CN103186761B - The fingerprint encryption method and its communication terminal of secret file - Google Patents

The fingerprint encryption method and its communication terminal of secret file Download PDF

Info

Publication number
CN103186761B
CN103186761B CN201110446668.5A CN201110446668A CN103186761B CN 103186761 B CN103186761 B CN 103186761B CN 201110446668 A CN201110446668 A CN 201110446668A CN 103186761 B CN103186761 B CN 103186761B
Authority
CN
China
Prior art keywords
fingerprint
secret file
submodule
file
secret
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201110446668.5A
Other languages
Chinese (zh)
Other versions
CN103186761A (en
Inventor
张辉
成伟男
陈雪松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201110446668.5A priority Critical patent/CN103186761B/en
Publication of CN103186761A publication Critical patent/CN103186761A/en
Application granted granted Critical
Publication of CN103186761B publication Critical patent/CN103186761B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The present invention is applied to communication technical field, there is provided a kind of fingerprint encryption method and its communication terminal of secret file, methods described comprise the following steps:The collection proprietary fingerprint of secret file;The secret file is encrypted using the fingerprint.Whereby, the present invention improves the confidentiality of the secret file of communication terminal storage.

Description

The fingerprint encryption method and its communication terminal of secret file
Technical field
The present invention relates to communication technical field, more particularly to a kind of secret file fingerprint encryption method and its communication eventually End.
Background technology
Becoming increasingly popular for communication terminal, has become means of communication essential during people live.In present intelligence While communication terminal functions are stronger and stronger, its security risk increasingly increases.Privacy functions of intelligent communications terminal and close Code lock etc. has become the indispensable function of intelligent communications terminal, and especially sensitive information, private information largely have oneself Intelligent communications terminal in high-end user, these security functions seem more important.Privacy functions and coded lock etc. are such Function turns into a fan safety door of intelligent communications terminal.
But, the safe practice such as privacy functions and coded lock of existing intelligent communications terminal, although can be intelligently logical Loss is reduced to during letter lost terminal it is very low, but when intelligent communications terminal is not lost but under normal usage, if Password reveal or T cards (T-FLASH cards) stolen etc. under various factors, this privacy functions still show it can not be suddenly Depending on inferior position.Especially take pictures and video etc. has information in the middle of T cards, it is easy to by other non intelligent user of communication terminal Obtain.
In summary, the encryption technology of existing communication terminal secret file is in actual use, it is clear that exist inconvenience with Defect, it is therefore necessary to be improved.
The content of the invention
For above-mentioned defect, fingerprint encryption method and its communication it is an object of the invention to provide a kind of secret file Terminal, to improve the confidentiality of the secret file of communication terminal storage.
To achieve these goals, the present invention provides a kind of fingerprint encryption method of secret file, and methods described is included such as Lower step:
The collection proprietary fingerprint of secret file;
The secret file is encrypted using the fingerprint.
Wrapped according to the fingerprint encryption method of described secret file, the step of the collection secret file proprietary fingerprint Include:
When the secret file owner creates, edits or obtain the secret file, the secret file is gathered Proprietary fingerprint;
In Test database during fingerprint proprietary without the storage secret file, by the secret file owner Fingerprint storage in the database;
The step of use fingerprint is encrypted to the secret file includes:
In fingerprint proprietary without the storage secret file in detecting the database, described in collecting Secret file described in the proprietary encrypting fingerprint of secret file;
In the proprietary fingerprint of the stored secret file in detecting the database, in transferring the database Secret file described in the stored proprietary encrypting fingerprint of secret file.
According to the fingerprint encryption method of described secret file, the secret file is encrypted using the fingerprint The step of after include:
The access fingerprint of the secret file is set;
The secret file is decrypted according to the access fingerprint.
According to the fingerprint encryption method of described secret file, the step of the access fingerprint of the setting secret file Including:
Other people fingerprint stored in the proprietary fingerprint of secret file and/or the database is set to access Fingerprint;
It is described to be included according to described access the step of fingerprint is decrypted to the secret file:
Check the icon of the secret file;
Input fingerprint;
The fingerprint of the input is authenticated with the access fingerprint;
By decrypting the secret file using the access fingerprint after authentication.
According to the fingerprint encryption method of described secret file, the secret file include document files, picture file or Person's video file.
In order to realize another goal of the invention of the invention, present invention also offers a kind of communication terminal, the communication terminal Including:
Acquisition module, for gathering secret file owner and other people fingerprint;
