CN103186761A - Fingerprint encryption method of private file and communication terminal - Google Patents

Fingerprint encryption method of private file and communication terminal Download PDF

Info

Publication number
CN103186761A
CN103186761A CN2011104466685A CN201110446668A CN103186761A CN 103186761 A CN103186761 A CN 103186761A CN 2011104466685 A CN2011104466685 A CN 2011104466685A CN 201110446668 A CN201110446668 A CN 201110446668A CN 103186761 A CN103186761 A CN 103186761A
Authority
CN
China
Prior art keywords
fingerprint
secret file
submodule
file
proprietary
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011104466685A
Other languages
Chinese (zh)
Other versions
CN103186761B (en
Inventor
张辉
成伟男
陈雪松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201110446668.5A priority Critical patent/CN103186761B/en
Publication of CN103186761A publication Critical patent/CN103186761A/en
Application granted granted Critical
Publication of CN103186761B publication Critical patent/CN103186761B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention is suitable for the technical field of communication, and provides a fingerprint encryption method of a private file and a communication terminal. The method comprises the following steps of acquiring fingerprints of an owner of the private file, and encrypting the private file through using the fingerprints. Therefore, the confidentiality of the private file stored by the communication terminal is improved.

Description

Encrypting fingerprint method and the communication terminal thereof of secret file
Technical field
The present invention relates to communication technical field, relate in particular to a kind of encrypting fingerprint method and communication terminal thereof of secret file.
Background technology
Communication terminal universal day by day become requisite means of communication in people's life.When present intelligent communications terminal function from strength to strength, its security risk increased day by day.The privacy functions of intelligent communications terminal and coded lock etc. have become the high-end user in a large amount of intelligent communications terminals that have oneself of the indispensable function of intelligent communications terminal, especially sensitive information, private information, and these security functions seem more important.Such function such as privacy functions and coded lock becomes a fan safety door of intelligent communications terminal.
But, the safety technique of existing intelligent communications terminal such as privacy functions and coded lock, though can when intelligent communications terminal is lost, reduce to loss very low, but when intelligent communications terminal is not lost but under normal operating position, if under the various factorss such as password leakage or T card (T-FLASH card) are stolen, this privacy functions has still demonstrated its very important inferior position.Especially there is the information in the middle of the T card in take pictures and video etc., is easy to be obtained by other non intelligent communication terminal users.
In summary, the encryption technology of existing communication terminal secret file obviously exists inconvenience and defective, so be necessary to be improved on reality is used.
Summary of the invention
At above-mentioned defective, the object of the present invention is to provide a kind of encrypting fingerprint method and communication terminal thereof of secret file, with the confidentiality of the secret file that improves the communication terminal storage.
To achieve these goals, the invention provides a kind of encrypting fingerprint method of secret file, described method comprises the steps:
Gather the proprietary fingerprint of secret file;
Adopt described fingerprint that described secret file is encrypted.
According to the encrypting fingerprint method of described secret file, the step of the proprietary fingerprint of described collection secret file comprises:
When everyone creates, edits or obtain described secret file at described secret file, gather the proprietary fingerprint of described secret file;
When in detecting database, not storing the proprietary fingerprint of described secret file, with the proprietary fingerprint storage of described secret file in described database;
The described fingerprint of described employing comprises the step that described secret file is encrypted:
When in detecting described database, not storing the proprietary fingerprint of described secret file, the described secret file of the proprietary encrypting fingerprint of described secret file that collects;
When in detecting described database, having stored the proprietary fingerprint of described secret file, transfer the described secret file of having stored in the described database of the proprietary encrypting fingerprint of described secret file.
According to the encrypting fingerprint method of described secret file, after the step that adopts described fingerprint that described secret file is encrypted, comprise:
The visit fingerprint of described secret file is set;
According to described visit fingerprint described secret file is decrypted.
According to the encrypting fingerprint method of described secret file, the described step that the visit fingerprint of described secret file is set comprises:
Arrange store in the proprietary fingerprint of described secret file and/or the described database other people fingerprint for the visit fingerprint;
Describedly according to described visit fingerprint the step that described secret file is decrypted is comprised:
Check the icon of described secret file;
The input fingerprint;
Fingerprint and the described visit fingerprint of described input are carried out authentication;
Decipher described secret file by using described visit fingerprint after the authentication.
According to the encrypting fingerprint method of described secret file, described secret file comprises document files, picture file or video file.
In order to realize another goal of the invention of the present invention, the present invention also provides a kind of communication terminal, and described communication terminal comprises:
Acquisition module is for the fingerprint of gathering secret file everyone and other people;
