CN103824030A - Data protection device and data protection method - Google Patents
Data protection device and data protection method Download PDFInfo
- Publication number
- CN103824030A CN103824030A CN201410069463.3A CN201410069463A CN103824030A CN 103824030 A CN103824030 A CN 103824030A CN 201410069463 A CN201410069463 A CN 201410069463A CN 103824030 A CN103824030 A CN 103824030A
- Authority
- CN
- China
- Prior art keywords
- image
- face
- file
- characteristic image
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Processing Or Creating Images (AREA)
Abstract
The invention provides a data protection device and a data protection method. The data protection device comprises a setting unit and a processing unit. The setting unit adds any feather image in a terminal to a secret file according to a received setting command, wherein the feature images include facial images. The processing unit searches the terminal for a target file related to the feature image and adds the target file to the secret file. The processing unit comprises a comparison unit used for obtaining all the facial images stored in the terminal, and comparing the feather image with each facial image in all the facial images according to the comparison result. The first extraction unit confirms the facial similarity of each facial image and the feature image according to the comparison result, extracts the facial images with the facial similarity larger than preset facial similarity, and adds the facial images to the secret file. By means of the technical scheme, automatic encryption of files can be achieved, and the encryption operation is simplified.
Description
Technical field
The present invention relates to communication technical field, in particular to a kind of data protecting device and a kind of data guard method.
Background technology
Along with scientific-technical progress, mobile Internet becomes inevitable trend, terminal (mobile phone, panel computer) is as a kind of communication tool, can also navigate, do shopping, take a picture, consult reference materials, see a film etc., a lot of users' personal information is all kept in terminal, so the information security of terminal seems more and more important, wherein relating to is exactly the privacy of picture the most widely, for this reason, the program software that a lot of companies have all developed a lot of encryptions is for manually hiding or encrypt file of user.
All to need user oneself to go for to want the file encrypted, the operation of then file being hidden or being encrypted with regard to the method for current encryption picture.But because mobile phone in use all may be taken pictures at any time or copy picture; user can not be real-time after generating pictures, be encrypted at once; so often can forget encryption because of carelessness; and in information security in terminal; not only comprise image information; in the application such as short message/mail, also can have potential safety hazard, so want to protect user's information security, it is far from being enough only encrypting picture.
Therefore, need a kind of new solution, be automatically encrypted with the image information in terminal and application message.
Summary of the invention
The present invention, just based on the problems referred to above, has proposed a kind of Data Protection Technologies, can realize the image information in terminal and application message are encrypted automatically.
In view of this, the present invention proposes a kind of data protecting device, for terminal, comprising: setting unit, according to the order that arranges receiving, the arbitrary characteristic image in described terminal is added in secret file, wherein, described characteristic image comprises face-image; Processing unit finds out the file destination being associated with described arbitrary characteristic image in described terminal, and described file destination is added in described secret file; Wherein, described processing unit comprises: comparing unit, obtain all face-images of storing in described terminal, and every face-image in described arbitrary characteristic image and described all face-images is compared; The first extraction unit, determine the facial similarity of described every face-image and described arbitrary characteristic image according to the comparative result of described comparing unit, and extracting the face-image that facial similarity is greater than default facial similarity, the face-image that described facial similarity is greater than to default facial similarity adds in described secret file.
By technique scheme, only need add arbitrary characteristic image to secret file, the file destination being associated with characteristic image in terminal All Files all will be added to secret file, realize the automatic encryption of file.With the file that needs user to find in existing encryption technology to want to encrypt, then file is hidden or the operation of encrypting is compared, simplify operation, the while can have been avoided in existing encryption technology because locating file is not omitted the privacy leakage that file causes comprehensively.
Wherein, All Files corresponding to terminal both comprised the file of having stored in terminal, comprise again the file that terminal newly receives, wherein, the file of having stored in terminal comprises the photo stored in terminal, note, message registration etc., and the file that terminal newly receives comprises the photo of new take, the note of newly receiving, the phone newly receiving etc.
Because characteristic image comprises face-image, therefore while searching the file destination being associated with characteristic image in terminal, need to search the file destination being associated with the face-image of characteristic image, then the file destination finding is encrypted, guarantee that the file destination being associated with characteristic image is all encrypted, avoid omitting file and cause privacy to reveal.Particularly, in the time that terminal is searched the face-image file being associated with face-image in characteristic image, the face-image that terminal is greater than default facial similarity with characteristic image face-image similarity in can the face-image of all storages is set to secret file, search and cryptographic operation without user, realize automatically and encrypting, simplified operation.
Specifically, default facial similarity can free setting.For example: default facial similarity is 90%, while being greater than 90% with characteristic image face similarity in the face-image of terminal storage, directly this face-image is set to secret file; In the face-image of terminal storage, be greater than 60% and while being less than 90% with characteristic image face similarity, whether this face-image is set to secret file to user that can inquiry terminal; Be less than 60% with characteristic image face similarity in the face-image of terminal storage time, this face-image will not be set to secret file.