Encrypting module, for being encrypted to the secret file using the proprietary fingerprint of secret file;And
Database, for storing the secret file and the secret file owner and other people fingerprint.
According to described communication terminal, the acquisition module includes:
Collection submodule, for when the secret file owner creates, edits or obtain the secret file, adopting Collect the proprietary fingerprint of secret file;Or for when the access fingerprint of the secret file is set, collection to be visited Ask other people fingerprint of authority;
Whether retrieval submodule, store the proprietary fingerprint of secret file in the database for detecting;
Sub-module stored, for being retrieved during submodule detects the database without the storage secret file described During proprietary fingerprint, by the proprietary fingerprint storage of the secret file in the database;Or, in collection When module collection obtains other people fingerprint of the access rights, other people fingerprint is stored in the database In;
The encrypting module includes:
Submodule is transferred, for retrieving the stored secret file during submodule detects the database described During proprietary fingerprint, the stored fingerprint in the database is transferred;
Encryption submodule, for it is described transfer the fingerprint stored during submodule transfers the database after, Using secret file described in the encrypting fingerprint;Or, for not having in described retrieval during submodule detects the database When storing the proprietary fingerprint of the secret file, the proprietary finger of secret file gathered using the collection submodule Line encrypts the secret file.
According to described communication terminal, the communication terminal also includes:
Priority assignation module, the access fingerprint for setting the secret file;The access fingerprint includes the secret Other people fingerprint stored in the proprietary fingerprint of file and/or the database;
Deciphering module, the access fingerprint for being set using the priority assignation module is carried out to the secret file Decryption.
According to described communication terminal, the priority assignation module includes:
Submodule is searched, for searching other people fingerprint stored in the database;
Submodule, the access fingerprint for setting the secret file are set;
The deciphering module includes:
Submodule is checked, the icon for checking the secret file;
Input submodule, for being input into fingerprint;
Authentication submodule, the visit that the fingerprint for the input submodule to be input into is set with the setting submodule Ask that fingerprint is authenticated;
Decryption submodule, for it is described authentication submodule after to the authentication of the fingerprint, using it is described by mirror The fingerprint of power decrypts the secret file.
According to described communication terminal, the secret file includes document files, picture file or video file;
The collection submodule and the input submodule are arranged on the touch-screen of the communication terminal.
The present invention is by when user is entered edlin or obtained secret file using communication terminal, gathering the finger of the user Line, and secret file is carried out using the fingerprint real-time encrypted;When user checks secret file, then read by communication terminal The fingerprint of the user is decrypted to secret file, realizes to the instant encryption of secret file and checks immediately, and its Simple to operate, confidentiality is superior.After user occurs to lose the events such as communication terminal, it is not necessary to worry by the user of other lacks of competence Check secret file.A step is carried out, user can also be shared with other users by the setting of the access fingerprint of secret file Secret file, while Consumer's Experience is improved, more ensure that the confidentiality of user's secret file.
Brief description of the drawings
Fig. 1 is the structural representation of the communication terminal that one embodiment of the invention is provided;
Fig. 2 is the structural representation of the communication terminal that one embodiment of the invention is provided;
Fig. 3 is the fingerprint encryption method flow chart of the secret file that one embodiment of the invention is provided;
Fig. 4 is the fingerprint encryption method flow chart of the secret file that one embodiment of the invention is provided.
Specific embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, it is right below in conjunction with drawings and Examples The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
Referring to Fig. 1, one embodiment of the invention provides a kind of communication terminal 100, and the communication terminal 100 includes:
Acquisition module 10, for gathering secret file owner and other people fingerprint;
Encrypting module 20, for being encrypted to the secret file using the proprietary fingerprint of secret file;With And
Database 30, for storing the secret file and the secret file owner and other people fingerprint.
In the present invention, communication terminal 100 includes acquisition module 10 and encrypting module 20, is gathered by acquisition module 10 The proprietary fingerprint of secret file, if be encrypted to the secret file using the fingerprint, it is commonly known that the finger of people Line is independent without two, therefore in the present invention, by fingerprint to secret file encryption, then there was only the real institute of the secret file The person of having, or other users for authorizing can just decrypt the secret file, reach good secrecy effect, and such Cipher mode is simple to operate, and user need not be configured the operation such as password, it is only necessary to its fingerprint is carried out using acquisition module 10 Collection, just can realize the instant encryption to these secret files.And secret file includes document files, picture file or regards Frequency file.For example, the important documentum privatum of some of user, including company contract, the secret chat content with relatives;Or Some pictures, including the private photos that user is shot using the camera function of communication terminal 100, can also be certainly Any user file to be maintained secrecy such as video file.Communication terminal 100 can be mobile phone, PDA (Personal Digital Assistant, personal digital assistant), palm PC etc..
