CN103186761B - The fingerprint encryption method and its communication terminal of secret file - Google Patents
The fingerprint encryption method and its communication terminal of secret file Download PDFInfo
- Publication number
- CN103186761B CN103186761B CN201110446668.5A CN201110446668A CN103186761B CN 103186761 B CN103186761 B CN 103186761B CN 201110446668 A CN201110446668 A CN 201110446668A CN 103186761 B CN103186761 B CN 103186761B
- Authority
- CN
- China
- Prior art keywords
- fingerprint
- secret file
- submodule
- file
- secret
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Storage Device Security (AREA)
- Collating Specific Patterns (AREA)
Abstract
The present invention is applied to communication technical field, there is provided a kind of fingerprint encryption method and its communication terminal of secret file, methods described comprise the following steps:The collection proprietary fingerprint of secret file;The secret file is encrypted using the fingerprint.Whereby, the present invention improves the confidentiality of the secret file of communication terminal storage.
Description
Technical field
The present invention relates to communication technical field, more particularly to a kind of secret file fingerprint encryption method and its communication eventually
End.
Background technology
Becoming increasingly popular for communication terminal, has become means of communication essential during people live.In present intelligence
While communication terminal functions are stronger and stronger, its security risk increasingly increases.Privacy functions of intelligent communications terminal and close
Code lock etc. has become the indispensable function of intelligent communications terminal, and especially sensitive information, private information largely have oneself
Intelligent communications terminal in high-end user, these security functions seem more important.Privacy functions and coded lock etc. are such
Function turns into a fan safety door of intelligent communications terminal.
But, the safe practice such as privacy functions and coded lock of existing intelligent communications terminal, although can be intelligently logical
Loss is reduced to during letter lost terminal it is very low, but when intelligent communications terminal is not lost but under normal usage, if
Password reveal or T cards (T-FLASH cards) stolen etc. under various factors, this privacy functions still show it can not be suddenly
Depending on inferior position.Especially take pictures and video etc. has information in the middle of T cards, it is easy to by other non intelligent user of communication terminal
Obtain.
In summary, the encryption technology of existing communication terminal secret file is in actual use, it is clear that exist inconvenience with
Defect, it is therefore necessary to be improved.
The content of the invention
For above-mentioned defect, fingerprint encryption method and its communication it is an object of the invention to provide a kind of secret file
Terminal, to improve the confidentiality of the secret file of communication terminal storage.
To achieve these goals, the present invention provides a kind of fingerprint encryption method of secret file, and methods described is included such as
Lower step:
The collection proprietary fingerprint of secret file;
The secret file is encrypted using the fingerprint.
Wrapped according to the fingerprint encryption method of described secret file, the step of the collection secret file proprietary fingerprint
Include:
When the secret file owner creates, edits or obtain the secret file, the secret file is gathered
Proprietary fingerprint;
In Test database during fingerprint proprietary without the storage secret file, by the secret file owner
Fingerprint storage in the database;
The step of use fingerprint is encrypted to the secret file includes:
In fingerprint proprietary without the storage secret file in detecting the database, described in collecting
Secret file described in the proprietary encrypting fingerprint of secret file;
In the proprietary fingerprint of the stored secret file in detecting the database, in transferring the database
Secret file described in the stored proprietary encrypting fingerprint of secret file.
According to the fingerprint encryption method of described secret file, the secret file is encrypted using the fingerprint
The step of after include:
The access fingerprint of the secret file is set;
The secret file is decrypted according to the access fingerprint.
According to the fingerprint encryption method of described secret file, the step of the access fingerprint of the setting secret file
Including:
Other people fingerprint stored in the proprietary fingerprint of secret file and/or the database is set to access
Fingerprint;
It is described to be included according to described access the step of fingerprint is decrypted to the secret file:
Check the icon of the secret file;
Input fingerprint;
The fingerprint of the input is authenticated with the access fingerprint;
By decrypting the secret file using the access fingerprint after authentication.
According to the fingerprint encryption method of described secret file, the secret file include document files, picture file or
Person's video file.
In order to realize another goal of the invention of the invention, present invention also offers a kind of communication terminal, the communication terminal
Including:
Acquisition module, for gathering secret file owner and other people fingerprint;
Encrypting module, for being encrypted to the secret file using the proprietary fingerprint of secret file;And
Database, for storing the secret file and the secret file owner and other people fingerprint.