In technique scheme, preferably, described comparing unit also for: in the time that described terminal receives new face-image, described arbitrary characteristic image and described new face-image are compared; And described the first extraction unit also for: in the time that the facial similarity of described new face-image and described arbitrary characteristic image is greater than default facial similarity, described new face-image is added in described secret file.
Pass through technique scheme; the face-image that is greater than default facial similarity with characteristic image face similarity in the face-image can terminal receiving is in real time set to secret file; due to terminal in use; may receive at any time face-image; receive that face-image compares with the face-image of characteristic image and automatically encrypt; avoid omitting because of carelessness, better protected user's privacy.Wherein, terminal receives face-image and includes but not limited to: take pictures, copy picture.
In technique scheme, preferably, described processing unit also comprises: recognition unit, contrasts the head portrait of contact person of described arbitrary characteristic image and pre-stored, to identify contact person corresponding to described arbitrary characteristic image; The second extraction unit, obtain the associated person information corresponding with described contact person of pre-stored, and from all contact files of described terminal storage, extract the target contact files being associated with described associated person information, and described target contact files is added in described secret file.
Pass through technique scheme; contact head image in characteristic image and terminal is contrasted; identify the contact head image corresponding with characteristic image and obtain the associated person information that this contact head image is corresponding; the target contact files being associated with this contact person in all contact files of terminal storage is set to secret file; not only the face-image being associated with characteristic image is encrypted; more will be encrypted with characteristic image corresponding relationship people's contact files; realize comprehensive encryption, effectively protected user's privacy.
In technique scheme, preferably, described characteristic image also comprises label information, described processing unit also comprises: the 3rd extraction unit, obtain the label information in described arbitrary characteristic image, and in all contact files of described terminal storage, extract the target contact files being associated with described label information, and described target contact files is added in described secret file.
Pass through technique scheme; if characteristic image comprises label information; the target contact files being associated with this label information in all contact files of direct terminal storage is set to secret file; not only the face-image being associated with characteristic image is encrypted; more the contact files being associated with the label information of characteristic image is encrypted; realize comprehensive encryption, effectively protected user's privacy.
Wherein, label information refers to the information relevant to this characteristic image arranging on characteristic image, specifically comprises the contact name corresponding with face-image in characteristic image, contact person's contact method, as telephone number, microblogging account etc.
In technique scheme, preferably, also comprise: key setting unit, according to the order that arranges receiving, arranges private key corresponding to described secret file; Tip element, in the time receiving the instruction of opening described secret file, prompting user inputs private key; And authenticating unit, the private key of the described user's input receiving and the described private key of described key setting unit setting are mated, and in the time that matching result is consistent, allow to open described secret file, otherwise, do not allow to open described secret file.
By technique scheme, secret file is arranged to private key, and in the time that needs are checked secret file, the private key private key corresponding with described secret file of user's input mated, improve the security of secret file.As comparatively preferably embodiment of one, can private key be set to characteristic image, in the time that the face-image being associated with this characteristic image and/or contact files are set to secret file, all the private key of use characteristic image is as the private key of secret file.If certainly, in order further to improve the security of secret file, also can private key be set respectively to all secret files.
According to a further aspect in the invention, a kind of data guard method has also been proposed, for terminal, comprise: setting steps, according to the order that arranges receiving, adds the arbitrary characteristic image in described terminal in secret file to, wherein, described characteristic image comprises face-image; Treatment step finds out the file destination being associated with described arbitrary characteristic image in All Files corresponding to described terminal, and described file destination is added in described secret file; The treating step comprises: obtain all face-images of storing in described terminal, every face-image in described arbitrary characteristic image and described all face-images is compared; Determine the facial similarity of described every face-image and described arbitrary characteristic image according to comparative result, and extracting the face-image that facial similarity is greater than default facial similarity, the face-image that described facial similarity is greater than to default facial similarity adds in described secret file.
By technique scheme, only need add arbitrary characteristic image to secret file, the file destination being associated with characteristic image in terminal All Files all will be added to secret file, realize the automatic encryption of file.With the file that needs user to find in existing encryption technology to want to encrypt, then file is hidden or the operation of encrypting is compared, simplify operation, the while can have been avoided in existing encryption technology because locating file is not omitted the privacy leakage that file causes comprehensively.
Wherein, All Files corresponding to terminal both comprised the file of having stored in terminal, comprise again the file that terminal newly receives, wherein, the file of having stored in terminal comprises the photo stored in terminal, note, message registration etc., and the file that terminal newly receives comprises the photo of new take, the note of newly receiving, the phone newly receiving etc.
Because characteristic image comprises face-image, therefore while searching the file destination being associated with characteristic image in terminal, need to search the file destination being associated with the face-image of characteristic image, then the file destination finding is encrypted, guarantee that the file destination being associated with characteristic image is all encrypted, avoid omitting file and cause privacy to reveal.Particularly, in the time that terminal is searched the face-image file being associated with face-image in characteristic image, the face-image that terminal is greater than default facial similarity with characteristic image face-image similarity in can the face-image of all storages is set to secret file, search and cryptographic operation without user, realize automatically and encrypting, simplified operation.