Referring to Fig. 2, in one embodiment of the invention, the acquisition module 10 includes:
Collection submodule 11, for the secret file owner create, edit or obtain the secret file when, Gather the proprietary fingerprint of secret file;Or for when the access fingerprint of the secret file is set, collection to be obtained Other people fingerprint of access rights;
Retrieval submodule 12, for whether storing the proprietary fingerprint of secret file in Test database 30;
Sub-module stored 13, for retrieving during submodule 12 detects database 30 without the storage secret file institute During the fingerprint of someone, by the proprietary fingerprint storage of the secret file in database 30;Or, adopted in collection submodule 11 When collection obtains other people fingerprint of the access rights, other people fingerprint is stored in database 30;
Collection submodule 11 is to this when the secret file owner enters edlin or collection to the secret file Owner carries out the collection of fingerprint.For example, when the owner edits document by communication terminal 100, then at it to this article When shelves preserve operation, that is, triggering collection 11 couples of owners of submodule carries out the collection of fingerprint.Or the employment When carrying out shooting photo using communication terminal 100, when it presses shooting button, start collection submodule 11 is carried out to its fingerprint Collection.Collection submodule 11 can also have the collection of other people fingerprint of access rights to the secret file.In collection After the proprietary fingerprint of secret file, retrieval submodule 12 is detected to database 30, according to the fingerprint for collecting, retrieval Whether the fingerprint is had stored in database 30;If not having, then it represents that the proprietary fingerprint is to collect for the first time, is stored Submodule 13 stores in database 30 fingerprint.Also, the secret file is also had access right by sub-module stored 13 Other people fingerprint of limit and being stored in database 30 for the secret file.
Referring to Fig. 2, in one embodiment of the invention, encrypting module 20 includes:
Submodule 21 is transferred, for retrieving the stored secret file institute during submodule 12 detects database 30 During the fingerprint of someone, the stored fingerprint in called data storehouse 30;
Encryption submodule 22, for after the fingerprint stored in transferring the called data storehouse 30 of submodule 21, adopting With secret file described in the encrypting fingerprint;Or, for retrieving during submodule 12 detects database 30 without storage institute When stating the proprietary fingerprint of secret file, the proprietary encrypting fingerprint institute of the secret file gathered using collection submodule 11 State secret file.
The fingerprint that collection submodule 11 is collected is stored in retrieval submodule 12 detects database 30, has then been led to Cross and transfer submodule 21 and transfer the fingerprint, secret file is encrypted by encrypting submodule 22 then.In addition, in storage Beyond the proprietary fingerprint of secret file that the collection first time of submodule 11 of module 13 pairs collects is stored, encryption Module 22 is also encrypted using the fingerprint for collecting for the first time to secret file immediately.
Referring to Fig. 2, in another embodiment of the present invention, communication terminal 100 also includes:
Priority assignation module 40, the access fingerprint for setting the secret file;The access fingerprint includes the private Other people fingerprint stored in the proprietary fingerprint of ciphertext part and/or database 30;
Deciphering module 50, the access fingerprint for being set using priority assignation module 40 is carried out to the secret file Decryption.
After being encrypted to secret file, secret file has obtained good protection.When owning for the secret file When people needs to check, then need to carry out it secret file after encryption to be decrypted.Deciphering module 50 uses the secret The proprietary fingerprint of file is decrypted to the secret file, not only ensure that the only real owner's ability of secret file The secret file is enough viewed, while its is easy to operate.And user need not record such as loaded down with trivial details thing of password, it is to avoid Password loss cannot check the problem of secret file.Even if in addition, user lost communication terminal 100, there is no secret file institute The fingerprint of someone cannot open secret file, be effectively guaranteed the security of secret file.It is excellent at one of the invention Select in embodiment, the owner of the secret file can also set other users and check the secret file, be set using authority Put the module 40 pairs secret file to conduct interviews the setting of fingerprint, the fingerprint of its user can be previously stored in database 30 In, or when needing to set its authority, be acquired by gathering submodule 11, and real-time storage is in database 30.Cause This, deciphering module 50 can also be decrypted using other people fingerprint for obtaining power to the secret file.
Referring to Fig. 2, in one embodiment of the invention, priority assignation module 40 includes:
Submodule 41 is searched, for other people fingerprint stored in searching data storehouse 30;
Submodule 42, the access fingerprint for setting the secret file are set;
Deciphering module 50 includes:
Submodule 51 is checked, the icon for checking the secret file;
Input submodule 52, for being input into fingerprint;
Authentication submodule 53, the access that the fingerprint for input submodule 52 to be input into is set with setting submodule 42 Fingerprint is authenticated;
Decryption submodule 54, for authenticating submodule 53 after to the authentication of the fingerprint, using described by mirror The fingerprint of power decrypts the secret file.
In this embodiment, the access fingerprint of the secret file is set by priority assignation module 40, i.e., using which Fingerprint can check the secret file.The fingerprint that secret file owner encryption is used can certainly check the secret file , can check the secret file it can in addition contain set proprietary other friends of the secret file, relatives etc..It is also then logical Cross and verify proprietary other friends of the secret file, the fingerprint of relatives realizes what is accessed.First, search submodule 41 and search number According to other people fingerprint stored in storehouse 30;Other people fingerprint is the finger with the user for accessing the secret file permission Line, it can be stored in advance in database 30, or when needing to set the access secret file permission, by collection submodule It is stored in database 30 after 11 collections.Searching submodule 41 can check corresponding fingerprint by way of such as name, in number After the access fingerprint with access rights is found in storehouse 30, the access that setting submodule 42 sets the secret file refers to Line.
When checking secret file by accessing fingerprint, communication terminal 100 shows the icon of secret file, but the icon is simultaneously The content of actual secret file is not shown, can be referred to as false icon.Then the secret file is checked by checking submodule 51 Icon, then by input submodule 52 be input into visitor fingerprint, authentication submodule 53 then input submodule 52 is input into The fingerprint with set submodule 42 set access fingerprint authenticated;In authentication submodule 53 by the fingerprint After authentication, decryption submodule 54 decrypts the secret file using the fingerprint by authenticating, and just can check the secret File.Certainly, if being at that time the thumbprint for using secret file owner's right hand, that need collection this moment is the user The right hand thumbprint, decryption submodule 54 can decrypt the secret file.
In a preferred embodiment of the invention, collection submodule 11 and input submodule 52 are arranged at the communication eventually On the touch-screen at end 100.User fingerprints information, i.e. touch-screen can be obtained when touch-screen clicks on camera button and supports fingerprint recognition. Background program is digitized to user fingerprints information, is stored in database 30.During collection fingerprint, by communication terminal 100 Touch-screen photographs button starts acquisition module 10;Or the storage button startup acquisition module 10 for passing through communication terminal 100. When needing to check secret file, user can be by the touch-screen for placing a finger on communication terminal 100, starting input submodule 52, it is input into user fingerprints.For example, user shoots photo by communication terminal 100, then when user presses touch-screen photographs button When, collection submodule 11 gathers the fingerprint of user;If the user is to be shot using the communication terminal 100 for the first time, plus Using fingerprint ground, the photo is encrypted close submodule 22 immediately.
Referring to Fig. 3, one embodiment of the present of invention additionally provides a kind of fingerprint encryption method of secret file, methods described Realize that methods described comprises the following steps using the modules of above-mentioned communication terminal 100:
In step S301, the collection proprietary fingerprint of secret file of acquisition module 10;
In step S302, encrypting module 20 is encrypted using the fingerprint to the secret file.
In the present invention, instant encryption, i.e. the collection secret of acquisition module 10 file are carried out to the secret file of user to own The secret file is encrypted using the fingerprint by encrypting module 20 in time after the fingerprint of people.So cause that user is private Ciphertext part has obtained good protection, and especially the impromptu secret for taking of user is shone or other important working documents.
In one embodiment of the invention, the step S301 steps include:
Collection submodule 11 is gathered when the secret file owner creates, edits or obtain the secret file The proprietary fingerprint of secret file;For example, user is taken pictures or is edited the privates such as document using communication terminal 100 During ciphertext part, the fingerprint of user is acquired by the collection submodule 11.
In fingerprint proprietary without the storage secret file in retrieving the Test database 30 of submodule 12, storage Module 13 is by the proprietary fingerprint storage of the secret file in database 30;The fingerprint of user is entered in collection submodule 11 After row collection, if not storing the fingerprint in the retrieval searching database 30 of submodule 12, by fingerprint storage to database 30 In, preparation etc. is to be used.
The step S302 includes:
In fingerprint proprietary without the storage secret file in retrieving the Test database 30 of submodule 12, encryption Secret file described in the proprietary encrypting fingerprint of secret file that module 22 is collected;