Encrypting module is used for adopting the proprietary fingerprint of described secret file that described secret file is encrypted; And
Database is for the fingerprint of the described secret file of storage and described secret file everyone and other people.
According to described communication terminal, described acquisition module comprises:
Gather submodule, when being used at described secret file everyone and creating, edit or obtain described secret file, gather the proprietary fingerprint of described secret file; Perhaps be used for when the visit fingerprint of described secret file is set, gather other people fingerprint of gain access;
The retrieval submodule is for detection of whether having stored the proprietary fingerprint of described secret file in the described database;
Sub module stored is used for when described retrieval submodule detects described database and do not store the proprietary fingerprint of described secret file, with the proprietary fingerprint storage of described secret file in described database; Perhaps, when the collection of described collection submodule obtains other people fingerprint of described access rights, with described other people fingerprint storage in described database;
Described encrypting module comprises:
Transfer submodule, be used for when described retrieval submodule detects described database and stored the proprietary fingerprint of described secret file, transferring the described fingerprint of having stored in the described database;
Encrypt submodule, be used for described transfer submodule and transfer the described fingerprint that described database stored after, adopt the described secret file of described encrypting fingerprint; Perhaps, be used for when described retrieval submodule detects described database and do not store the proprietary fingerprint of described secret file the described secret file of the proprietary encrypting fingerprint of described secret file that adopts described collection submodule to gather.
According to described communication terminal, described communication terminal also comprises:
Authority arranges module, is used for arranging the visit fingerprint of described secret file; Described visit fingerprint comprises other people fingerprint of storing in the proprietary fingerprint of described secret file and/or the described database;
Deciphering module, the described visit fingerprint that is used for adopting described authority that the module setting is set is decrypted described secret file.
According to described communication terminal, described authority arranges module and comprises:
Search submodule, be used for searching described database stores other people fingerprint;
Submodule is set, is used for arranging the visit fingerprint of described secret file;
Described deciphering module comprises:
Check submodule, be used for checking the icon of described secret file;
The input submodule is used for the input fingerprint;
The authentication submodule is used for described fingerprint and the described visit fingerprint that the submodule setting is set of described input submodule input are carried out authentication;
The deciphering submodule is used for adopting described fingerprint by authentication to decipher described secret file after described authentication submodule passes through the authentication to described fingerprint.
According to described communication terminal, described secret file comprises document files, picture file or video file;
Described collection submodule and described input submodule are arranged on the touch-screen of described communication terminal.
When the present invention edits or obtain the secret file by use communication terminal the user, gather this user's fingerprint, and utilize this fingerprint to carry out real-time encrypted to the secret file; When the user checked the secret file, then the fingerprint that reads described user by communication terminal was decrypted the secret file, realized the instant encryption of secret file and check immediately, and it is simple to operate, and confidentiality is superior.Lose events such as communication terminal the user after, needn't worry to be checked the secret file by the user of other lacks of competence.Carry out a step, the setting of the visit fingerprint that the user can also be by the secret file is shared the secret file with other users, when having promoted the user and experiencing, has more guaranteed the confidentiality of user's secret file.
Description of drawings
Fig. 1 is the structural representation of the communication terminal that provides of one embodiment of the invention;
Fig. 2 is the structural representation of the communication terminal that provides of one embodiment of the invention;
Fig. 3 is the encrypting fingerprint method flow diagram of the secret file that provides of one embodiment of the invention;
Fig. 4 is the encrypting fingerprint method flow diagram of the secret file that provides of one embodiment of the invention.
Embodiment
In order to make purpose of the present invention, technical scheme and advantage clearer, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explaining the present invention, and be not used in restriction the present invention.
Referring to Fig. 1, one embodiment of the invention provides a kind of communication terminal 100, and described communication terminal 100 comprises:
Acquisition module 10 is for the fingerprint of gathering secret file everyone and other people;
Encrypting module 20 is used for adopting the proprietary fingerprint of described secret file that described secret file is encrypted; And
Database 30 is for the fingerprint of the described secret file of storage and described secret file everyone and other people.