Specifically, default facial similarity can free setting.For example: default facial similarity is 90%, while being greater than 90% with characteristic image face similarity in the face-image of terminal storage, directly this face-image is set to secret file; In the face-image of terminal storage, be greater than 60% and while being less than 90% with characteristic image face similarity, whether this face-image is set to secret file to user that can inquiry terminal; Be less than 60% with characteristic image face similarity in the face-image of terminal storage time, this face-image will not be set to secret file.
In technique scheme, preferably, in All Files corresponding to described terminal, find out the file destination being associated with described arbitrary characteristic image, and described file destination is added in described secret file, also comprise: in the time that described terminal receives new face-image, described arbitrary characteristic image and described new face-image are compared; And in the time that the facial similarity of described new face-image and described arbitrary characteristic image is greater than default facial similarity, described new face-image is added in described secret file.
Pass through technique scheme; the face-image that is greater than default facial similarity with characteristic image face similarity in the face-image can terminal receiving is in real time set to secret file; due to terminal in use; may receive at any time face-image; receive that face-image compares with the face-image of characteristic image and automatically encrypt; avoid omitting because of carelessness, better protected user's privacy.Wherein, terminal receives face-image and includes but not limited to: take pictures, copy picture.
In technique scheme, preferably, described characteristic image also comprises label information, and described treatment step also comprises: the head portrait of contact person of described arbitrary characteristic image and pre-stored is contrasted, to identify contact person corresponding to described arbitrary characteristic image; Obtain the associated person information corresponding with described contact person of pre-stored, and from all contact files of described terminal storage, extract the target contact files being associated with described associated person information, and described target contact files is added in described secret file.
Wherein, label information refers to the information relevant to this characteristic image arranging on characteristic image, specifically comprises the contact name corresponding with face-image in characteristic image, contact person's contact method, as telephone number, microblogging account etc.
Pass through technique scheme; contact head image in characteristic image and terminal is contrasted; identify the contact head image corresponding with characteristic image and obtain the associated person information that this contact head image is corresponding; the target contact files being associated with this contact person in all contact files of terminal storage is set to secret file; not only the face-image being associated with characteristic image is encrypted; more will be encrypted with characteristic image corresponding relationship people's contact files; realize comprehensive encryption, effectively protected user's privacy.
In technique scheme, preferably, in All Files corresponding to described terminal, find out the file destination being associated with described arbitrary characteristic image, and described file destination is added in described secret file, also comprise: obtain the label information in described arbitrary characteristic image, and in all contact files of described terminal storage, extract the target contact files being associated with described label information, and described target contact files is added in described secret file.
Pass through technique scheme; if characteristic image comprises label information; the target contact files being associated with this label information in all contact files of direct terminal storage is set to secret file; not only the face-image being associated with characteristic image is encrypted; more the contact files being associated with the label information of characteristic image is encrypted; realize comprehensive encryption, effectively protected user's privacy.
In technique scheme, preferably, also comprise: according to the order that arranges receiving, the private key corresponding with described secret file is set; In the time receiving the instruction of opening described secret file, prompting user inputs private key; And private key and the private key corresponding with described secret file of the described user's input receiving are mated, and in the time that matching result is consistent, allow to open described secret file, otherwise, do not allow to open described secret file.
By technique scheme, secret file is arranged to private key, and in the time that needs are checked secret file, the private key private key corresponding with described secret file of user's input mated, improve the security of secret file.As comparatively preferably embodiment of one, can private key be set to characteristic image, in the time that the face-image being associated with this characteristic image and/or contact files are set to secret file, all the private key of use characteristic image is as the private key of secret file.If certainly, in order further to improve the security of secret file, also can private key be set respectively to all secret files.
Accompanying drawing explanation
Fig. 1 shows the structural representation of data protecting device according to an embodiment of the invention;
Fig. 2 shows the schematic flow diagram of data guard method according to an embodiment of the invention;
Fig. 3 shows the schematic flow diagram of data guard method according to another embodiment of the invention.
Embodiment
In order more clearly to understand above-mentioned purpose of the present invention, feature and advantage, below in conjunction with the drawings and specific embodiments, the present invention is further described in detail.It should be noted that, in the situation that not conflicting, the feature in the application's embodiment and embodiment can combine mutually.
A lot of details are set forth in the following description so that fully understand the present invention; but; the present invention can also adopt other to be different from other modes described here and implement, and therefore, protection scope of the present invention is not subject to the restriction of following public specific embodiment.
Fig. 1 shows the structural representation of data protecting device according to an embodiment of the invention.
As shown in Figure 1, data protecting device 100 according to an embodiment of the invention, for terminal, comprise: setting unit 102, according to the order that arranges receiving, the arbitrary characteristic image in described terminal is added in secret file, described characteristic image comprises face-image; Processing unit 104 finds out the file destination being associated with described arbitrary characteristic image in All Files corresponding to described terminal, and described file destination is added in described secret file; Described processing unit 104 comprises: comparing unit 104A, obtain all face-images of storing in described terminal, and every face-image in described arbitrary characteristic image and described all face-images is compared; The first extraction unit 104B, determine the facial similarity of described every face-image and described arbitrary characteristic image according to the comparative result of described comparing unit 104A, and extracting the face-image that facial similarity is greater than default facial similarity, the face-image that described facial similarity is greater than to default facial similarity adds in described secret file.