In the proprietary fingerprint of the stored secret file in retrieving the Test database 30 of submodule 12, encryption Module 22 is using transferring the stored proprietary encrypting fingerprint institute of the secret file in the called data storehouse 30 of submodule 21 State secret file.Can be encrypted using the fingerprint of the user stored in database 30 in encryption submodule 22, Or be encrypted using the fingerprint of the user of the instantaneous acquiring.Its is simple to operate, and privacy is good.
Include after step S302:Priority assignation module 40 sets the access fingerprint of the secret file;And decryption The step of module 50 is decrypted according to the access fingerprint to the secret file.Setting wherein in priority assignation module 40 Submodule 42 sets other people fingerprint stored in the proprietary fingerprint of secret file and/or database 30 for access refers to Line;Check that submodule 51 checks the icon of the secret file;Input submodule 52 is input into fingerprint;Authentication submodule 53 will be described The fingerprint of input is authenticated with the access fingerprint;By decrypting submodule 54 after authentication institute is decrypted using the access fingerprint State secret file.
When needing to check secret file, only setting the fingerprint with authority by priority assignation module 40 can visit Ask, therefore, the lookup submodule 41 in priority assignation module 40 can need to set in first searching data storehouse 30 either with or without user Access password, if having can by set submodule 42 set this its there are access rights.Certainly, secret file owner Cryptographic fingerprint can be to view the secret file.And in the secret file after decrypting encryption, check that submodule 51 is looked into The icon of the secret file is seen, the access fingerprint decryption is then input into using input submodule 52 by decrypting submodule 54 The secret file, is checked.The secret file encryption-decryption mode, it is easy to operate simple, it is user-friendly.
The fingerprint encryption method of the secret file provided referring to Fig. 4, one embodiment of the invention, is described in detail below:
In step S401, open communication terminal 100 and taken pictures, obtain user fingerprints information;User passes through communication terminal 100 shoot function is taken pictures, and then when the function is started, collection submodule 11 is opened after camera taken pictures in user, User obtains user fingerprints information when pressing camera button;And store in database 30.
In step S402, the finger print information in the retrieval searching database 30 of submodule 12, if there is the collection The fingerprint that submodule 11 is collected, is then to perform step S403, otherwise performs step S404;
In step S403, encryption submodule 22 directly carries out instant encryption using the fingerprint to photo;
In step S404, the storage user fingerprints information of sub-module stored 13, encryption submodule 22 is encrypted to photo.
In step S405, input submodule 52 gathers the fingerprint when checking picture, and the decryption decryption of submodule 54 can be looked into See true picture.
In this embodiment, communication terminal 100 the photo for taking just now or is regarded according to the user fingerprints information for obtaining Frequency is encrypted, and the file after encryption is stored.When user takes pictures next time, the finger print information in searching database 30, The user that finger print information has been present then directly is encrypted using the finger print information, in the absence of being then stored in new finger print information. When user is clicked on finger checks image file, gather user fingerprints and the user fingerprints information with storage in database 30 is entered Row authentication, if unanimously, being just decrypted and opening image, if inconsistent suggest that user's lack of competence, accomplishes secrecy.Cause This, by the embodiment, the secret that user is impromptu to be taken shine with good security.During taking pictures, in user The moment for pressing camera button obtains the fingerprint of user, then carries out instant encryption to photo using the fingerprint of user.So that user The secret of oneself is happily taken to shine without trouble and worry.In this embodiment, using encrypting fingerprint technology, when taking pictures Instant encryption, is seeing that picture is decryption immediately;To privacy functions is a kind of supplement, makes the instant encryption of communication terminal 100, immediately Decryption, user is easy to use, directly perceived.
In sum, the present invention is by when user is entered edlin or obtained secret file using communication terminal, gathering The fingerprint of the user, and secret file is carried out using the fingerprint real-time encrypted;When user checks secret file, then by logical The fingerprint that letter terminal reads the user is decrypted to secret file, realizes to the instant encryption of secret file and looks into immediately See, and its is simple to operate, and confidentiality is superior.After user occurs to lose the events such as communication terminal, it is not necessary to worry by other nothings The user of authority checks secret file.A step is carried out, user can also be by the setting of the access fingerprint of secret file, with it His users to share secret file, while Consumer's Experience is improved, more ensure that the confidentiality of user's secret file.
Certainly, the present invention can also have other various embodiments, ripe in the case of without departing substantially from spirit of the invention and its essence Know those skilled in the art and work as and various corresponding changes and deformation, but these corresponding changes and change can be made according to the present invention Shape should all belong to the protection domain of appended claims of the invention.