In the present invention, communication terminal 100 has comprised acquisition module 10 and encrypting module 20, gather the proprietary fingerprint of described secret file by acquisition module 10, if utilize this fingerprint that described secret file is encrypted, well-known people's fingerprint is independent nothing two, therefore in the present invention, by fingerprint to the secret file encryption, the real owner who then has only this secret file, or the user of other mandates just can decipher this secret file, reached good secret effect, and such cipher mode is simple to operate, the user need not arrange operations such as password, only need utilize acquisition module 10 that its fingerprint is gathered, and just can realize the instant encryption to these secret files.And the secret file comprises document files, picture file or video file.For example, the documentum privatum that some of user are important comprises company contract, with relatives' secret chat content; Or some pictures, comprise the private photos that the user adopts the camera function of communication terminal 100 to take, can also be the file that Any user such as some video files will be maintained secrecy certainly.Communication terminal 100 can be mobile phone, PDA (Personal Digital Assistant, personal digital assistant), palm PC etc.
Referring to Fig. 2, in one embodiment of the invention, described acquisition module 10 comprises:
Gather submodule 11, when being used at described secret file everyone and creating, edit or obtain described secret file, gather the proprietary fingerprint of described secret file; Perhaps be used for when the visit fingerprint of described secret file is set, gather other people fingerprint of gain access;
Retrieval submodule 12 is for detection of whether having stored the proprietary fingerprint of described secret file in the database 30;
Sub module stored 13 is used for when retrieval submodule 12 detects database 30 and do not store the proprietary fingerprint of described secret file, with the proprietary fingerprint storage of described secret file in database 30; Perhaps, when gathering submodule 11 and gather other people fingerprint that obtains described access rights, with described other people fingerprint storage in database 30;
Gather submodule 11 and be when everyone edits or gather this secret file at described secret file to this everyone and carry out the collection of fingerprint.For example, this everyone during by communication terminal 100 Edit Documents, then when it preserves operation to the document, namely triggered and gathered 11 pairs of submodules this everyone and carry out the collection of fingerprint.Or this institute chooses when adopting communication terminal 100 to take pictures, and presses when taking button when it, starts to gather submodule 11 its fingerprint is gathered.Gather other people collection of fingerprint that submodule 11 also can have access rights to described secret file.After gathering the proprietary fingerprint of secret file, whether 12 pairs of databases 30 of retrieval submodule detect, according to the fingerprint that collects, retrieve this fingerprint and be stored in the database 30; If do not have, then expression this proprietary fingerprint is to collect the first time, sub module stored 13 with this fingerprint storage in database 30.And sub module stored 13 also has described secret file other people fingerprint and being stored in the database 30 of described secret file of access rights.
Referring to Fig. 2, in one embodiment of the invention, encrypting module 20 comprises:
Transfer submodule 21, be used for when retrieval submodule 12 detects database 30 and stored the proprietary fingerprint of described secret file, transferring the described fingerprint of having stored in the database 30;
Encrypt submodule 22, be used for after transferring submodule 21 and transferring the described fingerprint that database 30 stored, adopting the described secret file of described encrypting fingerprint; Perhaps, be used for when retrieval submodule 12 detects database 30 and do not store the proprietary fingerprint of described secret file, adopting and gathering the described secret file of the proprietary encrypting fingerprint of described secret file that submodule 11 is gathered.
Gather the fingerprint that submodule 11 collects when retrieval submodule 12 detects to have stored in the database 30, then transfer this fingerprint by transferring submodule 21, be encrypted by encrypting 22 pairs of secret files of submodule then.In addition, beyond the proprietary fingerprint of described secret file that 13 pairs of collections of sub module stored submodule 11 collects is for the first time stored, encrypt submodule 22 and also utilize this fingerprint that collects for the first time that the secret file is encrypted immediately.
Referring to Fig. 2, in another embodiment of the present invention, communication terminal 100 also comprises:
Authority arranges module 40, is used for arranging the visit fingerprint of described secret file; Described visit fingerprint comprises in the proprietary fingerprint of described secret file and/or the database 30 other people fingerprint of storage;
Deciphering module 50, the described visit fingerprint that is used for adopting authority that module 40 settings are set is decrypted described secret file.
After the secret file was encrypted, the secret file had obtained good protection.When everyone of this secret file need check, then need its secret file that carries out after this encryption is decrypted.Deciphering module 50 adopts the proprietary fingerprint of described secret files that described secret file is decrypted, and has not only guaranteed to have only real everyone of secret file can view this secret file, and it is easy to operate simultaneously.And the user does not need to record as loaded down with trivial details things such as passwords the problem of having avoided password loss can't check the secret file.In addition, even the user has lost communication terminal 100, do not have the proprietary fingerprint of secret file can't open the secret file, effectively guaranteed the secret safety of files.In a preferred embodiment of the invention, everyone of described secret file can also arrange other users and check described secret file, utilize authority that the conduct interviews setting of fingerprint of 40 pairs of these secret files of module is set, this its user's fingerprint can be stored in the database 30 in advance, perhaps when needs arrange its authority, gather by gathering submodule 11, and real-time storage is in database 30.Therefore, deciphering module 50 also can adopt this other people fingerprint that obtains power that described secret file is decrypted.