By technique scheme, only need add arbitrary characteristic image to secret file, the file destination being associated with characteristic image in terminal All Files all will be added to secret file, realize the automatic encryption of file.With the file that needs user to find in existing encryption technology to want to encrypt, then file is hidden or the operation of encrypting is compared, simplify operation, the while can have been avoided in existing encryption technology because locating file is not omitted the privacy leakage that file causes comprehensively.
Because characteristic image comprises face-image, therefore while searching the file destination being associated with characteristic image in terminal, need to search the file destination being associated with the face-image of characteristic image, then the file destination finding is encrypted, guarantee that the file destination being associated with characteristic image is all encrypted, avoid omitting file and cause privacy to reveal.Particularly, in the time that terminal is searched the face-image file being associated with face-image in characteristic image, the face-image that terminal is greater than default facial similarity with characteristic image face-image similarity in can the face-image of all storages is set to secret file, search and cryptographic operation without user, realize automatically and encrypting, simplified operation.
Specifically, default facial similarity can free setting.For example: default facial similarity is 90%, while being greater than 90% with characteristic image face similarity in the face-image of terminal storage, directly this face-image is set to secret file; In the face-image of terminal storage, be greater than 60% and while being less than 90% with characteristic image face similarity, whether this face-image is set to secret file to user that can inquiry terminal; Be less than 60% with characteristic image face similarity in the face-image of terminal storage time, this face-image will not be set to secret file.
In technique scheme, preferably, described comparing unit 104A also for: in the time that described terminal receives new face-image, described arbitrary characteristic image and described new face-image are compared; And described the first extraction unit 104B also for: in the time that the facial similarity of described new face-image and described arbitrary characteristic image is greater than default facial similarity, described new face-image is added in described secret file.
Pass through technique scheme; the face-image that is greater than default facial similarity with characteristic image face similarity in the face-image can terminal receiving is in real time set to secret file; due to terminal in use; may receive at any time face-image; receive that face-image compares with the face-image of characteristic image and automatically encrypt; avoid omitting because of carelessness, better protected user's privacy.Wherein, terminal receives face-image and includes but not limited to: take pictures, copy picture.
In technique scheme, preferably, described processing unit 104 also comprises: recognition unit 104C, contrasts the head portrait of contact person of described arbitrary characteristic image and pre-stored, to identify contact person corresponding to described arbitrary characteristic image; The second extraction unit 104D, obtain the associated person information corresponding with described contact person of pre-stored, and from all contact files of described terminal storage, extract the target contact files being associated with described associated person information, and described target contact files is added in described secret file.
Pass through technique scheme; contact head image in characteristic image and terminal is contrasted; identify the contact head image corresponding with characteristic image and obtain the associated person information that this contact head image is corresponding; the target contact files being associated with this contact person in all contact files of terminal storage is set to secret file; not only the face-image being associated with characteristic image is encrypted; more will be encrypted with characteristic image corresponding relationship people's contact files; realize comprehensive encryption, effectively protected user's privacy.
In technique scheme, preferably, described characteristic image also comprises label information, described processing unit 104 also comprises: the 3rd extraction unit 104E, obtain the label information in described arbitrary characteristic image, and in all contact files of described terminal storage, extract the target contact files being associated with described label information, and described target contact files is added in described secret file.
Wherein, label information refers to the information relevant to this characteristic image arranging on characteristic image, specifically comprises the contact name corresponding with face-image in characteristic image, contact person's contact method, as telephone number, microblogging account etc.
Pass through technique scheme; if characteristic image comprises label information; the target contact files being associated with this label information in all contact files of direct terminal storage is set to secret file; not only the face-image being associated with characteristic image is encrypted; more the contact files being associated with the label information of characteristic image is encrypted; realize comprehensive encryption, effectively protected user's privacy.
In technique scheme, preferably, also comprise: key setting unit 106, according to the order that arranges receiving, arranges private key corresponding to described secret file; Tip element 108, in the time receiving the instruction of opening described secret file, prompting user inputs private key; And authenticating unit 110, the described private key that the private key that the described user who receives is inputted and described key setting unit 106 arrange is mated, and in the time that matching result is consistent, allows to open described secret file, otherwise, do not allow to open described secret file.
By technique scheme, secret file is arranged to private key, and in the time that needs are checked secret file, the private key private key corresponding with described secret file of user's input mated, improve the security of secret file.As comparatively preferably embodiment of one, can private key be set to characteristic image, in the time that the face-image being associated with this characteristic image and/or contact files are set to secret file, all the private key of use characteristic image is as the private key of secret file.If certainly, in order further to improve the security of secret file, also can private key be set respectively to all secret files.
Fig. 2 shows the schematic flow diagram of data guard method according to an embodiment of the invention.