According to described communication terminal, the acquisition module includes:
Collection submodule, for when the secret file owner creates, edits or obtain the secret file, adopting
Collect the proprietary fingerprint of secret file;Or for when the access fingerprint of the secret file is set, collection to be visited
Ask other people fingerprint of authority;
Whether retrieval submodule, store the proprietary fingerprint of secret file in the database for detecting;
Sub-module stored, for being retrieved during submodule detects the database without the storage secret file described
During proprietary fingerprint, by the proprietary fingerprint storage of the secret file in the database;Or, in collection
When module collection obtains other people fingerprint of the access rights, other people fingerprint is stored in the database
In;
The encrypting module includes:
Submodule is transferred, for retrieving the stored secret file during submodule detects the database described
During proprietary fingerprint, the stored fingerprint in the database is transferred;
Encryption submodule, for it is described transfer the fingerprint stored during submodule transfers the database after,
Using secret file described in the encrypting fingerprint;Or, for not having in described retrieval during submodule detects the database
When storing the proprietary fingerprint of the secret file, the proprietary finger of secret file gathered using the collection submodule
Line encrypts the secret file.
According to described communication terminal, the communication terminal also includes:
Priority assignation module, the access fingerprint for setting the secret file;The access fingerprint includes the secret
Other people fingerprint stored in the proprietary fingerprint of file and/or the database;
Deciphering module, the access fingerprint for being set using the priority assignation module is carried out to the secret file
Decryption.
According to described communication terminal, the priority assignation module includes:
Submodule is searched, for searching other people fingerprint stored in the database;
Submodule, the access fingerprint for setting the secret file are set;
The deciphering module includes:
Submodule is checked, the icon for checking the secret file;
Input submodule, for being input into fingerprint;
Authentication submodule, the visit that the fingerprint for the input submodule to be input into is set with the setting submodule
Ask that fingerprint is authenticated;
Decryption submodule, for it is described authentication submodule after to the authentication of the fingerprint, using it is described by mirror
The fingerprint of power decrypts the secret file.
According to described communication terminal, the secret file includes document files, picture file or video file;
The collection submodule and the input submodule are arranged on the touch-screen of the communication terminal.
The present invention is by when user is entered edlin or obtained secret file using communication terminal, gathering the finger of the user
Line, and secret file is carried out using the fingerprint real-time encrypted;When user checks secret file, then read by communication terminal
The fingerprint of the user is decrypted to secret file, realizes to the instant encryption of secret file and checks immediately, and its
Simple to operate, confidentiality is superior.After user occurs to lose the events such as communication terminal, it is not necessary to worry by the user of other lacks of competence
Check secret file.A step is carried out, user can also be shared with other users by the setting of the access fingerprint of secret file
Secret file, while Consumer's Experience is improved, more ensure that the confidentiality of user's secret file.
Brief description of the drawings
Fig. 1 is the structural representation of the communication terminal that one embodiment of the invention is provided;
Fig. 2 is the structural representation of the communication terminal that one embodiment of the invention is provided;
Fig. 3 is the fingerprint encryption method flow chart of the secret file that one embodiment of the invention is provided;
Fig. 4 is the fingerprint encryption method flow chart of the secret file that one embodiment of the invention is provided.
Specific embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, it is right below in conjunction with drawings and Examples
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.
Referring to Fig. 1, one embodiment of the invention provides a kind of communication terminal 100, and the communication terminal 100 includes:
Acquisition module 10, for gathering secret file owner and other people fingerprint;
Encrypting module 20, for being encrypted to the secret file using the proprietary fingerprint of secret file;With
And
Database 30, for storing the secret file and the secret file owner and other people fingerprint.