Referring to Fig. 2, in one embodiment of the invention, authority arranges module 40 and comprises:
Search submodule 41, be used for searching other people fingerprint of database 30 storages;
Submodule 42 is set, is used for arranging the visit fingerprint of described secret file;
Deciphering module 50 comprises:
Check submodule 51, be used for checking the icon of described secret file;
Input submodule 52 is used for the input fingerprint;
Authentication submodule 53, the visit fingerprint that is used for will importing the described fingerprint of submodule 52 inputs and submodule 42 settings being set carries out authentication;
Deciphering submodule 54 is used for adopting described fingerprint by authentication to decipher described secret file after authentication submodule 53 passes through the authentication to described fingerprint.
In this embodiment, by authority the visit fingerprint that module 40 arranges described secret file is set, namely adopts which fingerprint can check this secret file.Everyone encrypts the secret file fingerprint of use yes and can check and proprietary other friends of this secret file, relatives etc. can also be set described secret file in addition can check this secret file.Then also be to realize visit by the fingerprint of verifying proprietary other friends of this secret file, relatives.At first, search other people fingerprint that submodule 41 is searched in the database 30 storage; This other people fingerprint is the fingerprint with user of this secret file permission of visit, and it can be stored in the database 30 in advance, perhaps when needs arrange this secret file permission of visit, is stored in the database 30 after submodule 11 is gathered by gathering.Searching submodule 41 can be by checking corresponding fingerprint as the mode of name, in database 30, find the visit fingerprint with access rights after, the visit fingerprint that submodule 42 arranges described secret file is set.
When checking the secret file by the visit fingerprint, communication terminal 100 shows the icon of secret file, but this icon does not show the content of actual secret file, can be referred to as false icon.Then by checking that submodule 51 checks the icon of this secret file, by input submodule 52 input reference persons' fingerprint, the described fingerprint that 53 of authentication submodules will imports submodule 52 inputs carries out authentication with the visit fingerprint that submodule 42 settings are set then; By after the authentication to described fingerprint, deciphering submodule 54 adopts described fingerprint by authentication to decipher described secret file, just can check described secret file at authentication submodule 53.Certainly, if be to use the thumbprint of everyone right hand of secret file at that time, what then need to gather is the thumbprint of this user's the right hand this moment, and deciphering submodule 54 can be deciphered this secret file.
In a preferred embodiment of the invention, gathering submodule 11 is arranged on the touch-screen of described communication terminal 100 with input submodule 52.Can obtain user fingerprints information when key is taken pictures in the touch-screen click, namely touch-screen is supported fingerprint recognition.Background program carries out digitizing to user fingerprints information, deposits in the database 30.When gathering fingerprint, by the touch-screen photographs button startup acquisition module 10 of communication terminal 100; Perhaps the storage button by communication terminal 100 starts acquisition module 10.When needs were checked the secret file, the user can start input submodule 52 by finger being placed on the touch-screen of communication terminal 100, the input user fingerprints.For example, the user takes pictures by communication terminal 100, then when the user presses touch-screen photographs button, gathers submodule 11 and gathers user's fingerprint; If this user adopts this communication terminal 100 to take for the first time, then encrypt submodule 22 and adopt this this photo of fingerprint ground to be encrypted immediately.
Referring to Fig. 3, one embodiment of the present of invention also provide a kind of encrypting fingerprint method of secret file, and described method uses each module of above-mentioned communication terminal 100 to realize that described method comprises the steps:
Among the step S301, acquisition module 10 is gathered the proprietary fingerprint of secret file;
Among the step S302, encrypting module 20 adopts described fingerprint that described secret file is encrypted.
In the present invention, user's secret file is carried out instant encryption, namely acquisition module 10 in time adopts described fingerprint that described secret file is encrypted by encrypting module 20 after gathering the proprietary fingerprint of secret files.Make user's secret file obtain good protection like this, especially the impromptu secret that takes of user is shone or other important working documents.
In one embodiment of the invention, described step S301 step comprises:
When gathering submodule 11 everyone creating, edits or obtain described secret file at described secret file, gather the proprietary fingerprint of described secret file; For example, the user is adopting communication terminal 100 to take pictures or during secret file such as Edit Document, gather by 11 couples of users' of this collection submodule fingerprint.
Detect when not storing the proprietary fingerprint of described secret file in the databases 30 at retrieval submodule 12, sub module stored 13 with the proprietary fingerprint storage of described secret file in database 30; After the fingerprint of gathering 11 couples of users of submodule is gathered, if do not store this fingerprint in retrieval submodule 12 searching databases 30, then with this fingerprint storage in database 30, prepare to wait for to be used.
Described step S302 comprises:
When in retrieval submodule 12 detection databases 30, not storing the proprietary fingerprint of described secret file, encrypt the described secret file of the proprietary encrypting fingerprint of described secret file that submodule 22 collects;
