve the above problems, the present invention adopts the following technical solutions

一种改进声纹加密文件上传下载的方法,分为两个模块,声纹识别采集模块以及加密文件上传下载模块。A method for improving the uploading and downloading of voiceprint encrypted files is divided into two modules, a voiceprint recognition collection module and an encrypted file uploading and downloading module.

声纹识别采集模块具体步骤为:The specific steps of the voiceprint recognition collection module are as follows:

1)在用户体征状态正常的情况下,多次随机采集用户全天候24小时的声音样本,并做好样本命名标注。1) When the user's physical status is normal, randomly collect the user's voice samples 24 hours a day, and name and mark the samples.

2)将收集到的声音数据通过声纹识别设备处理转化为声纹数据。2) Convert the collected voice data into voiceprint data through voiceprint recognition equipment.

3)再将声纹数据通过一定处理转化为二进制数据。3) Then convert the voiceprint data into binary data through certain processing.

4)设置声纹数据处理服务器,将声纹数据与其对应的二进制数据一一对应存储起来。4) A voiceprint data processing server is set up to store the voiceprint data and its corresponding binary data in one-to-one correspondence.

5)依次遵循以上步骤,收集用户的声纹数据以及对应的二进制数据。5) Follow the above steps in order to collect the user's voiceprint data and corresponding binary data.

6)在声纹数据处理服务器上,建立每个用户的信任区域,包括用户名以及可信使用期(可以调用声纹数据的时间段)。6) On the voiceprint data processing server, establish a trust zone for each user, including user name and trusted usage period (time period during which voiceprint data can be called).

加密文件上传下载模块具体步骤为:The specific steps of the encrypted file upload and download module are as follows:

1)用户A在体征正常的情况下通过声纹识别设备,产生声纹数据以及相对应二进制数据。1) User A generates voiceprint data and corresponding binary data through the voiceprint recognition device when his physical signs are normal.

2)将产生的声纹数据与预留在声纹数据处理服务器中用户A预留的声纹数据进行比对。2) Compare the generated voiceprint data with the voiceprint data reserved by user A in the voiceprint data processing server.

3)如果比对成功,则可以确认A的身份信息。3) If the comparison is successful, the identity information of A can be confirmed.

4)如果多次比对不成功,则不能确定A的真实身份或者A的体征状态可能不是正常状态。4) If multiple comparisons are unsuccessful, A's true identity cannot be determined or A's sign status may not be normal.

5)将需要上传的文件转化为对应二进制数据。5) Convert the file to be uploaded into corresponding binary data.

6)将声纹数据对应的二进制数据与文件对应的二进制数据进行依次按位的异或运算,或者其他的逻辑运算,但是加密采用的逻辑运算与解密采用的逻辑运算应是对应的,也就是采用同一种逻辑运算。6) The binary data corresponding to the voiceprint data and the binary data corresponding to the file are sequentially bit-wise XOR operation, or other logical operations, but the logical operation used for encryption and the logical operation used for decryption should be corresponding, that is use the same logical operation.

7)这样文件得到了一次声纹加密形成了加密文件,打上可信时间戳。7) In this way, the file has been encrypted with a voiceprint to form an encrypted file, and a trusted time stamp is stamped on it.

8)用户A上传文件数据到文件服务器,并将下载这段数据的用户名与可信使用期上传到声纹数据处理服务器上。8) User A uploads the file data to the file server, and uploads the user name and trusted period for downloading the data to the voiceprint data processing server.

9)用户B在文件服务器上下载到用户A上传的文件数据。9) User B downloads the file data uploaded by user A on the file server.

10)用户B在通过声纹识别设备产生声纹数据,并在声纹数据处理服务器识别自己的身份信息。10) User B generates voiceprint data through the voiceprint recognition device, and identifies his identity information on the voiceprint data processing server.

11)下载到用户B的文件数据,再次被用户B的声纹数据进行异或运算(二次加密),并打上可信时间戳,最后上传到声纹数据处理服务器。11) The file data downloaded to user B is XORed by user B's voiceprint data again (secondary encryption), stamped with a trusted time stamp, and finally uploaded to the voiceprint data processing server.

12)在声纹数据处理服务器上,搜索用户A的信任区域搜索是否存在用户B,若存在,则将用户A与用户B的可信时间戳进行绝对值差的运算,若在可信使用期内,则将用户B上传的文件数据与用户A的声纹数据对应的二进制数据进行异或运算(一次解密)。12) On the voiceprint data processing server, search the trusted area of user A to search whether there is user B, if it exists, perform an absolute value difference calculation between the trusted time stamps of user A and user B, if within the trusted use period , the binary data corresponding to the file data uploaded by user B and the voiceprint data of user A is subjected to XOR operation (one-time decryption).