In the present invention, communication terminal 100 includes acquisition module 10 and encrypting module 20, is gathered by acquisition module 10
The proprietary fingerprint of secret file, if be encrypted to the secret file using the fingerprint, it is commonly known that the finger of people
Line is independent without two, therefore in the present invention, by fingerprint to secret file encryption, then there was only the real institute of the secret file
The person of having, or other users for authorizing can just decrypt the secret file, reach good secrecy effect, and such
Cipher mode is simple to operate, and user need not be configured the operation such as password, it is only necessary to its fingerprint is carried out using acquisition module 10
Collection, just can realize the instant encryption to these secret files.And secret file includes document files, picture file or regards
Frequency file.For example, the important documentum privatum of some of user, including company contract, the secret chat content with relatives;Or
Some pictures, including the private photos that user is shot using the camera function of communication terminal 100, can also be certainly
Any user file to be maintained secrecy such as video file.Communication terminal 100 can be mobile phone, PDA (Personal Digital
Assistant, personal digital assistant), palm PC etc..
Referring to Fig. 2, in one embodiment of the invention, the acquisition module 10 includes:
Collection submodule 11, for the secret file owner create, edit or obtain the secret file when,
Gather the proprietary fingerprint of secret file;Or for when the access fingerprint of the secret file is set, collection to be obtained
Other people fingerprint of access rights;
Retrieval submodule 12, for whether storing the proprietary fingerprint of secret file in Test database 30;
Sub-module stored 13, for retrieving during submodule 12 detects database 30 without the storage secret file institute
During the fingerprint of someone, by the proprietary fingerprint storage of the secret file in database 30;Or, adopted in collection submodule 11
When collection obtains other people fingerprint of the access rights, other people fingerprint is stored in database 30;
Collection submodule 11 is to this when the secret file owner enters edlin or collection to the secret file
Owner carries out the collection of fingerprint.For example, when the owner edits document by communication terminal 100, then at it to this article
When shelves preserve operation, that is, triggering collection 11 couples of owners of submodule carries out the collection of fingerprint.Or the employment
When carrying out shooting photo using communication terminal 100, when it presses shooting button, start collection submodule 11 is carried out to its fingerprint
Collection.Collection submodule 11 can also have the collection of other people fingerprint of access rights to the secret file.In collection
After the proprietary fingerprint of secret file, retrieval submodule 12 is detected to database 30, according to the fingerprint for collecting, retrieval
Whether the fingerprint is had stored in database 30;If not having, then it represents that the proprietary fingerprint is to collect for the first time, is stored
Submodule 13 stores in database 30 fingerprint.Also, the secret file is also had access right by sub-module stored 13
Other people fingerprint of limit and being stored in database 30 for the secret file.
Referring to Fig. 2, in one embodiment of the invention, encrypting module 20 includes:
Submodule 21 is transferred, for retrieving the stored secret file institute during submodule 12 detects database 30
During the fingerprint of someone, the stored fingerprint in called data storehouse 30;
Encryption submodule 22, for after the fingerprint stored in transferring the called data storehouse 30 of submodule 21, adopting
With secret file described in the encrypting fingerprint;Or, for retrieving during submodule 12 detects database 30 without storage institute
When stating the proprietary fingerprint of secret file, the proprietary encrypting fingerprint institute of the secret file gathered using collection submodule 11
State secret file.
The fingerprint that collection submodule 11 is collected is stored in retrieval submodule 12 detects database 30, has then been led to
Cross and transfer submodule 21 and transfer the fingerprint, secret file is encrypted by encrypting submodule 22 then.In addition, in storage
Beyond the proprietary fingerprint of secret file that the collection first time of submodule 11 of module 13 pairs collects is stored, encryption
Module 22 is also encrypted using the fingerprint for collecting for the first time to secret file immediately.
Referring to Fig. 2, in another embodiment of the present invention, communication terminal 100 also includes:
Priority assignation module 40, the access fingerprint for setting the secret file;The access fingerprint includes the private
Other people fingerprint stored in the proprietary fingerprint of ciphertext part and/or database 30;
Deciphering module 50, the access fingerprint for being set using priority assignation module 40 is carried out to the secret file
Decryption.
After being encrypted to secret file, secret file has obtained good protection.When owning for the secret file
When people needs to check, then need to carry out it secret file after encryption to be decrypted.Deciphering module 50 uses the secret
The proprietary fingerprint of file is decrypted to the secret file, not only ensure that the only real owner's ability of secret file
The secret file is enough viewed, while its is easy to operate.And user need not record such as loaded down with trivial details thing of password, it is to avoid
Password loss cannot check the problem of secret file.Even if in addition, user lost communication terminal 100, there is no secret file institute
The fingerprint of someone cannot open secret file, be effectively guaranteed the security of secret file.It is excellent at one of the invention
Select in embodiment, the owner of the secret file can also set other users and check the secret file, be set using authority
Put the module 40 pairs secret file to conduct interviews the setting of fingerprint, the fingerprint of its user can be previously stored in database 30
In, or when needing to set its authority, be acquired by gathering submodule 11, and real-time storage is in database 30.Cause
This, deciphering module 50 can also be decrypted using other people fingerprint for obtaining power to the secret file.
