5. Conclusions
Cognitive cryptographic techniques are dedicated to protecting and securing datasets of particularly high and material significance. They are dedicated to protecting data that is classified, confidential, strategic and frequently called a secret because of its significance. In cognitive cryptography, it is particularly legitimate to use personal information contained in biometric information sets, as well as semantic information which is unambiguously used to identify the individual features of all protocol users.
Personal information is contained in the datasets held by each protocol participant, because they are embedded in individual biometrics. During the personal identification process, these biometrics and their features are unambiguously used to properly assign the biometric features to the specific person. Then, in the personal verification process, they are used to assess whether the specific biometric features characterise the correct protocol participant.
Hence cognitive cryptography is used to protect information based on the biometric analysis of individual features used to conceal this information. The ability to utilise biometric features and description to identify and verify protocol participants in secret data management allows the shares to be correctly assigned to secret holders, and conversely, the holders to their features. These types of solutions used for managing information of great significance indicate the areas in which intelligent information management can be applied. The word ‘intelligent' applies to semantic solutions which use non-standard biometric features that can be described and interpreted in processes of the semantic interpretation of personal traits.