As shown in Figure 2, data guard method according to an embodiment of the invention, for terminal, comprise: step 202, according to the order that arranges receiving, the arbitrary characteristic image in described terminal is added in secret file, wherein, described characteristic image comprises face-image; Step 204 finds out the file destination being associated with described arbitrary characteristic image in All Files corresponding to described terminal, and described file destination is added in described secret file; Described step 204 comprises: obtain all face-images of storing in described terminal, every face-image in described arbitrary characteristic image and described all face-images is compared; Determine the facial similarity of described every face-image and described arbitrary characteristic image according to comparative result, and extracting the face-image that facial similarity is greater than default facial similarity, the face-image that described facial similarity is greater than to default facial similarity adds in described secret file.
By technique scheme, only need add arbitrary characteristic image to secret file, the file destination being associated with characteristic image in terminal All Files all will be added to secret file, realize the automatic encryption of file.With the file that needs user to find in existing encryption technology to want to encrypt, then file is hidden or the operation of encrypting is compared, simplify operation, the while can have been avoided in existing encryption technology because locating file is not omitted the privacy leakage that file causes comprehensively.
Because characteristic image comprises face-image, therefore while searching the file destination being associated with characteristic image in terminal, need to search the file destination being associated with the face-image of characteristic image, then the file destination finding is encrypted, guarantee that the file destination being associated with characteristic image is all encrypted, avoid omitting file and cause privacy to reveal.Particularly, in the time that terminal is searched the face-image file being associated with face-image in characteristic image, the face-image that terminal is greater than default facial similarity with characteristic image face-image similarity in can the face-image of all storages is set to secret file, search and cryptographic operation without user, realize automatically and encrypting, simplified operation.
Specifically, default facial similarity can free setting.For example: default facial similarity is 90%, while being greater than 90% with characteristic image face similarity in the face-image of terminal storage, directly this face-image is set to secret file; In the face-image of terminal storage, be greater than 60% and while being less than 90% with characteristic image face similarity, whether this face-image is set to secret file to user that can inquiry terminal; Be less than 60% with characteristic image face similarity in the face-image of terminal storage time, this face-image will not be set to secret file.
In technique scheme, preferably, in All Files corresponding to described terminal, find out the file destination being associated with described arbitrary characteristic image, and described file destination is added in described secret file, also comprise: in the time that described terminal receives new face-image, described arbitrary characteristic image and described new face-image are compared; And in the time that the facial similarity of described new face-image and described arbitrary characteristic image is greater than default facial similarity, described new face-image is added in described secret file.
Pass through technique scheme; the face-image that is greater than default facial similarity with characteristic image face similarity in the face-image can terminal receiving is in real time set to secret file; due to terminal in use; may receive at any time face-image; receive that face-image compares with the face-image of characteristic image and automatically encrypt; avoid omitting because of carelessness, better protected user's privacy.Wherein, terminal receives face-image and includes but not limited to: take pictures, copy picture.
In technique scheme, preferably, described characteristic image also comprises label information, and described step 204 also comprises:: the head portrait of contact person of described arbitrary characteristic image and pre-stored is contrasted, to identify contact person corresponding to described arbitrary characteristic image; Obtain the associated person information corresponding with described contact person of pre-stored, and from all contact files of described terminal storage, extract the target contact files being associated with described associated person information, and described target contact files is added in described secret file.
Wherein, label information refers to the information relevant to this characteristic image arranging on characteristic image, specifically comprises the contact name corresponding with face-image in characteristic image, contact person's contact method, as telephone number, microblogging account etc.
Pass through technique scheme; contact head image in characteristic image and terminal is contrasted; identify the contact head image corresponding with characteristic image and obtain the associated person information that this contact head image is corresponding; the target contact files being associated with this contact person in all contact files of terminal storage is set to secret file; not only the face-image being associated with characteristic image is encrypted; more will be encrypted with characteristic image corresponding relationship people's contact files; realize comprehensive encryption, effectively protected user's privacy.
In technique scheme, preferably, in All Files corresponding to described terminal, find out the file destination being associated with described arbitrary characteristic image, and described file destination is added in described secret file, also comprise: obtain the label information in described arbitrary characteristic image, and in all contact files of described terminal storage, extract the target contact files being associated with described label information, and described target contact files is added in described secret file.
Pass through technique scheme; if characteristic image comprises label information; the target contact files being associated with this label information in all contact files of direct terminal storage is set to secret file; not only the face-image being associated with characteristic image is encrypted; more the contact files being associated with the label information of characteristic image is encrypted; realize comprehensive encryption, effectively protected user's privacy.
In technique scheme, preferably, also comprise: according to the order that arranges receiving, the private key corresponding with described secret file is set; In the time receiving the instruction of opening described secret file, prompting user inputs private key; And private key and the private key corresponding with described secret file of the described user's input receiving are mated, and in the time that matching result is consistent, allow to open described secret file, otherwise, do not allow to open described secret file.
By technique scheme, secret file is arranged to private key, and in the time that needs are checked secret file, the private key private key corresponding with described secret file of user's input mated, improve the security of secret file.As comparatively preferably embodiment of one, can private key be set to characteristic image, in the time that the face-image being associated with this characteristic image and/or contact files are set to secret file, all the private key of use characteristic image is as the private key of secret file.If certainly, in order further to improve the security of secret file, also can private key be set respectively to all secret files.