Referring to Fig. 2, in one embodiment of the invention, priority assignation module 40 includes:
Submodule 41 is searched, for other people fingerprint stored in searching data storehouse 30;
Submodule 42, the access fingerprint for setting the secret file are set;
Deciphering module 50 includes:
Submodule 51 is checked, the icon for checking the secret file;
Input submodule 52, for being input into fingerprint;
Authentication submodule 53, the access that the fingerprint for input submodule 52 to be input into is set with setting submodule 42
Fingerprint is authenticated;
Decryption submodule 54, for authenticating submodule 53 after to the authentication of the fingerprint, using described by mirror
The fingerprint of power decrypts the secret file.
In this embodiment, the access fingerprint of the secret file is set by priority assignation module 40, i.e., using which
Fingerprint can check the secret file.The fingerprint that secret file owner encryption is used can certainly check the secret file
, can check the secret file it can in addition contain set proprietary other friends of the secret file, relatives etc..It is also then logical
Cross and verify proprietary other friends of the secret file, the fingerprint of relatives realizes what is accessed.First, search submodule 41 and search number
According to other people fingerprint stored in storehouse 30;Other people fingerprint is the finger with the user for accessing the secret file permission
Line, it can be stored in advance in database 30, or when needing to set the access secret file permission, by collection submodule
It is stored in database 30 after 11 collections.Searching submodule 41 can check corresponding fingerprint by way of such as name, in number
After the access fingerprint with access rights is found in storehouse 30, the access that setting submodule 42 sets the secret file refers to
Line.
When checking secret file by accessing fingerprint, communication terminal 100 shows the icon of secret file, but the icon is simultaneously
The content of actual secret file is not shown, can be referred to as false icon.Then the secret file is checked by checking submodule 51
Icon, then by input submodule 52 be input into visitor fingerprint, authentication submodule 53 then input submodule 52 is input into
The fingerprint with set submodule 42 set access fingerprint authenticated;In authentication submodule 53 by the fingerprint
After authentication, decryption submodule 54 decrypts the secret file using the fingerprint by authenticating, and just can check the secret
File.Certainly, if being at that time the thumbprint for using secret file owner's right hand, that need collection this moment is the user
The right hand thumbprint, decryption submodule 54 can decrypt the secret file.
In a preferred embodiment of the invention, collection submodule 11 and input submodule 52 are arranged at the communication eventually
On the touch-screen at end 100.User fingerprints information, i.e. touch-screen can be obtained when touch-screen clicks on camera button and supports fingerprint recognition.
Background program is digitized to user fingerprints information, is stored in database 30.During collection fingerprint, by communication terminal 100
Touch-screen photographs button starts acquisition module 10;Or the storage button startup acquisition module 10 for passing through communication terminal 100.
When needing to check secret file, user can be by the touch-screen for placing a finger on communication terminal 100, starting input submodule
52, it is input into user fingerprints.For example, user shoots photo by communication terminal 100, then when user presses touch-screen photographs button
When, collection submodule 11 gathers the fingerprint of user;If the user is to be shot using the communication terminal 100 for the first time, plus
Using fingerprint ground, the photo is encrypted close submodule 22 immediately.
Referring to Fig. 3, one embodiment of the present of invention additionally provides a kind of fingerprint encryption method of secret file, methods described
Realize that methods described comprises the following steps using the modules of above-mentioned communication terminal 100:
In step S301, the collection proprietary fingerprint of secret file of acquisition module 10;
In step S302, encrypting module 20 is encrypted using the fingerprint to the secret file.
In the present invention, instant encryption, i.e. the collection secret of acquisition module 10 file are carried out to the secret file of user to own
The secret file is encrypted using the fingerprint by encrypting module 20 in time after the fingerprint of people.So cause that user is private
Ciphertext part has obtained good protection, and especially the impromptu secret for taking of user is shone or other important working documents.
