CN1435795A - Method for encrypting inquiry machine data with human biological characteristics and inquiry machine made thereby - Google Patents

Method for encrypting inquiry machine data with human biological characteristics and inquiry machine made thereby Download PDF

Info

Publication number
CN1435795A
CN1435795A CN 02114846 CN02114846A CN1435795A CN 1435795 A CN1435795 A CN 1435795A CN 02114846 CN02114846 CN 02114846 CN 02114846 A CN02114846 A CN 02114846A CN 1435795 A CN1435795 A CN 1435795A
Authority
CN
China
Prior art keywords
client
data
personal information
management person
human body
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 02114846
Other languages
Chinese (zh)
Inventor
许学家
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yiwen Science & Technology Co Ltd Zhongshan City
Original Assignee
Yiwen Science & Technology Co Ltd Zhongshan City
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yiwen Science & Technology Co Ltd Zhongshan City filed Critical Yiwen Science & Technology Co Ltd Zhongshan City
Priority to CN 02114846 priority Critical patent/CN1435795A/en
Publication of CN1435795A publication Critical patent/CN1435795A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

A method for encrypting the data of inquiry machine by the biological feature of human body includes encrypting the private data of client by the biologic feature data of information manager and client to generate encrypted data packet, storing it, decrypting the data packet by the biologic feature data of information manager or client, and reading, modifying, adding or deleting data.