Fig. 3 shows the schematic flow diagram of data guard method according to another embodiment of the invention.
As shown in Figure 3, data guard method according to another embodiment of the invention can be divided into following three concrete scenes.
The image of storing in scene one, terminal is encrypted automatically.
Step 316, if the face-image similarity of the character image of terminal storage and secret image is less than 90% and be more than or equal to 60%, whether this character image is set to secret file to eject prompting inquiry.
The image that scene two, terminal are taken is in real time encrypted automatically.
Whether step 320, comprise character image in the photo that sense terminals is taken, and turns to step 310 if comprise, otherwise finish.
Step 316, if the face-image similarity of the character image of terminal storage and secret image is less than 90% and be more than or equal to 60%, whether this character image is set to secret file to eject prompting inquiry.
Contact files in scene three, terminal is encrypted automatically.
More than be described with reference to the accompanying drawings technical scheme of the present invention; due in correlation technique; the encryption of picture in terminal is needed user oneself to go for to want the file of encrypting; the operation of then file being hidden or being encrypted; but because mobile phone in use all may be taken pictures at any time or copy picture; user can not be real-time after generating pictures, be encrypted at once; so often can forget encryption because of carelessness, and can not be encrypted the contact person's corresponding with picture information, mail etc.Therefore; the present invention proposes a kind of new Data Protection Technologies; by technical scheme of the present invention; in the time that arbitrary characteristic image is set to secret file; the file being associated with characteristic image in terminal All Files is all set to secret file; realize the automatic encryption of file, simplified cryptographic operation.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any modification of doing, be equal to replacement, improvement etc., within all should being included in protection scope of the present invention.
Claims (10)
1. a data protecting device, for terminal, is characterized in that, comprising:
Setting unit, according to the order that arranges receiving, adds the arbitrary characteristic image in described terminal in secret file to, and wherein, described characteristic image comprises face-image;
Processing unit finds out the file destination being associated with described arbitrary characteristic image in described terminal, and described file destination is added in described secret file;
Wherein, described processing unit comprises:
Comparing unit, obtains all face-images of storing in described terminal, and every face-image in described arbitrary characteristic image and described all face-images is compared;
The first extraction unit, determine the facial similarity of described every face-image and described arbitrary characteristic image according to the comparative result of described comparing unit, and extracting the face-image that facial similarity is greater than default facial similarity, the face-image that described facial similarity is greater than to default facial similarity adds in described secret file.
2. data protecting device according to claim 1, is characterized in that, described comparing unit also for:
In the time that described terminal receives new face-image, described arbitrary characteristic image and described new face-image are compared; And
Described the first extraction unit also for:
In the time that the facial similarity of described new face-image and described arbitrary characteristic image is greater than default facial similarity, described new face-image is added in described secret file.
3. data protecting device according to claim 1, is characterized in that, described processing unit also comprises:
Recognition unit, contrasts the head portrait of contact person of described arbitrary characteristic image and pre-stored, to identify contact person corresponding to described arbitrary characteristic image;
The second extraction unit, obtain the associated person information corresponding with described contact person of pre-stored, and from all contact files of described terminal storage, extract the target contact files being associated with described associated person information, and described target contact files is added in described secret file.
4. data protecting device according to claim 1, is characterized in that, described characteristic image also comprises label information, and described processing unit also comprises:
The 3rd extraction unit, obtain the label information in described arbitrary characteristic image, and in all contact files of described terminal storage, extract the target contact files being associated with described label information, and described target contact files is added in described secret file.
5. according to the data protecting device described in any one in claim 1 to 4, it is characterized in that, also comprise: key setting unit, according to the order that arranges receiving, arranges private key corresponding to described secret file;
Tip element, in the time receiving the instruction of opening described secret file, prompting user inputs private key; And
Authenticating unit, mates the private key of the described user's input receiving and the described private key of described key setting unit setting, and in the time that matching result is consistent, allows to open described secret file, otherwise, do not allow to open described secret file.
6. a data guard method, for terminal, is characterized in that, comprising:
Setting steps, according to the order that arranges receiving, adds the arbitrary characteristic image in described terminal in secret file to, and wherein, described characteristic image comprises face-image;
Treatment step finds out the file destination being associated with described arbitrary characteristic image in All Files corresponding to described terminal, and described file destination is added in described secret file;
The treating step comprises:
Obtain all face-images of storing in described terminal, every face-image in described arbitrary characteristic image and described all face-images is compared;
Determine the facial similarity of described every face-image and described arbitrary characteristic image according to comparative result, and extracting the face-image that facial similarity is greater than default facial similarity, the face-image that described facial similarity is greater than to default facial similarity adds in described secret file.