When having stored the proprietary fingerprint of described secret file in retrieval submodule 12 detection databases 30,22 employings of encryption submodule are transferred submodule 21 and are transferred the described secret file of having stored in the database 30 of the proprietary encrypting fingerprint of described secret file.Can adopt the described user's who has stored in the database 30 fingerprint to be encrypted at encryption submodule 22, perhaps adopt the described user's of described instantaneous acquiring fingerprint to be encrypted.It is simple to operation, and privacy is good.
Comprise after step S302: authority arranges the visit fingerprint that module 40 arranges described secret file; And the step that described secret file is decrypted according to described visit fingerprint of deciphering module 50.Wherein other people fingerprint that submodule 42 arranges in the proprietary fingerprint of described secret file and/or the database 30 storage that arranges that arranges in the module 40 of authority is the visit fingerprint; Check that submodule 51 checks the icon of described secret file; Input submodule 52 input fingerprints; Authentication submodule 53 carries out authentication with fingerprint and the described visit fingerprint of described input; Use described visit fingerprint to decipher described secret file by deciphering submodule 54 after the authentication.
When needs are checked the secret file, have only and by authority the fingerprint that module 40 setting has authority is set and visits, therefore, authority arranges searching submodule 41 and can search the access code that whether has the user to arrange in the database 30 earlier in the module 40, if having then can by arrange submodule 42 arrange this its have access rights.Certainly, the proprietary encryption fingerprint of secret file can view this secret file.And during the secret file behind enabling decryption of encrypted, check that submodule 51 checks the icon of described secret file, and adopt the described visit fingerprint of input submodules 52 inputs to decipher described secret file by deciphering submodule 54 then, obtain to check.This secret file encryption-decryption mode is easy to operate simple, user-friendly.
Referring to Fig. 4, the encrypting fingerprint method of the secret file that one embodiment of the invention provides specifically describes as follows:
Among the step S401, open communication terminal 100 and take pictures, obtain user fingerprints information; The user takes pictures by the shoot function of communication terminal 100, then when starting this function, gathers submodule 11 after the user opens camera and takes pictures, and presses the user and obtains user fingerprints information when taking pictures key; And be stored in the database 30.
Among the step S402, the finger print information in retrieval submodule 12 searching databases 30, the fingerprint that whether has existed described collection submodule 11 to collect is execution in step S403 then, otherwise execution in step S404;
Among the step S403, encrypt submodule 22 and directly use this fingerprint comparison film to carry out instant encryption;
Among the step S404, sub module stored 13 storage user fingerprints information are encrypted submodule 22 comparison films and are encrypted.
Among the step S405, input submodule 52 is gathered described fingerprint when checking picture, and 54 deciphering of deciphering submodule can be checked true picture.
In this embodiment, communication terminal 100 is encrypted the photo that took just now or video according to the user fingerprints information of obtaining, and the file after encrypting is stored.When the user took pictures next time, the user that the finger print information in the searching database 30, finger print information have existed then directly used this finger print information to be encrypted, and did not exist then to deposit new finger print information in.When the user checks image file with the finger click, gather user fingerprints and carry out authentication with the user fingerprints information that is stored in database 30, if consistent, just be decrypted and open image, if the inconsistent user's lack of competence of just pointing out accomplishes to maintain secrecy.Therefore, by this embodiment, the impromptu secret photograph that takes of user have a good security.In the process of taking pictures, obtain user's fingerprint in the moment that the user presses the key of taking pictures, use user's fingerprint comparison film to carry out instant encryption then.Make secret that the user takes oneself happily according to and do not have trouble and worry.In this embodiment, adopt the encrypting fingerprint technology, instant encryption when taking pictures is seeing that picture is instant deciphering; To privacy functions be a kind of replenish, make communication terminal 100 instant encryptions, instant deciphering, the user is easy to use, directly perceived.
In sum, when the present invention edits or obtain the secret file by use communication terminal the user, gather this user's fingerprint, and utilize this fingerprint to carry out real-time encrypted to the secret file; When the user checked the secret file, then the fingerprint that reads described user by communication terminal was decrypted the secret file, realized the instant encryption of secret file and check immediately, and it is simple to operate, and confidentiality is superior.Lose events such as communication terminal the user after, needn't worry to be checked the secret file by the user of other lacks of competence.Carry out a step, the setting of the visit fingerprint that the user can also be by the secret file is shared the secret file with other users, when having promoted the user and experiencing, has more guaranteed the confidentiality of user's secret file.
Certainly; the present invention also can have other various embodiments; under the situation that does not deviate from spirit of the present invention and essence thereof; those of ordinary skill in the art work as can make various corresponding changes and distortion according to the present invention, but these corresponding changes and distortion all should belong to the protection domain of the appended claim of the present invention.