13)用户B从声纹数据处理服务器上下载到经过处理过的文件数据,并使用自己的声纹数据对应的二进制数据进行异或运算(二次解密)。13) User B downloads the processed file data from the voiceprint data processing server, and uses the binary data corresponding to his own voiceprint data to perform XOR operation (secondary decryption).

14)用户B获到用户A上传的文件,完成加密文件的上传下载。14) User B obtains the file uploaded by user A, and completes uploading and downloading of the encrypted file.

与现有技术相比,本方法具有如下优势:Compared with the prior art, this method has the following advantages:

一、密钥不会丢失遗忘,每个人的声纹数据在一段很长的时期是稳定存在,可以长期用于提取识别操作,并且不需要主动去记忆无规律冗长的密钥。1. The key will not be lost or forgotten. The voiceprint data of each person exists stably for a long period of time, and can be used for extraction and identification operations for a long time, and there is no need to actively memorize irregular and lengthy keys.

二、采集简洁方便,只需要随意或者刻意说出一段话就可以完成声纹数据的收集。2. The collection is simple and convenient. You only need to say a word casually or deliberately to complete the collection of voiceprint data.

三、加密解密过程简单有效,通过二次加密和二次解密的逻辑运算,完成了文件在上传下载各个过程都是处于加密状态,加密解密都是使用自身存在的声纹数据,并且自身的声纹数据也没有泄露出去。3. The encryption and decryption process is simple and effective. Through the logical operation of secondary encryption and secondary decryption, the file is in an encrypted state during uploading and downloading. Encryption and decryption use its own voiceprint data, and its own voice The pattern data has not been leaked.

附图说明Description of drawings

图1是声纹识别采集模块;Fig. 1 is a voiceprint recognition acquisition module;

图2是加密文件上传下载模块。Figure 2 is an encrypted file upload and download module.

具体实施方式detailed description

本说明书中公开的所有特征,除了互相排斥的特征和/或步骤以外,均可以以任何方式组合。All the features disclosed in this specification, except mutually exclusive features and/or steps, can be combined in any way.

下面结合图1、图2对本发明作详细说明。下面将结合附图及具体实施方式对本方法作进一步的描述。The present invention will be described in detail below in conjunction with FIG. 1 and FIG. 2 . The method will be further described below in conjunction with the accompanying drawings and specific embodiments.

本方法分为两个模块,声纹识别采集模块和加密文件上传下载模块This method is divided into two modules, voiceprint recognition acquisition module and encrypted file upload and download module

声纹识别采集模块具体操作步骤为:The specific operation steps of the voiceprint recognition collection module are as follows:

1.在用户体征状态正常的情况下,多次随机采集用户全天候24小时的声音样本,并做好样本命名标注。1. When the user's physical status is normal, randomly collect the user's voice samples 24 hours a day, and name and mark the samples.

2.将收集到的声音数据通过声纹识别设备处理转化为声纹数据。2. Convert the collected voice data into voiceprint data through voiceprint recognition equipment.

3.再将声纹数据通过一定处理转化为二进制数据。3. Then convert the voiceprint data into binary data through certain processing.

4.设置声纹数据处理服务器,将声纹数据与其对应的二进制数据一一对应存储起来。4. Set up a voiceprint data processing server to store the voiceprint data and its corresponding binary data in one-to-one correspondence.

5.依次遵循以上步骤,收集用户的声纹数据以及对应的二进制数据。5. Follow the above steps in order to collect the user's voiceprint data and the corresponding binary data.

6.在声纹数据处理服务器上,建立每个用户的信任区域,包括用户名以及可信使用期(可以调用声纹数据的时间段)。6. On the voiceprint data processing server, establish a trust zone for each user, including user name and trusted usage period (time period during which voiceprint data can be called).

加密文件上传下载模块具体步骤为:The specific steps of the encrypted file upload and download module are as follows:

1.用户A在体征正常的情况下通过声纹识别设备,产生声纹数据以及相对应的二进制数据。1. User A generates voiceprint data and corresponding binary data through the voiceprint recognition device when his physical signs are normal.

2.将产生的声纹数据与预留在声纹数据处理服务器中用户A预留的声纹数据进行比对。2. Compare the generated voiceprint data with the voiceprint data reserved by user A in the voiceprint data processing server.

3.如果比对成功,则可以确认A的身份信息。3. If the comparison is successful, the identity information of A can be confirmed.

4.如果多次比对不成功,则不能确定A的真实身份或者A的体征状态可能不是正常状态。4. If multiple comparisons are unsuccessful, A's true identity cannot be determined or A's physical status may not be normal.

5.将需要上传的文件转化为对应二进制数据。5. Convert the files to be uploaded into corresponding binary data.