In one embodiment of the invention, the step S301 steps include:
Collection submodule 11 is gathered when the secret file owner creates, edits or obtain the secret file
The proprietary fingerprint of secret file;For example, user is taken pictures or is edited the privates such as document using communication terminal 100
During ciphertext part, the fingerprint of user is acquired by the collection submodule 11.
In fingerprint proprietary without the storage secret file in retrieving the Test database 30 of submodule 12, storage
Module 13 is by the proprietary fingerprint storage of the secret file in database 30;The fingerprint of user is entered in collection submodule 11
After row collection, if not storing the fingerprint in the retrieval searching database 30 of submodule 12, by fingerprint storage to database 30
In, preparation etc. is to be used.
The step S302 includes:
In fingerprint proprietary without the storage secret file in retrieving the Test database 30 of submodule 12, encryption
Secret file described in the proprietary encrypting fingerprint of secret file that module 22 is collected;
In the proprietary fingerprint of the stored secret file in retrieving the Test database 30 of submodule 12, encryption
Module 22 is using transferring the stored proprietary encrypting fingerprint institute of the secret file in the called data storehouse 30 of submodule 21
State secret file.Can be encrypted using the fingerprint of the user stored in database 30 in encryption submodule 22,
Or be encrypted using the fingerprint of the user of the instantaneous acquiring.Its is simple to operate, and privacy is good.
Include after step S302:Priority assignation module 40 sets the access fingerprint of the secret file;And decryption
The step of module 50 is decrypted according to the access fingerprint to the secret file.Setting wherein in priority assignation module 40
Submodule 42 sets other people fingerprint stored in the proprietary fingerprint of secret file and/or database 30 for access refers to
Line;Check that submodule 51 checks the icon of the secret file;Input submodule 52 is input into fingerprint;Authentication submodule 53 will be described
The fingerprint of input is authenticated with the access fingerprint;By decrypting submodule 54 after authentication institute is decrypted using the access fingerprint
State secret file.
When needing to check secret file, only setting the fingerprint with authority by priority assignation module 40 can visit
Ask, therefore, the lookup submodule 41 in priority assignation module 40 can need to set in first searching data storehouse 30 either with or without user
Access password, if having can by set submodule 42 set this its there are access rights.Certainly, secret file owner
Cryptographic fingerprint can be to view the secret file.And in the secret file after decrypting encryption, check that submodule 51 is looked into
The icon of the secret file is seen, the access fingerprint decryption is then input into using input submodule 52 by decrypting submodule 54
The secret file, is checked.The secret file encryption-decryption mode, it is easy to operate simple, it is user-friendly.
The fingerprint encryption method of the secret file provided referring to Fig. 4, one embodiment of the invention, is described in detail below:
In step S401, open communication terminal 100 and taken pictures, obtain user fingerprints information;User passes through communication terminal
100 shoot function is taken pictures, and then when the function is started, collection submodule 11 is opened after camera taken pictures in user,
User obtains user fingerprints information when pressing camera button;And store in database 30.
In step S402, the finger print information in the retrieval searching database 30 of submodule 12, if there is the collection
The fingerprint that submodule 11 is collected, is then to perform step S403, otherwise performs step S404;
In step S403, encryption submodule 22 directly carries out instant encryption using the fingerprint to photo;
In step S404, the storage user fingerprints information of sub-module stored 13, encryption submodule 22 is encrypted to photo.
In step S405, input submodule 52 gathers the fingerprint when checking picture, and the decryption decryption of submodule 54 can be looked into
See true picture.
In this embodiment, communication terminal 100 the photo for taking just now or is regarded according to the user fingerprints information for obtaining
Frequency is encrypted, and the file after encryption is stored.When user takes pictures next time, the finger print information in searching database 30,
The user that finger print information has been present then directly is encrypted using the finger print information, in the absence of being then stored in new finger print information.