Claims (10)

1. the encrypting fingerprint method of a secret file is characterized in that, described method comprises the steps:
Gather the proprietary fingerprint of secret file;
Adopt described fingerprint that described secret file is encrypted.
2. the encrypting fingerprint method of secret file according to claim 1 is characterized in that, the step of the proprietary fingerprint of described collection secret file comprises:
When everyone creates, edits or obtain described secret file at described secret file, gather the proprietary fingerprint of described secret file;
When in detecting database, not storing the proprietary fingerprint of described secret file, with the proprietary fingerprint storage of described secret file in described database;
The described fingerprint of described employing comprises the step that described secret file is encrypted:
When in detecting described database, not storing the proprietary fingerprint of described secret file, the described secret file of the proprietary encrypting fingerprint of described secret file that collects;
When in detecting described database, having stored the proprietary fingerprint of described secret file, transfer the described secret file of having stored in the described database of the proprietary encrypting fingerprint of described secret file.
3. the encrypting fingerprint method of secret file according to claim 2 is characterized in that, comprises after the step that adopts described fingerprint that described secret file is encrypted:
The visit fingerprint of described secret file is set;
According to described visit fingerprint described secret file is decrypted.
4. the encrypting fingerprint method of secret file according to claim 3 is characterized in that, the described step that the visit fingerprint of described secret file is set comprises:
Arrange store in the proprietary fingerprint of described secret file and/or the described database other people fingerprint for the visit fingerprint;
Describedly according to described visit fingerprint the step that described secret file is decrypted is comprised:
Check the icon of described secret file;
The input fingerprint;
Fingerprint and the described visit fingerprint of described input are carried out authentication;
Decipher described secret file by using described visit fingerprint after the authentication.
5. the encrypting fingerprint method of secret file according to claim 4 is characterized in that, described secret file comprises document files, picture file or video file.
6. a communication terminal is characterized in that, described communication terminal comprises:
Acquisition module is for the fingerprint of gathering secret file everyone and other people;
Encrypting module is used for adopting the proprietary fingerprint of described secret file that described secret file is encrypted; And
Database is for the fingerprint of the described secret file of storage and described secret file everyone and other people.
7. communication terminal according to claim 6 is characterized in that, described acquisition module comprises:
Gather submodule, when being used at described secret file everyone and creating, edit or obtain described secret file, gather the proprietary fingerprint of described secret file; Perhaps be used for when the visit fingerprint of described secret file is set, gather other people fingerprint of gain access;
The retrieval submodule is for detection of whether having stored the proprietary fingerprint of described secret file in the described database;
Sub module stored is used for when described retrieval submodule detects described database and do not store the proprietary fingerprint of described secret file, with the proprietary fingerprint storage of described secret file in described database; Perhaps, when the collection of described collection submodule obtains other people fingerprint of described access rights, with described other people fingerprint storage in described database;
Described encrypting module comprises:
Transfer submodule, be used for when described retrieval submodule detects described database and stored the proprietary fingerprint of described secret file, transferring the described fingerprint of having stored in the described database;
Encrypt submodule, be used for described transfer submodule and transfer the described fingerprint that described database stored after, adopt the described secret file of described encrypting fingerprint; Perhaps, be used for when described retrieval submodule detects described database and do not store the proprietary fingerprint of described secret file the described secret file of the proprietary encrypting fingerprint of described secret file that adopts described collection submodule to gather.
8. communication terminal according to claim 7 is characterized in that, described communication terminal also comprises:
Authority arranges module, is used for arranging the visit fingerprint of described secret file; Described visit fingerprint comprises other people fingerprint of storing in the proprietary fingerprint of described secret file and/or the described database;
Deciphering module, the described visit fingerprint that is used for adopting described authority that the module setting is set is decrypted described secret file.
9. communication terminal according to claim 8 is characterized in that, described authority arranges module and comprises:
Search submodule, be used for searching described database stores other people fingerprint;
Submodule is set, is used for arranging the visit fingerprint of described secret file;
Described deciphering module comprises:
Check submodule, be used for checking the icon of described secret file;
The input submodule is used for the input fingerprint;
The authentication submodule is used for described fingerprint and the described visit fingerprint that the submodule setting is set of described input submodule input are carried out authentication;
The deciphering submodule is used for adopting described fingerprint by authentication to decipher described secret file after described authentication submodule passes through the authentication to described fingerprint.
10. communication terminal according to claim 9 is characterized in that, described secret file comprises document files, picture file or video file;
Described collection submodule and described input submodule are arranged on the touch-screen of described communication terminal.
CN201110446668.5A 2011-12-28 2011-12-28 The fingerprint encryption method and its communication terminal of secret file Expired - Fee Related CN103186761B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110446668.5A CN103186761B (en) 2011-12-28 2011-12-28 The fingerprint encryption method and its communication terminal of secret file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110446668.5A CN103186761B (en) 2011-12-28 2011-12-28 The fingerprint encryption method and its communication terminal of secret file