Claims (6)

1. a kind of fingerprint encryption method of secret file, it is characterised in that methods described comprises the following steps:
The collection proprietary fingerprint of secret file;
The secret file is encrypted using the fingerprint;
The step of collection secret file proprietary fingerprint, includes:
When the secret file owner creates, edits or obtain the secret file, gather the secret file and own The fingerprint of people;
In Test database during fingerprint proprietary without the storage secret file, by the proprietary finger of secret file Line is stored in the database;
The step of use fingerprint is encrypted to the secret file includes:
In fingerprint proprietary without the storage secret file in detecting the database, using the secret for collecting Secret file described in the proprietary encrypting fingerprint of file;
In the proprietary fingerprint of the stored secret file in detecting the database, transfer in the database Secret file described in the proprietary encrypting fingerprint of secret file of storage;
Include after the step of being encrypted to the secret file using the fingerprint:
The access fingerprint of the secret file is set;
The secret file is decrypted according to the access fingerprint.
2. the fingerprint encryption method of secret file according to claim 1, it is characterised in that the setting secret text The step of access fingerprint of part, includes:
Other people fingerprint stored in the proprietary fingerprint of secret file and/or the database is set for access refers to Line;
It is described to be included according to described access the step of fingerprint is decrypted to the secret file:
Check the icon of the secret file;
Input fingerprint;
The fingerprint of the input is authenticated with the access fingerprint;
By decrypting the secret file using the access fingerprint after authentication.
3. the fingerprint encryption method of secret file according to claim 2, it is characterised in that the secret file includes text Files, picture file or video file.
4. a kind of communication terminal, it is characterised in that the communication terminal includes:
Acquisition module, for gathering secret file owner and other people fingerprint;
Encrypting module, for being encrypted to the secret file using the proprietary fingerprint of secret file;And
Database, for storing the secret file and the secret file owner and other people fingerprint;
The acquisition module includes:
Collection submodule, for when the secret file owner creates, edits or obtain the secret file, gathering institute State the proprietary fingerprint of secret file;Or for when the access fingerprint of the secret file is set, collection to obtain access right Other people fingerprint of limit;
Whether retrieval submodule, store the proprietary fingerprint of secret file in the database for detecting;
Sub-module stored, for owning without the storage secret file in described retrieval during submodule detects the database During the fingerprint of people, by the proprietary fingerprint storage of the secret file in the database;Or, in the collection submodule When collection obtains other people fingerprint of the access rights, by other people fingerprint storage in the database;
The encrypting module includes:
Transfer submodule, for it is described retrieval submodule detect the database in the stored secret file own During the fingerprint of people, the stored fingerprint in the database is transferred;
Encryption submodule, for it is described transfer the fingerprint stored during submodule transfers the database after, use Secret file described in the encrypting fingerprint;Or, for being retrieved during submodule detects the database without storage described During the proprietary fingerprint of the secret file, the proprietary fingerprint of secret file gathered using the collection submodule is added The close secret file;
The communication terminal also includes:
Priority assignation module, the access fingerprint for setting the secret file;The access fingerprint includes the secret file Other people fingerprint stored in proprietary fingerprint and/or the database;
Deciphering module, the access fingerprint for being set using the priority assignation module is solved to the secret file It is close.
5. communication terminal according to claim 4, it is characterised in that the priority assignation module includes:
Submodule is searched, for searching other people fingerprint stored in the database;
Submodule, the access fingerprint for setting the secret file are set;
The deciphering module includes:
Submodule is checked, the icon for checking the secret file;
Input submodule, for being input into fingerprint;
Authentication submodule, the access that the fingerprint for the input submodule to be input into is set with the setting submodule refers to Line is authenticated;
Decryption submodule, for it is described authentication submodule after to the authentication of the fingerprint, using it is described by authenticate Fingerprint decrypts the secret file.
6. communication terminal according to claim 5, it is characterised in that the secret file includes document files, picture text Part or video file;
The collection submodule and the input submodule are arranged on the touch-screen of the communication terminal.
CN201110446668.5A 2011-12-28 2011-12-28 The fingerprint encryption method and its communication terminal of secret file Expired - Fee Related CN103186761B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110446668.5A CN103186761B (en) 2011-12-28 2011-12-28 The fingerprint encryption method and its communication terminal of secret file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110446668.5A CN103186761B (en) 2011-12-28 2011-12-28 The fingerprint encryption method and its communication terminal of secret file