When user is clicked on finger checks image file, gather user fingerprints and the user fingerprints information with storage in database 30 is entered
Row authentication, if unanimously, being just decrypted and opening image, if inconsistent suggest that user's lack of competence, accomplishes secrecy.Cause
This, by the embodiment, the secret that user is impromptu to be taken shine with good security.During taking pictures, in user
The moment for pressing camera button obtains the fingerprint of user, then carries out instant encryption to photo using the fingerprint of user.So that user
The secret of oneself is happily taken to shine without trouble and worry.In this embodiment, using encrypting fingerprint technology, when taking pictures
Instant encryption, is seeing that picture is decryption immediately;To privacy functions is a kind of supplement, makes the instant encryption of communication terminal 100, immediately
Decryption, user is easy to use, directly perceived.
In sum, the present invention is by when user is entered edlin or obtained secret file using communication terminal, gathering
The fingerprint of the user, and secret file is carried out using the fingerprint real-time encrypted;When user checks secret file, then by logical
The fingerprint that letter terminal reads the user is decrypted to secret file, realizes to the instant encryption of secret file and looks into immediately
See, and its is simple to operate, and confidentiality is superior.After user occurs to lose the events such as communication terminal, it is not necessary to worry by other nothings
The user of authority checks secret file.A step is carried out, user can also be by the setting of the access fingerprint of secret file, with it
His users to share secret file, while Consumer's Experience is improved, more ensure that the confidentiality of user's secret file.
Certainly, the present invention can also have other various embodiments, ripe in the case of without departing substantially from spirit of the invention and its essence
Know those skilled in the art and work as and various corresponding changes and deformation, but these corresponding changes and change can be made according to the present invention
Shape should all belong to the protection domain of appended claims of the invention.
Claims (6)
1. a kind of fingerprint encryption method of secret file, it is characterised in that methods described comprises the following steps:
The collection proprietary fingerprint of secret file;
The secret file is encrypted using the fingerprint;
The step of collection secret file proprietary fingerprint, includes:
When the secret file owner creates, edits or obtain the secret file, gather the secret file and own
The fingerprint of people;
In Test database during fingerprint proprietary without the storage secret file, by the proprietary finger of secret file
Line is stored in the database;
The step of use fingerprint is encrypted to the secret file includes:
In fingerprint proprietary without the storage secret file in detecting the database, using the secret for collecting
Secret file described in the proprietary encrypting fingerprint of file;
In the proprietary fingerprint of the stored secret file in detecting the database, transfer in the database
Secret file described in the proprietary encrypting fingerprint of secret file of storage;
Include after the step of being encrypted to the secret file using the fingerprint:
The access fingerprint of the secret file is set;
The secret file is decrypted according to the access fingerprint.
2. the fingerprint encryption method of secret file according to claim 1, it is characterised in that the setting secret text
The step of access fingerprint of part, includes:
Other people fingerprint stored in the proprietary fingerprint of secret file and/or the database is set for access refers to
Line;
It is described to be included according to described access the step of fingerprint is decrypted to the secret file:
Check the icon of the secret file;
Input fingerprint;
The fingerprint of the input is authenticated with the access fingerprint;
By decrypting the secret file using the access fingerprint after authentication.
3. the fingerprint encryption method of secret file according to claim 2, it is characterised in that the secret file includes text
Files, picture file or video file.
4. a kind of communication terminal, it is characterised in that the communication terminal includes:
Acquisition module, for gathering secret file owner and other people fingerprint;
Encrypting module, for being encrypted to the secret file using the proprietary fingerprint of secret file;And
Database, for storing the secret file and the secret file owner and other people fingerprint;
The acquisition module includes:
Collection submodule, for when the secret file owner creates, edits or obtain the secret file, gathering institute
State the proprietary fingerprint of secret file;Or for when the access fingerprint of the secret file is set, collection to obtain access right
Other people fingerprint of limit;
Whether retrieval submodule, store the proprietary fingerprint of secret file in the database for detecting;
Sub-module stored, for owning without the storage secret file in described retrieval during submodule detects the database
During the fingerprint of people, by the proprietary fingerprint storage of the secret file in the database;Or, in the collection submodule
When collection obtains other people fingerprint of the access rights, by other people fingerprint storage in the database;
The encrypting module includes:
Transfer submodule, for it is described retrieval submodule detect the database in the stored secret file own
During the fingerprint of people, the stored fingerprint in the database is transferred;
Encryption submodule, for it is described transfer the fingerprint stored during submodule transfers the database after, use
Secret file described in the encrypting fingerprint;Or, for being retrieved during submodule detects the database without storage described
During the proprietary fingerprint of the secret file, the proprietary fingerprint of secret file gathered using the collection submodule is added
The close secret file;
The communication terminal also includes:
Priority assignation module, the access fingerprint for setting the secret file;The access fingerprint includes the secret file
Other people fingerprint stored in proprietary fingerprint and/or the database;
Deciphering module, the access fingerprint for being set using the priority assignation module is solved to the secret file
It is close.