Publications (2)

Publication Number Publication Date
CN103186761A true CN103186761A (en) 2013-07-03
CN103186761B CN103186761B (en) 2017-06-20

Family

ID=48677924

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110446668.5A Expired - Fee Related CN103186761B (en) 2011-12-28 2011-12-28 The fingerprint encryption method and its communication terminal of secret file

Country Status (1)

Country Link
CN (1) CN103186761B (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103677638A (en) * 2013-12-06 2014-03-26 北京奇虎科技有限公司 Method and device for processing private documents
WO2014169610A1 (en) * 2013-09-12 2014-10-23 中兴通讯股份有限公司 Data encryption and decryption method and device, and protection system of mobile terminal
CN104778416A (en) * 2015-03-04 2015-07-15 广东欧珀移动通信有限公司 Information hiding method and terminal
CN104866773A (en) * 2015-05-11 2015-08-26 酷派软件技术(深圳)有限公司 Fingerprint search method and apparatus, and terminal
CN105160264A (en) * 2015-09-29 2015-12-16 努比亚技术有限公司 Photograph encryption device and method
CN105404983A (en) * 2015-12-25 2016-03-16 浙江中烟工业有限责任公司 File approval device with fingerprint identification function
CN105528557A (en) * 2015-12-08 2016-04-27 广东欧珀移动通信有限公司 Method and device for encrypting audio file
CN105631284A (en) * 2015-08-20 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Dual-system based information processing method and apparatus as well as electronic device
CN105653971A (en) * 2015-07-24 2016-06-08 哈尔滨安天科技股份有限公司 File protection method and apparatus based on interlayer
CN106101611A (en) * 2016-05-20 2016-11-09 青岛江盈自控装备制造有限公司 A kind of ambient scene evidence preserves system
CN106127004A (en) * 2016-06-21 2016-11-16 广东欧珀移动通信有限公司 A kind of document handling method and terminal unit
CN106295368A (en) * 2016-08-17 2017-01-04 四川长虹通信科技有限公司 The data security protection method of a kind of mobile terminal and system
CN106295389A (en) * 2015-06-04 2017-01-04 宏达国际电子股份有限公司 Screen content encryption method and the electronic installation of use the method
WO2017000123A1 (en) * 2015-06-29 2017-01-05 宇龙计算机通信科技(深圳)有限公司 Information processing method and device
CN106406726A (en) * 2016-08-26 2017-02-15 广东欧珀移动通信有限公司 Application control method and device and terminal equipment
CN106648370A (en) * 2016-12-29 2017-05-10 维沃移动通信有限公司 Encrypting method for screenshots and mobile terminal
CN107229875A (en) * 2017-06-01 2017-10-03 深圳市伊特利网络科技有限公司 Terminal method for secret protection and system
WO2019036972A1 (en) * 2017-08-23 2019-02-28 深圳市优品壹电子有限公司 Data backup method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030140235A1 (en) * 2000-06-02 2003-07-24 Guy Immega Method for biometric encryption of email
CN1674501A (en) * 2005-03-23 2005-09-28 西安青松科技股份有限公司 File enciphered signature system based on fingerprint and realizing method thereof
CN1719373A (en) * 2005-07-27 2006-01-11 深圳市亚略特生物识别科技有限公司 Finger print encryption and decryption method of electron decument
CN102004872A (en) * 2010-10-27 2011-04-06 杨莹 Fingerprint encryption-based identity authentication system and implementation method thereof
CN102185694A (en) * 2010-12-21 2011-09-14 常熟理工学院 Electronic file encrypting method and system based on fingerprint information

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030140235A1 (en) * 2000-06-02 2003-07-24 Guy Immega Method for biometric encryption of email
CN1674501A (en) * 2005-03-23 2005-09-28 西安青松科技股份有限公司 File enciphered signature system based on fingerprint and realizing method thereof
CN1719373A (en) * 2005-07-27 2006-01-11 深圳市亚略特生物识别科技有限公司 Finger print encryption and decryption method of electron decument
CN102004872A (en) * 2010-10-27 2011-04-06 杨莹 Fingerprint encryption-based identity authentication system and implementation method thereof
CN102185694A (en) * 2010-12-21 2011-09-14 常熟理工学院 Electronic file encrypting method and system based on fingerprint information

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王树成: "基于指纹特征的 Windows 操作系统登录与文件加密系统的设计与实现", 《CNKI中国优秀硕士学位论文全文数据库》 *