Description

With the method for human body biological characteristics encrypted query machine data and the enquiry machine of manufacturing thereof
1, technical field:
The present invention relates to a kind of with the method for human body biological characteristics encrypted query machine data and the enquiry machine that utilizes this method to make.
2, background technology:
At present, many large corporations such as government bodies unit, large enterprise, bank, securities broker company and hospital etc. are arranged,, improve the work efficiency and the service quality of a public service, all be extensive use of the information inquiry machine in order to increase the transparency of services.These enquiry machines have is furnished with touch-screen, and what have is furnished with keyboard, and the overwhelming majority is only to issue public information to use, and inquires about by the office worker if the client wants the querying individual data just can only arrive sales counter.Though what have also can pass through numerical ciphers querying individual data, enquiry machine is placed on public place usually, and password leaks easily, and security is not high, thereby has influenced the use field of enquiry machine.
Simultaneously, the software section of enquiry machine mainly is the management of database information, if the personal information inquiry is provided, the information of these databases is just extremely important.If adopt simple encryption technology to carry out encryption, will have the danger of being usurped by bootlegging.Fig. 1, shown in Figure 2 be the process of information management, storage and the visit of traditional enquiry machine system, can see that therefrom safety of data is lower, be not suitable for handling and have the personal information higher, so just limit the range of application of enquiry machine system greatly security requirement.
3, summary of the invention:
The purpose of this invention is to provide a kind of method with human body biological characteristics encrypted query machine data, the biological attribute data that it utilizes information management person and user simultaneously to client's personal information carry out encryption and respectively as enter, querying condition, make user's personal information data more safe and reliable.
Another kind of purpose of the present invention provides a kind of enquiry machine that adopts said method to make, and after it has used above-mentioned method, the data security security performance of enquiry machine is improved greatly, and the range of application of enquiry machine is enlarged.
The present invention is achieved by the following technical solution with the method for security protection of human body biological characteristics encrypted query machine data: it comprises the steps:
(A) information storage step: with information management person's biological attribute data and client's biological attribute data this client's personal information is encrypted, formed client's personal information encrypted packets, and storage;
(B) message reference step: the biological attribute data that utilizes information management person's biological attribute data or client is decrypted this client's personal information encrypted packets, so as information management person reading, revise, increase, deletion client's personal information, perhaps be convenient to client's personal information of oneself of reading.
Above-mentioned described biological attribute data can be fingerprint, iris, retina, have the biological attribute datas such as the shape of face of gradually changeable.
Above-mentioned described method for security protection with human body biological characteristics encrypted query machine data also comprises step (C) information management person login system: promptly the information management person's of background system biological characteristic extracts and storage, carries out login method with the living things feature recognition method at background system.
Client's personal information encrypted packets that above-mentioned described step (A) obtains afterwards can be compressed processing, can carry out decompression processing earlier before step (B) is carried out.
A kind of enquiry machine made from the method for security protection of human body biological characteristics encrypted query machine data, it is made up of foreground system and background system, and the AM/BAM system hardware in this enquiry machine system has partly comprised the physical characteristics collecting instrument.
Be provided with super Admin Administration system in the above-mentioned described background system, its major function is that information management person is managed: (1) utilizes alphanumeric passwords to enter background system; (2) set up keeper's biological attribute data storehouse; (3) can change the keeper as the fingerprint of encrypting, in case this keeper not the time, the someone can substitute his work.
The present invention compared with prior art has following advantage with the method for security protection of human body biological attribute data encrypted query machine data: utilize information management person and user's human body biological characteristics simultaneously file to be encrypted and respectively as entering querying condition, make user's personal information data more safe and reliable.At background system, at first the keeper replaces numeral login, the defective of having avoided numerical ciphers to leak easily, forget with the human body biological attribute data; Secondly, with keeper's human body biological characteristics data the individual data of client is encrypted again,, can not read all clients' data even there is illegal person to enter system.Even encrypted file is stolen, be replicated, if there is not keeper's human body biological characteristics data characteristics to be decrypted, can not opens and utilize these data, and will decipher 256 the password string that generates by biological characteristic, its difficulty is sizable.In addition, the user will inquire about the personal information of oneself, as long as the biological characteristic of input oneself just can read information, need not worry password leakage, forget.Human body biological characteristics has the characteristics of unchangeability and uniqueness, and therefore the security with the biological characteristic enciphered data is high.
The present invention compared with prior art has following advantage with the enquiry machine of the method for security protection manufacturing of human body biological characteristics encrypted query machine data: AM/BAM all increases the physical characteristics collecting instrument on the basis of original enquiry machine hardware; Acquisition Instrument links by USB mouth and host computer; whole enquiry machine system architecture is simple; easy to use; the data security confidentiality is higher, can be widely used in the self-service query field.
4, description of drawings:
Below in conjunction with accompanying drawing the present invention is done detailed explanation:
Fig. 1 is the synoptic diagram of the information typing storing process of traditional enquiry machine;
Fig. 2 is the synoptic diagram of the message reference process of traditional enquiry machine;
Fig. 3 is that the present invention encrypts the data message typing of identification enquiry machine data security protection method and the synoptic diagram of storage with human body biological characteristics.
Fig. 4 is the present invention encrypts the data information access of identification enquiry machine data security protection method with human body biological characteristics a synoptic diagram.
Fig. 5 is the structural drawing that utilizes a kind of fingerprint enquiry machine foreground system that the present invention makes;
Fig. 6 is the structural drawing that utilizes a kind of fingerprint enquiry machine background system that the present invention makes;
Fig. 7 is the workflow diagram that utilizes a kind of fingerprint enquiry machine background system that the present invention makes;
Fig. 8 is the workflow diagram that utilizes a kind of fingerprint enquiry machine foreground system that the present invention makes.
5, embodiment:
As shown in Figure 3, Figure 4, the present invention comprises the steps: with the method for security protection of human body biological characteristics encrypted query machine data
(A) information storage step: with information management person's biological attribute data and client's biological attribute data this client's personal information is encrypted, formed client's personal information encrypted packets, and storage; The key of client's personal information encrypted packets can be information management person's biological attribute data or client's biological attribute data.
(B) message reference step: the biological attribute data that utilizes information management person's biological attribute data or client is decrypted this client's personal information encrypted packets, so as information management person reading, revise, increase, deletion client's personal information, perhaps be convenient to client's personal information of oneself of reading.
Above-mentioned described biological attribute data can be fingerprint, iris, retina, have the biological attribute datas such as the shape of face of gradually changeable.It also comprises step (C) information management person login step in addition: promptly the information management person's of background system biological characteristic extracts and storage, carries out login method with the living things feature recognition method at background system.Client's personal information encrypted packets that above-mentioned step (A) obtains afterwards can be compressed processing, data compression process is intertwined code data and file, increase the difficulty of decoding, and the invasion of anti-virus in advance, before carrying out, step (B) can carry out decompression processing earlier.
A kind of enquiry machine made from the method for security protection of human body biological characteristics encrypted query machine data, it is made up of foreground system and background system, and the AM/BAM system hardware in this enquiry machine system has partly comprised the physical characteristics collecting instrument.Be provided with super Admin Administration system in the background system, its major function is that information management person is managed: (1) utilizes alphanumeric passwords to enter background system; (2) set up keeper's biological attribute data storehouse; (3) can change the keeper as the biological attribute data of encrypting, in case this keeper not the time, the someone can substitute his work.
Embodiment 1: as Fig. 5, Fig. 6, Fig. 7, shown in Figure 8, utilize the present invention to produce a kind of fingerprint enquiry machine, its workflow is as follows:
A) the information management person's of background system fingerprint characteristic extracts and storage, carries out login method with fingerprint identification method at background system; And set up information management person's fingerprint characteristic data storehouse;
B) client's fingerprint characteristic data is extracted and stores, set up client's fingerprint characteristic data storehouse;
C) information management person for the client sets up dynamic personal information storehouse;
D) information management person encrypts this client's personal information simultaneously with fingerprint characteristic data of oneself and client's fingerprint characteristic data, forms client's personal information encrypted packets, and each client's personal information encrypted packets is corresponding with its fingerprint characteristic data;
E) if revise certain customer data of interpolation, information management person logins background system with the fingerprint of oneself, find the client's personal information encrypted packets that to revise interpolation by ID number, utilize the fingerprint characteristic data of oneself that this client's personal information encrypted packets is decrypted, open the data file of this client's personal information, thereby the content of revise, adding this client's personal information, information management person encrypts this client's personal information simultaneously again with fingerprint of oneself and client's fingerprint then, forms client's personal information encrypted packets;
F) when the foreground inquiry system has the client to inquire about own personal information, fingerprint characteristic data the input client oneself of foreground queries system, the foreground queries system compares one by one by the fingerprint characteristic data that calls client's fingerprint characteristic data storehouse and this client, find out this client's ID number of personal information encrypted packets correspondence, call this client's personal information encrypted packets then, the fingerprint characteristic data that utilizes this client is decrypted this client's personal information encrypted packets, show its content then, for this client's reading.
As Fig. 5, shown in Figure 6, will the specific embodiment of the present invention be described by the example of " securities broker company's self-service query system " below:
A) fingerprint acquisition instrument prepared of the computer that uses by oneself of the office worker of securities broker company extracts, stores the fingerprint characteristic of oneself, and this fingerprint deposits the fingerprint of administrator storehouse that super keeper sets up simultaneously in.Then, this keeper can upgrade the update mode of background system, with the fingerprint login of oneself, thereby replaces original logining with numerical ciphers.This step can be strengthened the inner management of securities broker company effectively, prevents that unrelated person from entering system.
B) office worker of securities broker company handles account opening procedure for the client, for the client sets up the personal information archives, extracts by fingerprint acquisition instrument simultaneously and stores client's fingerprint characteristic.
C) for after the client handled archives material, with client's fingerprint and the fingerprint of oneself this document is encrypted simultaneously, copy to the foreground after the encryption.
D) after the client carried out stock exchange, the office worker of securities broker company was at first with own fingerprint login background system, and this client's archives are found in by the client ID number, and the fingerprint with oneself is this file declassification then, enters this archives after the deciphering, adds client's data.This step has following benefit than existing method: (1) can not see intrasystem all data just in case illegal person enters background system quickly;
(2) can stop illegal person, computer virus destruction effectively to customer data; (3) if the company clerk carries out illegal activities, investigate foundation.
E) if the office worker of company is absent from duty for some reason, super keeper can utilize super administrator's password to enter background system, calls this office worker's fingerprint characteristic in the fingerprint of administrator storehouse, opens the customer data with its encryption, resets the encryption fingerprint then.
F) client will inquire about the data of oneself, at ID number of the input oneself of foreground elder generation, imports fingerprint then, and after system's comparison fingerprint was correct, the data of just can opening allowed the client read.In the place that The more people, the more eyes, need not worry password leakage again.