5. communication terminal according to claim 4, it is characterised in that the priority assignation module includes:
Submodule is searched, for searching other people fingerprint stored in the database;
Submodule, the access fingerprint for setting the secret file are set;
The deciphering module includes:
Submodule is checked, the icon for checking the secret file;
Input submodule, for being input into fingerprint;
Authentication submodule, the access that the fingerprint for the input submodule to be input into is set with the setting submodule refers to
Line is authenticated;
Decryption submodule, for it is described authentication submodule after to the authentication of the fingerprint, using it is described by authenticate
Fingerprint decrypts the secret file.
6. communication terminal according to claim 5, it is characterised in that the secret file includes document files, picture text
Part or video file;
The collection submodule and the input submodule are arranged on the touch-screen of the communication terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110446668.5A CN103186761B (en) | 2011-12-28 | 2011-12-28 | The fingerprint encryption method and its communication terminal of secret file |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110446668.5A CN103186761B (en) | 2011-12-28 | 2011-12-28 | The fingerprint encryption method and its communication terminal of secret file |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103186761A CN103186761A (en) | 2013-07-03 |
CN103186761B true CN103186761B (en) | 2017-06-20 |
Family
ID=48677924
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110446668.5A Expired - Fee Related CN103186761B (en) | 2011-12-28 | 2011-12-28 | The fingerprint encryption method and its communication terminal of secret file |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103186761B (en) |
Families Citing this family (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104468937A (en) * | 2013-09-12 | 2015-03-25 | 中兴通讯股份有限公司 | Data encryption and decryption methods and devices for mobile terminal and protection system |
CN103677638A (en) * | 2013-12-06 | 2014-03-26 | 北京奇虎科技有限公司 | Method and device for processing private documents |
CN104778416B (en) * | 2015-03-04 | 2018-03-27 | 广东欧珀移动通信有限公司 | A kind of information concealing method and terminal |
CN104866773B (en) * | 2015-05-11 | 2018-04-10 | 酷派软件技术(深圳)有限公司 | A kind of fingerprint search method, apparatus and terminal |
CN106295389B (en) * | 2015-06-04 | 2021-02-09 | 宏达国际电子股份有限公司 | Screen content encryption method and electronic device using same |
WO2017000123A1 (en) * | 2015-06-29 | 2017-01-05 | 宇龙计算机通信科技(深圳)有限公司 | Information processing method and device |
CN105653971A (en) * | 2015-07-24 | 2016-06-08 | 哈尔滨安天科技股份有限公司 | File protection method and apparatus based on interlayer |
CN105631284B (en) * | 2015-08-20 | 2018-11-06 | 宇龙计算机通信科技(深圳)有限公司 | A kind of information processing method, device and electronic equipment based on dual system |
CN105160264B (en) * | 2015-09-29 | 2019-03-29 | 努比亚技术有限公司 | Photo encryption device and method |
CN105528557A (en) * | 2015-12-08 | 2016-04-27 | 广东欧珀移动通信有限公司 | Method and device for encrypting audio file |
CN105404983B (en) * | 2015-12-25 | 2019-04-23 | 浙江中烟工业有限责任公司 | A kind of document approvals device with fingerprint identification function |
CN106101611A (en) * | 2016-05-20 | 2016-11-09 | 青岛江盈自控装备制造有限公司 | A kind of ambient scene evidence preserves system |
CN106127004B (en) * | 2016-06-21 | 2019-04-05 | Oppo广东移动通信有限公司 | A kind of document handling method and terminal device |
CN106295368A (en) * | 2016-08-17 | 2017-01-04 | 四川长虹通信科技有限公司 | The data security protection method of a kind of mobile terminal and system |
CN106406726B (en) * | 2016-08-26 | 2019-09-17 | Oppo广东移动通信有限公司 | Using control method, device and terminal device |
CN106648370B (en) * | 2016-12-29 | 2018-09-04 | 维沃移动通信有限公司 | A kind of encryption method and mobile terminal of sectional drawing |
CN107229875A (en) * | 2017-06-01 | 2017-10-03 | 深圳市伊特利网络科技有限公司 | Terminal method for secret protection and system |