7. data guard method according to claim 6, is characterized in that, finds out the file destination being associated with described arbitrary characteristic image in All Files corresponding to described terminal, and described file destination is added in described secret file, also comprises:
In the time that described terminal receives new face-image, described arbitrary characteristic image and described new face-image are compared; And
In the time that the facial similarity of described new face-image and described arbitrary characteristic image is greater than default facial similarity, described new face-image is added in described secret file.
8. data guard method according to claim 6, is characterized in that, finds out the file destination being associated with described arbitrary characteristic image in All Files corresponding to described terminal, and described file destination is added in described secret file, also comprises:
The head portrait of contact person of described arbitrary characteristic image and pre-stored is contrasted, to identify contact person corresponding to described arbitrary characteristic image;
Obtain the associated person information corresponding with described contact person of pre-stored, and from all contact files of described terminal storage, extract the target contact files being associated with described associated person information, and described target contact files is added in described secret file.
9. data guard method according to claim 6, is characterized in that, described characteristic image also comprises label information, and described treatment step also comprises:
Obtain the label information in described arbitrary characteristic image, and in all contact files of described terminal storage, extract the target contact files being associated with described label information, and described target contact files is added in described secret file.
10. according to the data guard method described in any one in claim 6 to 9, it is characterized in that, also comprise:
According to the order that arranges receiving, the private key corresponding with described secret file is set;
In the time receiving the instruction of opening described secret file, prompting user inputs private key; And
Private key and the private key corresponding with described secret file of the described user's input receiving are mated, and in the time that matching result is consistent, allow to open described secret file, otherwise, do not allow to open described secret file.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410069463.3A CN103824030A (en) | 2014-02-27 | 2014-02-27 | Data protection device and data protection method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410069463.3A CN103824030A (en) | 2014-02-27 | 2014-02-27 | Data protection device and data protection method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103824030A true CN103824030A (en) | 2014-05-28 |
Family
ID=50759085
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410069463.3A Pending CN103824030A (en) | 2014-02-27 | 2014-02-27 | Data protection device and data protection method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103824030A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104462900A (en) * | 2014-12-05 | 2015-03-25 | 来安县新元机电设备设计有限公司 | Method and system for protecting private pictures in mobile terminal |
CN104463017A (en) * | 2014-12-22 | 2015-03-25 | 联想(北京)有限公司 | Information processing method and electronic device |
CN105138918A (en) * | 2015-09-01 | 2015-12-09 | 百度在线网络技术(北京)有限公司 | Recognition method and device for secure file |
CN105701413A (en) * | 2015-12-29 | 2016-06-22 | 宇龙计算机通信科技(深圳)有限公司 | Method and apparatus for protecting personal key information by intelligent device |
WO2016106577A1 (en) * | 2014-12-30 | 2016-07-07 | 华为技术有限公司 | Document protection method and device |
CN106919849A (en) * | 2015-12-24 | 2017-07-04 | 北京三星通信技术研究有限公司 | Method for secret protection and device |
CN106921791A (en) * | 2017-01-25 | 2017-07-04 | 北京奇虎科技有限公司 | The storage and inspection method of a kind of multimedia file, device and mobile terminal |
CN106971117A (en) * | 2015-10-15 | 2017-07-21 | 富士通株式会社 | Investigation apparatus and investigation method |
CN107077570A (en) * | 2014-09-10 | 2017-08-18 | 赛门铁克公司 | System and method for detecting the trial that sensitive information is sent by data distribution passage |
CN107516027A (en) * | 2017-09-25 | 2017-12-26 | 联想(北京)有限公司 | Image processing method and electronic equipment |
CN109033858A (en) * | 2016-02-17 | 2018-12-18 | 青岛海信移动通信技术股份有限公司 | A kind of image guard method and device based on recognition of face |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005293399A (en) * | 2004-04-02 | 2005-10-20 | Matsushita Electric Ind Co Ltd | Personal authentication method and device |
CN101211371A (en) * | 2006-12-27 | 2008-07-02 | 索尼株式会社 | Image searching device, image searching method, image pick-up device and program |
CN102067127A (en) * | 2008-06-25 | 2011-05-18 | 索尼爱立信移动通讯有限公司 | Method and apparatus for tagging images and providing notifications when images are tagged |
CN103164441A (en) * | 2011-12-14 | 2013-06-19 | 富泰华工业(深圳)有限公司 | Image-classifying electronic device based on facial eigenvalue |
-
2014
- 2014-02-27 CN CN201410069463.3A patent/CN103824030A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005293399A (en) * | 2004-04-02 | 2005-10-20 | Matsushita Electric Ind Co Ltd | Personal authentication method and device |