Publications (2)

Publication Number Publication Date
CN103186761A CN103186761A (en) 2013-07-03
CN103186761B true CN103186761B (en) 2017-06-20

Family

ID=48677924

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110446668.5A Expired - Fee Related CN103186761B (en) 2011-12-28 2011-12-28 The fingerprint encryption method and its communication terminal of secret file

Country Status (1)

Country Link
CN (1) CN103186761B (en)

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104468937A (en) * 2013-09-12 2015-03-25 中兴通讯股份有限公司 Data encryption and decryption methods and devices for mobile terminal and protection system
CN103677638A (en) * 2013-12-06 2014-03-26 北京奇虎科技有限公司 Method and device for processing private documents
CN104778416B (en) * 2015-03-04 2018-03-27 广东欧珀移动通信有限公司 A kind of information concealing method and terminal
CN104866773B (en) * 2015-05-11 2018-04-10 酷派软件技术(深圳)有限公司 A kind of fingerprint search method, apparatus and terminal
CN106295389B (en) * 2015-06-04 2021-02-09 宏达国际电子股份有限公司 Screen content encryption method and electronic device using same
WO2017000123A1 (en) * 2015-06-29 2017-01-05 宇龙计算机通信科技(深圳)有限公司 Information processing method and device
CN105653971A (en) * 2015-07-24 2016-06-08 哈尔滨安天科技股份有限公司 File protection method and apparatus based on interlayer
CN105631284B (en) * 2015-08-20 2018-11-06 宇龙计算机通信科技(深圳)有限公司 A kind of information processing method, device and electronic equipment based on dual system
CN105160264B (en) * 2015-09-29 2019-03-29 努比亚技术有限公司 Photo encryption device and method
CN105528557A (en) * 2015-12-08 2016-04-27 广东欧珀移动通信有限公司 Method and device for encrypting audio file
CN105404983B (en) * 2015-12-25 2019-04-23 浙江中烟工业有限责任公司 A kind of document approvals device with fingerprint identification function
CN106101611A (en) * 2016-05-20 2016-11-09 青岛江盈自控装备制造有限公司 A kind of ambient scene evidence preserves system
CN106127004B (en) * 2016-06-21 2019-04-05 Oppo广东移动通信有限公司 A kind of document handling method and terminal device
CN106295368A (en) * 2016-08-17 2017-01-04 四川长虹通信科技有限公司 The data security protection method of a kind of mobile terminal and system
CN106406726B (en) * 2016-08-26 2019-09-17 Oppo广东移动通信有限公司 Using control method, device and terminal device
CN106648370B (en) * 2016-12-29 2018-09-04 维沃移动通信有限公司 A kind of encryption method and mobile terminal of sectional drawing
CN107229875A (en) * 2017-06-01 2017-10-03 深圳市伊特利网络科技有限公司 Terminal method for secret protection and system
WO2019036972A1 (en) * 2017-08-23 2019-02-28 深圳市优品壹电子有限公司 Data backup method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1674501A (en) * 2005-03-23 2005-09-28 西安青松科技股份有限公司 File enciphered signature system based on fingerprint and realizing method thereof
CN1719373A (en) * 2005-07-27 2006-01-11 深圳市亚略特生物识别科技有限公司 Finger print encryption and decryption method of electron decument
CN102004872A (en) * 2010-10-27 2011-04-06 杨莹 Fingerprint encryption-based identity authentication system and implementation method thereof
CN102185694A (en) * 2010-12-21 2011-09-14 常熟理工学院 Electronic file encrypting method and system based on fingerprint information