Claims (6)

1, with the method for security protection of human body biological characteristics encrypted query machine data, it is characterized in that it comprises the steps:
(A) information storage step: with information management person's biological attribute data and client's biological attribute data this client's personal information is encrypted, formed client's personal information encrypted packets, and storage;
(B) message reference step: the biological attribute data that utilizes information management person's biological attribute data or client is decrypted this client's personal information encrypted packets, so as information management person reading, revise, increase, deletion client's personal information, perhaps be convenient to client's personal information of oneself of reading.
2, the method for security protection with human body biological characteristics encrypted query machine data according to claim 1 is characterized in that described biological attribute data can be fingerprint, iris, retina, have biological attribute datas such as the shape of face of gradually changeable.
3, the method for security protection with human body biological characteristics encrypted query machine data according to claim 1; it is characterized in that it also comprises step (C) information management person login step: promptly the information management person's of background system biological characteristic extracts and storage, carries out login method with the living things feature recognition method at background system.
4, according to claim 1 or 3 described method for security protection with human body biological characteristics encrypted query machine data; it is characterized in that the client's personal information encrypted packets that obtains afterwards in step (A) can compress processing, before step (B) is carried out, can carry out decompression processing to the personal information encrypted packets earlier.
5, a kind of application rights requires the 1 described enquiry machine made from the method for security protection of human body biological characteristics encrypted query machine data; it is made up of foreground system and background system, it is characterized in that the AM/BAM system hardware in this enquiry machine system has partly comprised the physical characteristics collecting instrument.
6, enquiry machine according to claim 5 is characterized in that being provided with in the background system super Admin Administration system, and its major function is that information management person is managed: (1) utilizes alphanumeric passwords to enter background system; (2) set up keeper's biological attribute data storehouse; (3) can change the keeper as the biological attribute data of encrypting, in case this keeper not the time, the someone can substitute his work.
CN 02114846 2002-01-31 2002-01-31 Method for encrypting inquiry machine data with human biological characteristics and inquiry machine made thereby Pending CN1435795A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 02114846 CN1435795A (en) 2002-01-31 2002-01-31 Method for encrypting inquiry machine data with human biological characteristics and inquiry machine made thereby