WO2019036972A1 (en) * | 2017-08-23 | 2019-02-28 | 深圳市优品壹电子有限公司 | Data backup method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1674501A (en) * | 2005-03-23 | 2005-09-28 | 西安青松科技股份有限公司 | File enciphered signature system based on fingerprint and realizing method thereof |
CN1719373A (en) * | 2005-07-27 | 2006-01-11 | 深圳市亚略特生物识别科技有限公司 | Finger print encryption and decryption method of electron decument |
CN102004872A (en) * | 2010-10-27 | 2011-04-06 | 杨莹 | Fingerprint encryption-based identity authentication system and implementation method thereof |
CN102185694A (en) * | 2010-12-21 | 2011-09-14 | 常熟理工学院 | Electronic file encrypting method and system based on fingerprint information |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003535559A (en) * | 2000-06-02 | 2003-11-25 | キネティック サイエンシーズ インコーポレイテッド | Email biometric encryption method |
-
2011
- 2011-12-28 CN CN201110446668.5A patent/CN103186761B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1674501A (en) * | 2005-03-23 | 2005-09-28 | 西安青松科技股份有限公司 | File enciphered signature system based on fingerprint and realizing method thereof |
CN1719373A (en) * | 2005-07-27 | 2006-01-11 | 深圳市亚略特生物识别科技有限公司 | Finger print encryption and decryption method of electron decument |
CN102004872A (en) * | 2010-10-27 | 2011-04-06 | 杨莹 | Fingerprint encryption-based identity authentication system and implementation method thereof |
CN102185694A (en) * | 2010-12-21 | 2011-09-14 | 常熟理工学院 | Electronic file encrypting method and system based on fingerprint information |
Non-Patent Citations (1)
Title |
---|
基于指纹特征的 Windows 操作系统登录与文件加密系统的设计与实现;王树成;《CNKI中国优秀硕士学位论文全文数据库》;20070515;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN103186761A (en) | 2013-07-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103186761B (en) | The fingerprint encryption method and its communication terminal of secret file | |
CN102460474B (en) | Biometric identification method | |
CN103077339B (en) | Data protection method and device | |
CN104967511B (en) | The processing method and processing device of encryption data | |
CN105260669B (en) | The transmission method and Transmission system of photo | |
AU2020386382B2 (en) | Cryptographic key management | |
US20120032781A1 (en) | Remote personal authentication system and method using biometrics | |
US20040196370A1 (en) | Image transmission system, image pickup apparatus, image pickup apparatus unit, key generating apparatus, and program | |
WO2008010275A1 (en) | Medium data processing device and medium data processing method | |
WO2005104430A1 (en) | Personal information management device, distributed key storage device, and personal information management system | |
CN105528306B (en) | A kind of data read-write method and dual system termi-nal of dual system termi-nal | |
US20150304321A1 (en) | An image management system and an image management method based on fingerprint authentication | |
CN104468937A (en) | Data encryption and decryption methods and devices for mobile terminal and protection system | |
CN101415099A (en) | System and method for ciphering image viewfinding device | |
JP7278345B2 (en) | Mobile terminal privacy protection method and protection device, and mobile terminal | |
CN205354036U (en) | Data encryption cloud storage system based on multimode biological identification technique | |
CN105323355A (en) | Android privacy protection system based on palm print recognition | |
CN105787319A (en) | Iris recognition-based portable terminal and method for same | |
CN107315974A (en) | A kind of image-forming media protection device based on Internet of Things | |
US20080052531A1 (en) | Device and Method for Secure Biometric Applications | |
EP2747333A1 (en) | A secure storage system including a virtual safe device and a mobile secure storage device | |
WO2008017938A2 (en) | Device and method for secure biometric applications | |
Spalević et al. | The importance and the role of forensics of mobile | |
KR101559915B1 (en) | A system of managing shared data in the smart phone by using couple finger-prints | |
CN101373507A (en) | Data management method and data management system using the same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20170620 Termination date: 20211228 |