6.将声纹数据对应的二进制数据与文件对应的二进制数据进行依次按位的异或运算,或者其他的逻辑运算,但是加密采用的逻辑运算与解密采用的逻辑运算应是对应的,也就是采用同一种逻辑运算。6. The binary data corresponding to the voiceprint data and the binary data corresponding to the file are sequentially bit-wise XOR operations, or other logical operations, but the logical operations used for encryption and the logical operations used for decryption should correspond, that is use the same logical operation.

7.这样文件得到了一次声纹加密形成了加密文件,打上可信时间戳。7. In this way, the file has been encrypted with a voiceprint to form an encrypted file, and a trusted time stamp is stamped on it.

8.用户A上传文件数据到文件服务器,并将下载这段数据的用户名与可信使用期上传到声纹数据处理服务器上。8. User A uploads the file data to the file server, and uploads the user name and trusted period of time for downloading this data to the voiceprint data processing server.

9.用户B在文件服务器上下载到用户A上传的文件数据。9. User B downloads the file data uploaded by user A on the file server.

10.用户B在通过声纹识别设备产生声纹数据,并在声纹数据处理服务器识别自己的身份信息。10. User B generates voiceprint data through the voiceprint recognition device, and identifies his identity information on the voiceprint data processing server.

11.下载到用户B的文件数据,再次被用户B的声纹数据进行异或运算(二次加密),并打上可信时间戳,最后上传到声纹数据处理服务器。11. The file data downloaded to user B is XORed by user B's voiceprint data again (secondary encryption), stamped with a trusted time stamp, and finally uploaded to the voiceprint data processing server.

12.在声纹数据处理服务器上,搜索用户A的信任区域搜索是否存在用户B,若存在,则将用户A与用户B的可信时间戳进行绝对值差的运算,若在可信使用期内,则将用户B上传的文件数据与用户A的声纹数据对应的二进制数据进行异或运算(一次解密)。12. On the voiceprint data processing server, search the trusted area of user A to find whether user B exists. If it exists, perform an absolute value difference calculation between the trusted time stamps of user A and user B. , the binary data corresponding to the file data uploaded by user B and the voiceprint data of user A is subjected to XOR operation (one-time decryption).

13.用户B从声纹数据处理服务器上下载到经过处理过的文件数据,并使用自己的声纹数据对应的二进制数据进行异或运算(二次解密)。13. User B downloads the processed file data from the voiceprint data processing server, and uses the binary data corresponding to his own voiceprint data to perform XOR operation (secondary decryption).

用户B获到用户A上传的文件,完成加密文件的上传下载。User B obtains the file uploaded by user A, and completes the upload and download of the encrypted file.

Claims (1)

1. a kind of improve the method that vocal print encrypts File Upload and Download, it is characterised in that including vocal print acquisition and storage method and Vocal print encrypts File Upload and Download method,
Described vocal print acquisition and storage method is concretely comprised the following steps:
The first step, multiple random acquisition acoustic information, is switched to voice print database;
Second step, correspondence binary data is converted into by voice print database;
3rd step, by the binary data storage of the corresponding conversion of voice print database on voice print database processing server;
On voice print database processing server, the trust region of each user is set up, the trust region of each user includes user Name and credible validity period;
Described vocal print encryption File Upload and Download method is concretely comprised the following steps:
The first step, carries out a vocal print encryption for the file of upload, stamps trusted timestamp, and upload file server;Tool Body step is as follows:
(11) user A produces voice print database and corresponding binary system by application on voiceprint recognition equipment in the case of sign is normal Data;
(12) voice print database of generation is compared with being reserved in voice print database reserved user A in voice print database processing server It is right;
(13) identity information for successfully confirming A is compared;
Repeatedly compare unsuccessful, then A true identity is uncertain or sign state of A is abnormal;
(14) it is correspondence binary data by the file translations for needing to upload;
The corresponding binary data of voice print database binary data corresponding with file is subjected to logical operation successively, one obtained Secondary vocal print encrypts the encryption file to be formed, and stamps trusted timestamp;The logical operation used and the logic that decryption is used is encrypted to transport Calculation should be corresponded to, using same logical operation;
(15) user A uploads file data to file server, and will download in the user name and credible validity period of this segment data Pass on voice print database processing server;
Second step, the file encrypted once is downloaded from file server, carries out secondary cryptographic operation, and upload to voice print database Processing server, is comprised the following steps that:
(21) user B downloads to the file data of user A uploads on file server;
(22) user B produces voice print database by application on voiceprint recognition equipment, and recognizes the body of oneself in voice print database processing server Part information;
(23) user B file data will be downloaded to, XOR is carried out by user B voice print database, secondary encryption is completed, And trusted timestamp is stamped, finally upload to voice print database processing server;
3rd step, the checking of the uploader and download person's identity of the enterprising style of writing part of voice print database processing server, confirmation is one by one Correspondence, then carry out decryption oprerations first;
I.e. on voice print database processing server, user B is searched in user A trust region, if in the presence of by user A with using Family B trusted timestamp carries out the computing of absolute difference, if in credible validity period, the file data that user B is uploaded with The user A corresponding binary data of voice print database carries out XOR, and completion is once decrypted;
4th step, downloads the file of decryption oprerations from voice print database processing server, and obtained file is downloaded in secondary decryption, It is final to obtain file;
User B is downloaded to from voice print database processing server by treated file data, and uses user B vocal print number XOR is carried out according to corresponding binary data, secondary decryption is completed;The file that user A is uploaded is obtained, encryption file is completed Upload download.
CN201410345311.1A 2014-07-21 2014-07-21 It is a kind of to improve the method that vocal print encrypts File Upload and Download Expired - Fee Related CN104092695B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410345311.1A CN104092695B (en) 2014-07-21 2014-07-21 It is a kind of to improve the method that vocal print encrypts File Upload and Download