CN101211371A (en) * | 2006-12-27 | 2008-07-02 | 索尼株式会社 | Image searching device, image searching method, image pick-up device and program |
CN102067127A (en) * | 2008-06-25 | 2011-05-18 | 索尼爱立信移动通讯有限公司 | Method and apparatus for tagging images and providing notifications when images are tagged |
CN103164441A (en) * | 2011-12-14 | 2013-06-19 | 富泰华工业(深圳)有限公司 | Image-classifying electronic device based on facial eigenvalue |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107077570A (en) * | 2014-09-10 | 2017-08-18 | 赛门铁克公司 | System and method for detecting the trial that sensitive information is sent by data distribution passage |
CN104462900A (en) * | 2014-12-05 | 2015-03-25 | 来安县新元机电设备设计有限公司 | Method and system for protecting private pictures in mobile terminal |
CN104463017B (en) * | 2014-12-22 | 2018-02-27 | 联想(北京)有限公司 | A kind of information processing method and electronic equipment |
CN104463017A (en) * | 2014-12-22 | 2015-03-25 | 联想(北京)有限公司 | Information processing method and electronic device |
WO2016106577A1 (en) * | 2014-12-30 | 2016-07-07 | 华为技术有限公司 | Document protection method and device |
CN107005606A (en) * | 2014-12-30 | 2017-08-01 | 华为技术有限公司 | A kind of guard method of file and device |
CN105138918A (en) * | 2015-09-01 | 2015-12-09 | 百度在线网络技术(北京)有限公司 | Recognition method and device for secure file |
CN105138918B (en) * | 2015-09-01 | 2019-03-29 | 百度在线网络技术(北京)有限公司 | A kind of recognition methods of secure file and device |
CN106971117B (en) * | 2015-10-15 | 2020-06-16 | 富士通株式会社 | Investigation apparatus and investigation method |
CN106971117A (en) * | 2015-10-15 | 2017-07-21 | 富士通株式会社 | Investigation apparatus and investigation method |
CN106919849A (en) * | 2015-12-24 | 2017-07-04 | 北京三星通信技术研究有限公司 | Method for secret protection and device |
CN105701413A (en) * | 2015-12-29 | 2016-06-22 | 宇龙计算机通信科技(深圳)有限公司 | Method and apparatus for protecting personal key information by intelligent device |
CN109033858A (en) * | 2016-02-17 | 2018-12-18 | 青岛海信移动通信技术股份有限公司 | A kind of image guard method and device based on recognition of face |
CN109063497A (en) * | 2016-02-17 | 2018-12-21 | 青岛海信移动通信技术股份有限公司 | A kind of image guard method and device based on recognition of face |
CN109145615A (en) * | 2016-02-17 | 2019-01-04 | 青岛海信移动通信技术股份有限公司 | A kind of image guard method and device based on recognition of face |
CN109145615B (en) * | 2016-02-17 | 2020-08-25 | 青岛海信移动通信技术股份有限公司 | Image protection method and device based on face recognition |
CN109033858B (en) * | 2016-02-17 | 2020-08-25 | 青岛海信移动通信技术股份有限公司 | Image protection method and device based on face recognition |
CN109063497B (en) * | 2016-02-17 | 2020-11-24 | 青岛海信移动通信技术股份有限公司 | Image protection method and device based on face recognition |
CN106921791A (en) * | 2017-01-25 | 2017-07-04 | 北京奇虎科技有限公司 | The storage and inspection method of a kind of multimedia file, device and mobile terminal |
CN106921791B (en) * | 2017-01-25 | 2020-06-09 | 北京安云世纪科技有限公司 | Multimedia file storage and viewing method and device and mobile terminal |
CN107516027A (en) * | 2017-09-25 | 2017-12-26 | 联想(北京)有限公司 | Image processing method and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103824030A (en) | Data protection device and data protection method | |
CN107169374B (en) | Encryption and decryption system and method based on voiceprint and voice recognition technology | |
CN109040439B (en) | Method and device for realizing privacy protection | |
WO2016061899A1 (en) | Fingerprint decryption method and device | |
CN104200170B (en) | The method for secret protection and electronic equipment of a kind of electronic equipment | |
CN104239815A (en) | Electronic document encryption and decryption method and method based on iris identification | |
CN105260669B (en) | The transmission method and Transmission system of photo | |
US10187383B2 (en) | Method of pushing passwords, and pushing system | |
TW201424324A (en) | Method and apparatus of account login | |
CN103559451A (en) | Method and device for protecting and displaying privacy information | |
WO2016187940A1 (en) | Information protecting method, mobile terminal and computer storage medium | |
WO2017008350A1 (en) | Fingerprint storage method and device, and fingerprint recognition method and device | |
WO2016192165A1 (en) | Data encryption method and apparatus | |
US9800577B2 (en) | Method and apparatus for controlling communications terminal and corresponding communications terminal | |
US9276748B2 (en) | Data-encrypting method and decrypting method for a mobile phone | |
US11405193B2 (en) | Encrypted photographing method and system based on fingerprint recognition | |
WO2017020426A1 (en) | Communication method, apparatus and system based on biological feature identification | |
TWI505126B (en) | A method and apparatus to obtain a key | |
CN106487758B (en) | data security signature method, service terminal and private key backup server | |
CN108073820A (en) | Security processing, device and the mobile terminal of data | |
KR101052294B1 (en) | Apparatus and method for contents security | |
CN106055941A (en) | Terminal method and apparatus | |
KR101305901B1 (en) | Method and system for authentication | |
WO2016119341A1 (en) | Method and device for implementing multi-user login mode, and computer storage medium | |
WO2015196642A1 (en) | Data encryption method, decryption method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20140528 |