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014169610A1 (en) * 2013-09-12 2014-10-23 中兴通讯股份有限公司 Data encryption and decryption method and device, and protection system of mobile terminal
CN104468937A (en) * 2013-09-12 2015-03-25 中兴通讯股份有限公司 Data encryption and decryption methods and devices for mobile terminal and protection system
CN103677638A (en) * 2013-12-06 2014-03-26 北京奇虎科技有限公司 Method and device for processing private documents
CN104778416A (en) * 2015-03-04 2015-07-15 广东欧珀移动通信有限公司 Information hiding method and terminal
CN104778416B (en) * 2015-03-04 2018-03-27 广东欧珀移动通信有限公司 A kind of information concealing method and terminal
WO2016179889A1 (en) * 2015-05-11 2016-11-17 宇龙计算机通信科技(深圳)有限公司 Fingerprint search method and apparatus, and terminal
CN104866773A (en) * 2015-05-11 2015-08-26 酷派软件技术(深圳)有限公司 Fingerprint search method and apparatus, and terminal
CN104866773B (en) * 2015-05-11 2018-04-10 酷派软件技术(深圳)有限公司 A kind of fingerprint search method, apparatus and terminal
CN106295389B (en) * 2015-06-04 2021-02-09 宏达国际电子股份有限公司 Screen content encryption method and electronic device using same
CN106295389A (en) * 2015-06-04 2017-01-04 宏达国际电子股份有限公司 Screen content encryption method and the electronic installation of use the method
WO2017000123A1 (en) * 2015-06-29 2017-01-05 宇龙计算机通信科技(深圳)有限公司 Information processing method and device
CN105653971A (en) * 2015-07-24 2016-06-08 哈尔滨安天科技股份有限公司 File protection method and apparatus based on interlayer
CN105631284B (en) * 2015-08-20 2018-11-06 宇龙计算机通信科技(深圳)有限公司 A kind of information processing method, device and electronic equipment based on dual system
CN105631284A (en) * 2015-08-20 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Dual-system based information processing method and apparatus as well as electronic device
CN105160264A (en) * 2015-09-29 2015-12-16 努比亚技术有限公司 Photograph encryption device and method
CN105160264B (en) * 2015-09-29 2019-03-29 努比亚技术有限公司 Photo encryption device and method
CN105528557A (en) * 2015-12-08 2016-04-27 广东欧珀移动通信有限公司 Method and device for encrypting audio file
CN105404983B (en) * 2015-12-25 2019-04-23 浙江中烟工业有限责任公司 A kind of document approvals device with fingerprint identification function
CN105404983A (en) * 2015-12-25 2016-03-16 浙江中烟工业有限责任公司 File approval device with fingerprint identification function
CN106101611A (en) * 2016-05-20 2016-11-09 青岛江盈自控装备制造有限公司 A kind of ambient scene evidence preserves system
CN106127004B (en) * 2016-06-21 2019-04-05 Oppo广东移动通信有限公司 A kind of document handling method and terminal device
CN106127004A (en) * 2016-06-21 2016-11-16 广东欧珀移动通信有限公司 A kind of document handling method and terminal unit
CN106295368A (en) * 2016-08-17 2017-01-04 四川长虹通信科技有限公司 The data security protection method of a kind of mobile terminal and system
CN106406726A (en) * 2016-08-26 2017-02-15 广东欧珀移动通信有限公司 Application control method and device and terminal equipment
CN106406726B (en) * 2016-08-26 2019-09-17 Oppo广东移动通信有限公司 Using control method, device and terminal device
CN106648370A (en) * 2016-12-29 2017-05-10 维沃移动通信有限公司 Encrypting method for screenshots and mobile terminal
CN107229875A (en) * 2017-06-01 2017-10-03 深圳市伊特利网络科技有限公司 Terminal method for secret protection and system
WO2018218806A1 (en) * 2017-06-01 2018-12-06 深圳市伊特利网络科技有限公司 Terminal privacy protection method and system
WO2019036972A1 (en) * 2017-08-23 2019-02-28 深圳市优品壹电子有限公司 Data backup method and device

Also Published As

Publication number Publication date
CN103186761B (en) 2017-06-20

Similar Documents

Publication Publication Date Title
CN103186761A (en) Fingerprint encryption method of private file and communication terminal
CN102460474B (en) Biometric identification method
JP4771942B2 (en) Personal information management device, distributed key storage device, personal information management system, personal information management method, computer program, recording medium, and integrated circuit
CN105260669B (en) The transmission method and Transmission system of photo
CN104662870A (en) Data security management system
WO2008010275A1 (en) Medium data processing device and medium data processing method
CN103634477A (en) Method and system for preventing thievery of mobile phone with fingerprint device
TW201424324A (en) Method and apparatus of account login
CN101118586A (en) Information processing apparatus, data processing apparatus, and methods thereof
CA3156555C (en) Cryptographic key management
US20150304321A1 (en) An image management system and an image management method based on fingerprint authentication
CN102891749A (en) Method and communication terminal for data encryption
US11405193B2 (en) Encrypted photographing method and system based on fingerprint recognition
WO2014029258A1 (en) Certificate processing method and terminal
CN103077357A (en) Method for storing private files
JP7105495B2 (en) Segmented key authenticator
CN105323355A (en) Android privacy protection system based on palm print recognition
JP7278345B2 (en) Mobile terminal privacy protection method and protection device, and mobile terminal
WO2010038763A1 (en) Information management system, terminal unit, server device and program
WO2011088660A1 (en) Method and apparatus for protecting cell-phone information content
WO2016052959A1 (en) Online secret data management system and method therefor
KR101485968B1 (en) Method for accessing to encoded files
WO2019216847A2 (en) A sim-based data security system
KR101559915B1 (en) A system of managing shared data in the smart phone by using couple finger-prints
CN101373507A (en) Data management method and data management system using the same

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170620

Termination date: 20211228