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003535559A (en) * 2000-06-02 2003-11-25 キネティック サイエンシーズ インコーポレイテッド Email biometric encryption method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1674501A (en) * 2005-03-23 2005-09-28 西安青松科技股份有限公司 File enciphered signature system based on fingerprint and realizing method thereof
CN1719373A (en) * 2005-07-27 2006-01-11 深圳市亚略特生物识别科技有限公司 Finger print encryption and decryption method of electron decument
CN102004872A (en) * 2010-10-27 2011-04-06 杨莹 Fingerprint encryption-based identity authentication system and implementation method thereof
CN102185694A (en) * 2010-12-21 2011-09-14 常熟理工学院 Electronic file encrypting method and system based on fingerprint information

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于指纹特征的 Windows 操作系统登录与文件加密系统的设计与实现;王树成;《CNKI中国优秀硕士学位论文全文数据库》;20070515;全文 *

Also Published As

Publication number Publication date
CN103186761A (en) 2013-07-03

Similar Documents

Publication Publication Date Title
CN103186761B (en) The fingerprint encryption method and its communication terminal of secret file
CN102460474B (en) Biometric identification method
CN103077339B (en) Data protection method and device
CN104967511B (en) The processing method and processing device of encryption data
CN105260669B (en) The transmission method and Transmission system of photo
AU2020386382B2 (en) Cryptographic key management
US20120032781A1 (en) Remote personal authentication system and method using biometrics
US20040196370A1 (en) Image transmission system, image pickup apparatus, image pickup apparatus unit, key generating apparatus, and program
WO2008010275A1 (en) Medium data processing device and medium data processing method
WO2005104430A1 (en) Personal information management device, distributed key storage device, and personal information management system
CN105528306B (en) A kind of data read-write method and dual system termi-nal of dual system termi-nal
US20150304321A1 (en) An image management system and an image management method based on fingerprint authentication
CN104468937A (en) Data encryption and decryption methods and devices for mobile terminal and protection system
CN101415099A (en) System and method for ciphering image viewfinding device
JP7278345B2 (en) Mobile terminal privacy protection method and protection device, and mobile terminal
CN205354036U (en) Data encryption cloud storage system based on multimode biological identification technique
CN105323355A (en) Android privacy protection system based on palm print recognition
CN105787319A (en) Iris recognition-based portable terminal and method for same
CN107315974A (en) A kind of image-forming media protection device based on Internet of Things
US20080052531A1 (en) Device and Method for Secure Biometric Applications
EP2747333A1 (en) A secure storage system including a virtual safe device and a mobile secure storage device
WO2008017938A2 (en) Device and method for secure biometric applications
Spalević et al. The importance and the role of forensics of mobile
KR101559915B1 (en) A system of managing shared data in the smart phone by using couple finger-prints
CN101373507A (en) Data management method and data management system using the same

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170620

Termination date: 20211228