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410345311.1A CN104092695B (en) 2014-07-21 2014-07-21 It is a kind of to improve the method that vocal print encrypts File Upload and Download

Publications (2)

Publication Number Publication Date
CN104092695A CN104092695A (en) 2014-10-08
CN104092695B true CN104092695B (en) 2017-09-26

Family

ID=51640376

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410345311.1A Expired - Fee Related CN104092695B (en) 2014-07-21 2014-07-21 It is a kind of to improve the method that vocal print encrypts File Upload and Download

Country Status (1)

Country Link
CN (1) CN104092695B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108123801A (en) * 2017-12-29 2018-06-05 重庆小犀智能科技有限公司 A kind of block chain wallet uses audio encryption private key system and method
CN109802942B (en) * 2018-12-17 2021-06-25 西安电子科技大学 A privacy-preserving voiceprint authentication method
CN113158213B (en) * 2021-04-30 2022-11-29 重庆市科学技术研究院 A data transmission method and system based on living body verification

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102473210A (en) * 2009-07-01 2012-05-23 芒达·帕蒂尔 Method for Remotely Controlling and Monitoring Desktop Software Data
CN103166958A (en) * 2013-02-26 2013-06-19 深圳创维数字技术股份有限公司 Protection method and protection system of file
CN103391201A (en) * 2013-08-05 2013-11-13 公安部第三研究所 System and method for realizing smart card authentication based on voiceprint recognition

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8392580B2 (en) * 2008-02-20 2013-03-05 Research In Motion Limited Methods and systems for facilitating transfer of sessions between user devices

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102473210A (en) * 2009-07-01 2012-05-23 芒达·帕蒂尔 Method for Remotely Controlling and Monitoring Desktop Software Data
CN103166958A (en) * 2013-02-26 2013-06-19 深圳创维数字技术股份有限公司 Protection method and protection system of file
CN103391201A (en) * 2013-08-05 2013-11-13 公安部第三研究所 System and method for realizing smart card authentication based on voiceprint recognition

Also Published As

Publication number Publication date
CN104092695A (en) 2014-10-08

Similar Documents

Publication Publication Date Title
US11263415B2 (en) Transferring data files using a series of visual codes
CN110414203A (en) An Internet medical identity authentication method based on blockchain technology
US8959357B2 (en) Biometric encryption and key generation
CN105429761B (en) A kind of key generation method and device
US20160269178A1 (en) Privacy-Enhanced Biometrics-Secret Binding Scheme
CN107113170B (en) Biometric template storage and verification method, biometric identification device and terminal
CN101093626B (en) Palm key system
WO2017044554A1 (en) Biometric verification of a blockchain database transaction contributor
CN101976321A (en) Generated encrypting method based on face feature key
CN104935429A (en) A data processing method and system using multiple encryption
CN103606047A (en) Password management system
CN111242611B (en) Method and system for recovering digital wallet key
CN105337742B (en) LFSR file encryption and decryption method based on face image features and GPS information
CN106921489B (en) A data encryption method and device
CN102194066A (en) Method for taking fingerprint information as key
CN104092695B (en) It is a kind of to improve the method that vocal print encrypts File Upload and Download
CN106778292B (en) A Quick Restoration Method of Word Encrypted Document
CN110535630B (en) Key generation method, device and storage medium
CN100520671C (en) Finger print encryption and decryption method of electron decument
CN118886066B (en) A privacy protection method for multimodal data
WO2015196642A1 (en) Data encryption method, decryption method and device
CN109039650A (en) A kind of method and its system merging the online information trustship of biological feature encryption technology
WO2017207998A1 (en) Method of associating a person with a digital object
Byeon et al. Deep learning and encryption algorithms based model for enhancing biometric security for artificial intelligence era
CN116484412A (en) Encryption algorithm, medium and storage device for handwriting signing of passive electromagnetic touch screen

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170926