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 02114846 CN1435795A (en) 2002-01-31 2002-01-31 Method for encrypting inquiry machine data with human biological characteristics and inquiry machine made thereby

Publications (1)

Publication Number Publication Date
CN1435795A true CN1435795A (en) 2003-08-13

Family

ID=27628524

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 02114846 Pending CN1435795A (en) 2002-01-31 2002-01-31 Method for encrypting inquiry machine data with human biological characteristics and inquiry machine made thereby

Country Status (1)

Country Link
CN (1) CN1435795A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100444188C (en) * 2005-08-03 2008-12-17 积体数位股份有限公司 Vocal-print puzzle lock system
US7965873B2 (en) 2006-05-18 2011-06-21 Casio Hitachi Mobile Communications Co., Ltd. Portable electronic apparatus and recording medium
US8356043B2 (en) 2005-04-25 2013-01-15 Fujitsu Limited File management method
CN101692253B (en) * 2005-04-25 2013-03-27 富士通株式会社 File management method
CN106096444A (en) * 2016-06-12 2016-11-09 杨鹏 A kind of identification based on bio information and social information's recording method and system
CN110472433A (en) * 2019-07-05 2019-11-19 苏州米龙信息科技有限公司 Creation service information grading look-up system and method based on safety chip

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8356043B2 (en) 2005-04-25 2013-01-15 Fujitsu Limited File management method
CN101692253B (en) * 2005-04-25 2013-03-27 富士通株式会社 File management method
CN100444188C (en) * 2005-08-03 2008-12-17 积体数位股份有限公司 Vocal-print puzzle lock system
US7965873B2 (en) 2006-05-18 2011-06-21 Casio Hitachi Mobile Communications Co., Ltd. Portable electronic apparatus and recording medium
CN106096444A (en) * 2016-06-12 2016-11-09 杨鹏 A kind of identification based on bio information and social information's recording method and system
WO2017215504A1 (en) * 2016-06-12 2017-12-21 杨鹏 Identity recognition and social information recording method and system based on biological information
CN106096444B (en) * 2016-06-12 2019-05-14 杨鹏 A kind of identification based on biological information and social information's recording method and system
CN110472433A (en) * 2019-07-05 2019-11-19 苏州米龙信息科技有限公司 Creation service information grading look-up system and method based on safety chip

Similar Documents

Publication Publication Date Title
US7426752B2 (en) System and method for order-preserving encryption for numeric data
Agrawal et al. Order preserving encryption for numeric data
US7395437B2 (en) System and method for fast querying of encrypted databases
US8135948B2 (en) Method and system for transparently encrypting sensitive information
US7797342B2 (en) Database system providing encrypted column support for applications
US7844829B2 (en) Secured database system with built-in antivirus protection
Ibrahim et al. Secure rank-ordered search of multi-keyword trapdoor over encrypted cloud data
Hacigümüş et al. Ensuring the integrity of encrypted databases in the database-as-a-service model
Yiu et al. Outsourcing search services on private spatial data
AU2017440029B2 (en) Cryptographic key generation for logically sharded data stores
Damiani et al. Implementation of a storage mechanism for untrusted DBMSs
Mattsson Database encryption-how to balance security with performance
Heurix et al. Pseudonymization with metadata encryption for privacy-preserving searchable documents
CN1435795A (en) Method for encrypting inquiry machine data with human biological characteristics and inquiry machine made thereby
Kadhem et al. A novel framework for database security based on mixed cryptography
Yao et al. Efficient and privacy-preserving search in multi-source personal health record clouds
CN116595587A (en) Document steganography method and document management method based on secret service
Achenbach et al. Mimosecco: A middleware for secure cloud storage
CN113449320A (en) Desensitization method and system for sensitive data of database
Anciaux et al. Data confidentiality: to which extent cryptography and secured hardware can help
EP3461055B1 (en) System and method for secure outsourced annotation of datasets
EP4137978A1 (en) Enhanced data security through combination of encryption and vertical fragmentation of tabular data
Sun et al. ISDB: An effective ciphertext retrieval method for electronic health records based on SDB
Radha et al. EISA–An enterprise application security solution for databases
Mattsson Transparent Encryption and Separation of Duties for Enterprise Databases-A Solution for Field Level Privacy in Databases

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication