CN103824030A - Data protection device and data protection method - Google Patents

Data protection device and data protection method Download PDF

Info

Publication number
CN103824030A
CN103824030A CN201410069463.3A CN201410069463A CN103824030A CN 103824030 A CN103824030 A CN 103824030A CN 201410069463 A CN201410069463 A CN 201410069463A CN 103824030 A CN103824030 A CN 103824030A
Authority
CN
China
Prior art keywords
image
face
file
characteristic image
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410069463.3A
Other languages
Chinese (zh)
Inventor
黄立军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201410069463.3A priority Critical patent/CN103824030A/en
Publication of CN103824030A publication Critical patent/CN103824030A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Processing Or Creating Images (AREA)

Abstract

The invention provides a data protection device and a data protection method. The data protection device comprises a setting unit and a processing unit. The setting unit adds any feather image in a terminal to a secret file according to a received setting command, wherein the feature images include facial images. The processing unit searches the terminal for a target file related to the feature image and adds the target file to the secret file. The processing unit comprises a comparison unit used for obtaining all the facial images stored in the terminal, and comparing the feather image with each facial image in all the facial images according to the comparison result. The first extraction unit confirms the facial similarity of each facial image and the feature image according to the comparison result, extracts the facial images with the facial similarity larger than preset facial similarity, and adds the facial images to the secret file. By means of the technical scheme, automatic encryption of files can be achieved, and the encryption operation is simplified.

Description

Data protecting device and data guard method
Technical field
The present invention relates to communication technical field, in particular to a kind of data protecting device and a kind of data guard method.
Background technology
Along with scientific-technical progress, mobile Internet becomes inevitable trend, terminal (mobile phone, panel computer) is as a kind of communication tool, can also navigate, do shopping, take a picture, consult reference materials, see a film etc., a lot of users' personal information is all kept in terminal, so the information security of terminal seems more and more important, wherein relating to is exactly the privacy of picture the most widely, for this reason, the program software that a lot of companies have all developed a lot of encryptions is for manually hiding or encrypt file of user.
All to need user oneself to go for to want the file encrypted, the operation of then file being hidden or being encrypted with regard to the method for current encryption picture.But because mobile phone in use all may be taken pictures at any time or copy picture; user can not be real-time after generating pictures, be encrypted at once; so often can forget encryption because of carelessness; and in information security in terminal; not only comprise image information; in the application such as short message/mail, also can have potential safety hazard, so want to protect user's information security, it is far from being enough only encrypting picture.
Therefore, need a kind of new solution, be automatically encrypted with the image information in terminal and application message.
Summary of the invention
The present invention, just based on the problems referred to above, has proposed a kind of Data Protection Technologies, can realize the image information in terminal and application message are encrypted automatically.
In view of this, the present invention proposes a kind of data protecting device, for terminal, comprising: setting unit, according to the order that arranges receiving, the arbitrary characteristic image in described terminal is added in secret file, wherein, described characteristic image comprises face-image; Processing unit finds out the file destination being associated with described arbitrary characteristic image in described terminal, and described file destination is added in described secret file; Wherein, described processing unit comprises: comparing unit, obtain all face-images of storing in described terminal, and every face-image in described arbitrary characteristic image and described all face-images is compared; The first extraction unit, determine the facial similarity of described every face-image and described arbitrary characteristic image according to the comparative result of described comparing unit, and extracting the face-image that facial similarity is greater than default facial similarity, the face-image that described facial similarity is greater than to default facial similarity adds in described secret file.
By technique scheme, only need add arbitrary characteristic image to secret file, the file destination being associated with characteristic image in terminal All Files all will be added to secret file, realize the automatic encryption of file.With the file that needs user to find in existing encryption technology to want to encrypt, then file is hidden or the operation of encrypting is compared, simplify operation, the while can have been avoided in existing encryption technology because locating file is not omitted the privacy leakage that file causes comprehensively.
Wherein, All Files corresponding to terminal both comprised the file of having stored in terminal, comprise again the file that terminal newly receives, wherein, the file of having stored in terminal comprises the photo stored in terminal, note, message registration etc., and the file that terminal newly receives comprises the photo of new take, the note of newly receiving, the phone newly receiving etc.
Because characteristic image comprises face-image, therefore while searching the file destination being associated with characteristic image in terminal, need to search the file destination being associated with the face-image of characteristic image, then the file destination finding is encrypted, guarantee that the file destination being associated with characteristic image is all encrypted, avoid omitting file and cause privacy to reveal.Particularly, in the time that terminal is searched the face-image file being associated with face-image in characteristic image, the face-image that terminal is greater than default facial similarity with characteristic image face-image similarity in can the face-image of all storages is set to secret file, search and cryptographic operation without user, realize automatically and encrypting, simplified operation.
Specifically, default facial similarity can free setting.For example: default facial similarity is 90%, while being greater than 90% with characteristic image face similarity in the face-image of terminal storage, directly this face-image is set to secret file; In the face-image of terminal storage, be greater than 60% and while being less than 90% with characteristic image face similarity, whether this face-image is set to secret file to user that can inquiry terminal; Be less than 60% with characteristic image face similarity in the face-image of terminal storage time, this face-image will not be set to secret file.
In technique scheme, preferably, described comparing unit also for: in the time that described terminal receives new face-image, described arbitrary characteristic image and described new face-image are compared; And described the first extraction unit also for: in the time that the facial similarity of described new face-image and described arbitrary characteristic image is greater than default facial similarity, described new face-image is added in described secret file.
Pass through technique scheme; the face-image that is greater than default facial similarity with characteristic image face similarity in the face-image can terminal receiving is in real time set to secret file; due to terminal in use; may receive at any time face-image; receive that face-image compares with the face-image of characteristic image and automatically encrypt; avoid omitting because of carelessness, better protected user's privacy.Wherein, terminal receives face-image and includes but not limited to: take pictures, copy picture.
In technique scheme, preferably, described processing unit also comprises: recognition unit, contrasts the head portrait of contact person of described arbitrary characteristic image and pre-stored, to identify contact person corresponding to described arbitrary characteristic image; The second extraction unit, obtain the associated person information corresponding with described contact person of pre-stored, and from all contact files of described terminal storage, extract the target contact files being associated with described associated person information, and described target contact files is added in described secret file.
Pass through technique scheme; contact head image in characteristic image and terminal is contrasted; identify the contact head image corresponding with characteristic image and obtain the associated person information that this contact head image is corresponding; the target contact files being associated with this contact person in all contact files of terminal storage is set to secret file; not only the face-image being associated with characteristic image is encrypted; more will be encrypted with characteristic image corresponding relationship people's contact files; realize comprehensive encryption, effectively protected user's privacy.
In technique scheme, preferably, described characteristic image also comprises label information, described processing unit also comprises: the 3rd extraction unit, obtain the label information in described arbitrary characteristic image, and in all contact files of described terminal storage, extract the target contact files being associated with described label information, and described target contact files is added in described secret file.
Pass through technique scheme; if characteristic image comprises label information; the target contact files being associated with this label information in all contact files of direct terminal storage is set to secret file; not only the face-image being associated with characteristic image is encrypted; more the contact files being associated with the label information of characteristic image is encrypted; realize comprehensive encryption, effectively protected user's privacy.
Wherein, label information refers to the information relevant to this characteristic image arranging on characteristic image, specifically comprises the contact name corresponding with face-image in characteristic image, contact person's contact method, as telephone number, microblogging account etc.
In technique scheme, preferably, also comprise: key setting unit, according to the order that arranges receiving, arranges private key corresponding to described secret file; Tip element, in the time receiving the instruction of opening described secret file, prompting user inputs private key; And authenticating unit, the private key of the described user's input receiving and the described private key of described key setting unit setting are mated, and in the time that matching result is consistent, allow to open described secret file, otherwise, do not allow to open described secret file.
By technique scheme, secret file is arranged to private key, and in the time that needs are checked secret file, the private key private key corresponding with described secret file of user's input mated, improve the security of secret file.As comparatively preferably embodiment of one, can private key be set to characteristic image, in the time that the face-image being associated with this characteristic image and/or contact files are set to secret file, all the private key of use characteristic image is as the private key of secret file.If certainly, in order further to improve the security of secret file, also can private key be set respectively to all secret files.
According to a further aspect in the invention, a kind of data guard method has also been proposed, for terminal, comprise: setting steps, according to the order that arranges receiving, adds the arbitrary characteristic image in described terminal in secret file to, wherein, described characteristic image comprises face-image; Treatment step finds out the file destination being associated with described arbitrary characteristic image in All Files corresponding to described terminal, and described file destination is added in described secret file; The treating step comprises: obtain all face-images of storing in described terminal, every face-image in described arbitrary characteristic image and described all face-images is compared; Determine the facial similarity of described every face-image and described arbitrary characteristic image according to comparative result, and extracting the face-image that facial similarity is greater than default facial similarity, the face-image that described facial similarity is greater than to default facial similarity adds in described secret file.
By technique scheme, only need add arbitrary characteristic image to secret file, the file destination being associated with characteristic image in terminal All Files all will be added to secret file, realize the automatic encryption of file.With the file that needs user to find in existing encryption technology to want to encrypt, then file is hidden or the operation of encrypting is compared, simplify operation, the while can have been avoided in existing encryption technology because locating file is not omitted the privacy leakage that file causes comprehensively.
Wherein, All Files corresponding to terminal both comprised the file of having stored in terminal, comprise again the file that terminal newly receives, wherein, the file of having stored in terminal comprises the photo stored in terminal, note, message registration etc., and the file that terminal newly receives comprises the photo of new take, the note of newly receiving, the phone newly receiving etc.
Because characteristic image comprises face-image, therefore while searching the file destination being associated with characteristic image in terminal, need to search the file destination being associated with the face-image of characteristic image, then the file destination finding is encrypted, guarantee that the file destination being associated with characteristic image is all encrypted, avoid omitting file and cause privacy to reveal.Particularly, in the time that terminal is searched the face-image file being associated with face-image in characteristic image, the face-image that terminal is greater than default facial similarity with characteristic image face-image similarity in can the face-image of all storages is set to secret file, search and cryptographic operation without user, realize automatically and encrypting, simplified operation.
Specifically, default facial similarity can free setting.For example: default facial similarity is 90%, while being greater than 90% with characteristic image face similarity in the face-image of terminal storage, directly this face-image is set to secret file; In the face-image of terminal storage, be greater than 60% and while being less than 90% with characteristic image face similarity, whether this face-image is set to secret file to user that can inquiry terminal; Be less than 60% with characteristic image face similarity in the face-image of terminal storage time, this face-image will not be set to secret file.
In technique scheme, preferably, in All Files corresponding to described terminal, find out the file destination being associated with described arbitrary characteristic image, and described file destination is added in described secret file, also comprise: in the time that described terminal receives new face-image, described arbitrary characteristic image and described new face-image are compared; And in the time that the facial similarity of described new face-image and described arbitrary characteristic image is greater than default facial similarity, described new face-image is added in described secret file.
Pass through technique scheme; the face-image that is greater than default facial similarity with characteristic image face similarity in the face-image can terminal receiving is in real time set to secret file; due to terminal in use; may receive at any time face-image; receive that face-image compares with the face-image of characteristic image and automatically encrypt; avoid omitting because of carelessness, better protected user's privacy.Wherein, terminal receives face-image and includes but not limited to: take pictures, copy picture.
In technique scheme, preferably, described characteristic image also comprises label information, and described treatment step also comprises: the head portrait of contact person of described arbitrary characteristic image and pre-stored is contrasted, to identify contact person corresponding to described arbitrary characteristic image; Obtain the associated person information corresponding with described contact person of pre-stored, and from all contact files of described terminal storage, extract the target contact files being associated with described associated person information, and described target contact files is added in described secret file.
Wherein, label information refers to the information relevant to this characteristic image arranging on characteristic image, specifically comprises the contact name corresponding with face-image in characteristic image, contact person's contact method, as telephone number, microblogging account etc.
Pass through technique scheme; contact head image in characteristic image and terminal is contrasted; identify the contact head image corresponding with characteristic image and obtain the associated person information that this contact head image is corresponding; the target contact files being associated with this contact person in all contact files of terminal storage is set to secret file; not only the face-image being associated with characteristic image is encrypted; more will be encrypted with characteristic image corresponding relationship people's contact files; realize comprehensive encryption, effectively protected user's privacy.
In technique scheme, preferably, in All Files corresponding to described terminal, find out the file destination being associated with described arbitrary characteristic image, and described file destination is added in described secret file, also comprise: obtain the label information in described arbitrary characteristic image, and in all contact files of described terminal storage, extract the target contact files being associated with described label information, and described target contact files is added in described secret file.
Pass through technique scheme; if characteristic image comprises label information; the target contact files being associated with this label information in all contact files of direct terminal storage is set to secret file; not only the face-image being associated with characteristic image is encrypted; more the contact files being associated with the label information of characteristic image is encrypted; realize comprehensive encryption, effectively protected user's privacy.
In technique scheme, preferably, also comprise: according to the order that arranges receiving, the private key corresponding with described secret file is set; In the time receiving the instruction of opening described secret file, prompting user inputs private key; And private key and the private key corresponding with described secret file of the described user's input receiving are mated, and in the time that matching result is consistent, allow to open described secret file, otherwise, do not allow to open described secret file.
By technique scheme, secret file is arranged to private key, and in the time that needs are checked secret file, the private key private key corresponding with described secret file of user's input mated, improve the security of secret file.As comparatively preferably embodiment of one, can private key be set to characteristic image, in the time that the face-image being associated with this characteristic image and/or contact files are set to secret file, all the private key of use characteristic image is as the private key of secret file.If certainly, in order further to improve the security of secret file, also can private key be set respectively to all secret files.
Accompanying drawing explanation
Fig. 1 shows the structural representation of data protecting device according to an embodiment of the invention;
Fig. 2 shows the schematic flow diagram of data guard method according to an embodiment of the invention;
Fig. 3 shows the schematic flow diagram of data guard method according to another embodiment of the invention.
Embodiment
In order more clearly to understand above-mentioned purpose of the present invention, feature and advantage, below in conjunction with the drawings and specific embodiments, the present invention is further described in detail.It should be noted that, in the situation that not conflicting, the feature in the application's embodiment and embodiment can combine mutually.
A lot of details are set forth in the following description so that fully understand the present invention; but; the present invention can also adopt other to be different from other modes described here and implement, and therefore, protection scope of the present invention is not subject to the restriction of following public specific embodiment.
Fig. 1 shows the structural representation of data protecting device according to an embodiment of the invention.
As shown in Figure 1, data protecting device 100 according to an embodiment of the invention, for terminal, comprise: setting unit 102, according to the order that arranges receiving, the arbitrary characteristic image in described terminal is added in secret file, described characteristic image comprises face-image; Processing unit 104 finds out the file destination being associated with described arbitrary characteristic image in All Files corresponding to described terminal, and described file destination is added in described secret file; Described processing unit 104 comprises: comparing unit 104A, obtain all face-images of storing in described terminal, and every face-image in described arbitrary characteristic image and described all face-images is compared; The first extraction unit 104B, determine the facial similarity of described every face-image and described arbitrary characteristic image according to the comparative result of described comparing unit 104A, and extracting the face-image that facial similarity is greater than default facial similarity, the face-image that described facial similarity is greater than to default facial similarity adds in described secret file.
By technique scheme, only need add arbitrary characteristic image to secret file, the file destination being associated with characteristic image in terminal All Files all will be added to secret file, realize the automatic encryption of file.With the file that needs user to find in existing encryption technology to want to encrypt, then file is hidden or the operation of encrypting is compared, simplify operation, the while can have been avoided in existing encryption technology because locating file is not omitted the privacy leakage that file causes comprehensively.
Because characteristic image comprises face-image, therefore while searching the file destination being associated with characteristic image in terminal, need to search the file destination being associated with the face-image of characteristic image, then the file destination finding is encrypted, guarantee that the file destination being associated with characteristic image is all encrypted, avoid omitting file and cause privacy to reveal.Particularly, in the time that terminal is searched the face-image file being associated with face-image in characteristic image, the face-image that terminal is greater than default facial similarity with characteristic image face-image similarity in can the face-image of all storages is set to secret file, search and cryptographic operation without user, realize automatically and encrypting, simplified operation.
Specifically, default facial similarity can free setting.For example: default facial similarity is 90%, while being greater than 90% with characteristic image face similarity in the face-image of terminal storage, directly this face-image is set to secret file; In the face-image of terminal storage, be greater than 60% and while being less than 90% with characteristic image face similarity, whether this face-image is set to secret file to user that can inquiry terminal; Be less than 60% with characteristic image face similarity in the face-image of terminal storage time, this face-image will not be set to secret file.
In technique scheme, preferably, described comparing unit 104A also for: in the time that described terminal receives new face-image, described arbitrary characteristic image and described new face-image are compared; And described the first extraction unit 104B also for: in the time that the facial similarity of described new face-image and described arbitrary characteristic image is greater than default facial similarity, described new face-image is added in described secret file.
Pass through technique scheme; the face-image that is greater than default facial similarity with characteristic image face similarity in the face-image can terminal receiving is in real time set to secret file; due to terminal in use; may receive at any time face-image; receive that face-image compares with the face-image of characteristic image and automatically encrypt; avoid omitting because of carelessness, better protected user's privacy.Wherein, terminal receives face-image and includes but not limited to: take pictures, copy picture.
In technique scheme, preferably, described processing unit 104 also comprises: recognition unit 104C, contrasts the head portrait of contact person of described arbitrary characteristic image and pre-stored, to identify contact person corresponding to described arbitrary characteristic image; The second extraction unit 104D, obtain the associated person information corresponding with described contact person of pre-stored, and from all contact files of described terminal storage, extract the target contact files being associated with described associated person information, and described target contact files is added in described secret file.
Pass through technique scheme; contact head image in characteristic image and terminal is contrasted; identify the contact head image corresponding with characteristic image and obtain the associated person information that this contact head image is corresponding; the target contact files being associated with this contact person in all contact files of terminal storage is set to secret file; not only the face-image being associated with characteristic image is encrypted; more will be encrypted with characteristic image corresponding relationship people's contact files; realize comprehensive encryption, effectively protected user's privacy.
In technique scheme, preferably, described characteristic image also comprises label information, described processing unit 104 also comprises: the 3rd extraction unit 104E, obtain the label information in described arbitrary characteristic image, and in all contact files of described terminal storage, extract the target contact files being associated with described label information, and described target contact files is added in described secret file.
Wherein, label information refers to the information relevant to this characteristic image arranging on characteristic image, specifically comprises the contact name corresponding with face-image in characteristic image, contact person's contact method, as telephone number, microblogging account etc.
Pass through technique scheme; if characteristic image comprises label information; the target contact files being associated with this label information in all contact files of direct terminal storage is set to secret file; not only the face-image being associated with characteristic image is encrypted; more the contact files being associated with the label information of characteristic image is encrypted; realize comprehensive encryption, effectively protected user's privacy.
In technique scheme, preferably, also comprise: key setting unit 106, according to the order that arranges receiving, arranges private key corresponding to described secret file; Tip element 108, in the time receiving the instruction of opening described secret file, prompting user inputs private key; And authenticating unit 110, the described private key that the private key that the described user who receives is inputted and described key setting unit 106 arrange is mated, and in the time that matching result is consistent, allows to open described secret file, otherwise, do not allow to open described secret file.
By technique scheme, secret file is arranged to private key, and in the time that needs are checked secret file, the private key private key corresponding with described secret file of user's input mated, improve the security of secret file.As comparatively preferably embodiment of one, can private key be set to characteristic image, in the time that the face-image being associated with this characteristic image and/or contact files are set to secret file, all the private key of use characteristic image is as the private key of secret file.If certainly, in order further to improve the security of secret file, also can private key be set respectively to all secret files.
Fig. 2 shows the schematic flow diagram of data guard method according to an embodiment of the invention.
As shown in Figure 2, data guard method according to an embodiment of the invention, for terminal, comprise: step 202, according to the order that arranges receiving, the arbitrary characteristic image in described terminal is added in secret file, wherein, described characteristic image comprises face-image; Step 204 finds out the file destination being associated with described arbitrary characteristic image in All Files corresponding to described terminal, and described file destination is added in described secret file; Described step 204 comprises: obtain all face-images of storing in described terminal, every face-image in described arbitrary characteristic image and described all face-images is compared; Determine the facial similarity of described every face-image and described arbitrary characteristic image according to comparative result, and extracting the face-image that facial similarity is greater than default facial similarity, the face-image that described facial similarity is greater than to default facial similarity adds in described secret file.
By technique scheme, only need add arbitrary characteristic image to secret file, the file destination being associated with characteristic image in terminal All Files all will be added to secret file, realize the automatic encryption of file.With the file that needs user to find in existing encryption technology to want to encrypt, then file is hidden or the operation of encrypting is compared, simplify operation, the while can have been avoided in existing encryption technology because locating file is not omitted the privacy leakage that file causes comprehensively.
Because characteristic image comprises face-image, therefore while searching the file destination being associated with characteristic image in terminal, need to search the file destination being associated with the face-image of characteristic image, then the file destination finding is encrypted, guarantee that the file destination being associated with characteristic image is all encrypted, avoid omitting file and cause privacy to reveal.Particularly, in the time that terminal is searched the face-image file being associated with face-image in characteristic image, the face-image that terminal is greater than default facial similarity with characteristic image face-image similarity in can the face-image of all storages is set to secret file, search and cryptographic operation without user, realize automatically and encrypting, simplified operation.
Specifically, default facial similarity can free setting.For example: default facial similarity is 90%, while being greater than 90% with characteristic image face similarity in the face-image of terminal storage, directly this face-image is set to secret file; In the face-image of terminal storage, be greater than 60% and while being less than 90% with characteristic image face similarity, whether this face-image is set to secret file to user that can inquiry terminal; Be less than 60% with characteristic image face similarity in the face-image of terminal storage time, this face-image will not be set to secret file.
In technique scheme, preferably, in All Files corresponding to described terminal, find out the file destination being associated with described arbitrary characteristic image, and described file destination is added in described secret file, also comprise: in the time that described terminal receives new face-image, described arbitrary characteristic image and described new face-image are compared; And in the time that the facial similarity of described new face-image and described arbitrary characteristic image is greater than default facial similarity, described new face-image is added in described secret file.
Pass through technique scheme; the face-image that is greater than default facial similarity with characteristic image face similarity in the face-image can terminal receiving is in real time set to secret file; due to terminal in use; may receive at any time face-image; receive that face-image compares with the face-image of characteristic image and automatically encrypt; avoid omitting because of carelessness, better protected user's privacy.Wherein, terminal receives face-image and includes but not limited to: take pictures, copy picture.
In technique scheme, preferably, described characteristic image also comprises label information, and described step 204 also comprises:: the head portrait of contact person of described arbitrary characteristic image and pre-stored is contrasted, to identify contact person corresponding to described arbitrary characteristic image; Obtain the associated person information corresponding with described contact person of pre-stored, and from all contact files of described terminal storage, extract the target contact files being associated with described associated person information, and described target contact files is added in described secret file.
Wherein, label information refers to the information relevant to this characteristic image arranging on characteristic image, specifically comprises the contact name corresponding with face-image in characteristic image, contact person's contact method, as telephone number, microblogging account etc.
Pass through technique scheme; contact head image in characteristic image and terminal is contrasted; identify the contact head image corresponding with characteristic image and obtain the associated person information that this contact head image is corresponding; the target contact files being associated with this contact person in all contact files of terminal storage is set to secret file; not only the face-image being associated with characteristic image is encrypted; more will be encrypted with characteristic image corresponding relationship people's contact files; realize comprehensive encryption, effectively protected user's privacy.
In technique scheme, preferably, in All Files corresponding to described terminal, find out the file destination being associated with described arbitrary characteristic image, and described file destination is added in described secret file, also comprise: obtain the label information in described arbitrary characteristic image, and in all contact files of described terminal storage, extract the target contact files being associated with described label information, and described target contact files is added in described secret file.
Pass through technique scheme; if characteristic image comprises label information; the target contact files being associated with this label information in all contact files of direct terminal storage is set to secret file; not only the face-image being associated with characteristic image is encrypted; more the contact files being associated with the label information of characteristic image is encrypted; realize comprehensive encryption, effectively protected user's privacy.
In technique scheme, preferably, also comprise: according to the order that arranges receiving, the private key corresponding with described secret file is set; In the time receiving the instruction of opening described secret file, prompting user inputs private key; And private key and the private key corresponding with described secret file of the described user's input receiving are mated, and in the time that matching result is consistent, allow to open described secret file, otherwise, do not allow to open described secret file.
By technique scheme, secret file is arranged to private key, and in the time that needs are checked secret file, the private key private key corresponding with described secret file of user's input mated, improve the security of secret file.As comparatively preferably embodiment of one, can private key be set to characteristic image, in the time that the face-image being associated with this characteristic image and/or contact files are set to secret file, all the private key of use characteristic image is as the private key of secret file.If certainly, in order further to improve the security of secret file, also can private key be set respectively to all secret files.
Fig. 3 shows the schematic flow diagram of data guard method according to another embodiment of the invention.
As shown in Figure 3, data guard method according to another embodiment of the invention can be divided into following three concrete scenes.
The image of storing in scene one, terminal is encrypted automatically.
Step 302, arranges private key, then inputs key and enters privacy mode.
Step 304, selects a secret personage picture to be set to secret image.
Step 306, exits privacy mode.
Step 308, identification terminal is stored in everyone object image the face-image similarity with secret image.
Step 310, judge whether the character image of terminal storage and the face-image similarity of secret image are more than or equal to default similarity threshold, as default similarity threshold is set is 90%, judge whether the character image of terminal storage and the face-image similarity of secret image are more than or equal to 90%, be to turn to step 312, otherwise turn to step 314.
Step 312, if the face-image similarity of the character image of terminal storage and secret image is more than or equal to 90%, this character image is set to secret file automatically.
Step 314, if the face-image similarity of the character image of terminal storage and secret image is less than 90%, further judge whether the character image of terminal storage and the face-image similarity of secret image are more than or equal to 60%, are to turn to step 316, otherwise finish.
Step 316, if the face-image similarity of the character image of terminal storage and secret image is less than 90% and be more than or equal to 60%, whether this character image is set to secret file to eject prompting inquiry.
The image that scene two, terminal are taken is in real time encrypted automatically.
Step 302, arranges private key, then inputs key and enters privacy mode.
Step 304, selects a secret personage picture to be set to secret image.
Step 306, exits privacy mode.
Step 318, terminal is taken a photo in real time.
Whether step 320, comprise character image in the photo that sense terminals is taken, and turns to step 310 if comprise, otherwise finish.
Step 310, judges that whether the character image of terminal storage and the face-image similarity of secret image are more than or equal to 90%, are to turn to step 312, otherwise turn to step 314.
Step 312, if the face-image similarity of the character image of terminal storage and secret image is more than or equal to 90%, this character image is set to secret file automatically.
Step 314, if the face-image similarity of the character image of terminal storage and secret image is less than 90%, further judge whether the character image of terminal storage and the face-image similarity of secret image are more than or equal to 60%, are to turn to step 316, otherwise finish.
Step 316, if the face-image similarity of the character image of terminal storage and secret image is less than 90% and be more than or equal to 60%, whether this character image is set to secret file to eject prompting inquiry.
Contact files in scene three, terminal is encrypted automatically.
Step 302, arranges private key, then inputs key and enters privacy mode.
Step 304, selects a secret personage picture to be set to secret image.
Step 306, exits privacy mode.
Step 322, by contact person corresponding to recognition of face secret image, is associated secret image and associated person information.Whether certainly, secret image also may comprise label information, can mate with associated person information by Direct Recognition label information, and label information and associated person information are associated.
Step 324, the related content such as contact name and mail corresponding to picture, information, micro-letter in identification mobile phone.
Step 326, whether the associated person information corresponding with secret image mates with the associated person information in mobile phone, is to turn to step 328, otherwise finishes.
Step 328, the mail that the associated person information corresponding with secret image is associated, information, micro-letter etc. are made as secret file.
More than be described with reference to the accompanying drawings technical scheme of the present invention; due in correlation technique; the encryption of picture in terminal is needed user oneself to go for to want the file of encrypting; the operation of then file being hidden or being encrypted; but because mobile phone in use all may be taken pictures at any time or copy picture; user can not be real-time after generating pictures, be encrypted at once; so often can forget encryption because of carelessness, and can not be encrypted the contact person's corresponding with picture information, mail etc.Therefore; the present invention proposes a kind of new Data Protection Technologies; by technical scheme of the present invention; in the time that arbitrary characteristic image is set to secret file; the file being associated with characteristic image in terminal All Files is all set to secret file; realize the automatic encryption of file, simplified cryptographic operation.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any modification of doing, be equal to replacement, improvement etc., within all should being included in protection scope of the present invention.

Claims (10)

1. a data protecting device, for terminal, is characterized in that, comprising:
Setting unit, according to the order that arranges receiving, adds the arbitrary characteristic image in described terminal in secret file to, and wherein, described characteristic image comprises face-image;
Processing unit finds out the file destination being associated with described arbitrary characteristic image in described terminal, and described file destination is added in described secret file;
Wherein, described processing unit comprises:
Comparing unit, obtains all face-images of storing in described terminal, and every face-image in described arbitrary characteristic image and described all face-images is compared;
The first extraction unit, determine the facial similarity of described every face-image and described arbitrary characteristic image according to the comparative result of described comparing unit, and extracting the face-image that facial similarity is greater than default facial similarity, the face-image that described facial similarity is greater than to default facial similarity adds in described secret file.
2. data protecting device according to claim 1, is characterized in that, described comparing unit also for:
In the time that described terminal receives new face-image, described arbitrary characteristic image and described new face-image are compared; And
Described the first extraction unit also for:
In the time that the facial similarity of described new face-image and described arbitrary characteristic image is greater than default facial similarity, described new face-image is added in described secret file.
3. data protecting device according to claim 1, is characterized in that, described processing unit also comprises:
Recognition unit, contrasts the head portrait of contact person of described arbitrary characteristic image and pre-stored, to identify contact person corresponding to described arbitrary characteristic image;
The second extraction unit, obtain the associated person information corresponding with described contact person of pre-stored, and from all contact files of described terminal storage, extract the target contact files being associated with described associated person information, and described target contact files is added in described secret file.
4. data protecting device according to claim 1, is characterized in that, described characteristic image also comprises label information, and described processing unit also comprises:
The 3rd extraction unit, obtain the label information in described arbitrary characteristic image, and in all contact files of described terminal storage, extract the target contact files being associated with described label information, and described target contact files is added in described secret file.
5. according to the data protecting device described in any one in claim 1 to 4, it is characterized in that, also comprise: key setting unit, according to the order that arranges receiving, arranges private key corresponding to described secret file;
Tip element, in the time receiving the instruction of opening described secret file, prompting user inputs private key; And
Authenticating unit, mates the private key of the described user's input receiving and the described private key of described key setting unit setting, and in the time that matching result is consistent, allows to open described secret file, otherwise, do not allow to open described secret file.
6. a data guard method, for terminal, is characterized in that, comprising:
Setting steps, according to the order that arranges receiving, adds the arbitrary characteristic image in described terminal in secret file to, and wherein, described characteristic image comprises face-image;
Treatment step finds out the file destination being associated with described arbitrary characteristic image in All Files corresponding to described terminal, and described file destination is added in described secret file;
The treating step comprises:
Obtain all face-images of storing in described terminal, every face-image in described arbitrary characteristic image and described all face-images is compared;
Determine the facial similarity of described every face-image and described arbitrary characteristic image according to comparative result, and extracting the face-image that facial similarity is greater than default facial similarity, the face-image that described facial similarity is greater than to default facial similarity adds in described secret file.
7. data guard method according to claim 6, is characterized in that, finds out the file destination being associated with described arbitrary characteristic image in All Files corresponding to described terminal, and described file destination is added in described secret file, also comprises:
In the time that described terminal receives new face-image, described arbitrary characteristic image and described new face-image are compared; And
In the time that the facial similarity of described new face-image and described arbitrary characteristic image is greater than default facial similarity, described new face-image is added in described secret file.
8. data guard method according to claim 6, is characterized in that, finds out the file destination being associated with described arbitrary characteristic image in All Files corresponding to described terminal, and described file destination is added in described secret file, also comprises:
The head portrait of contact person of described arbitrary characteristic image and pre-stored is contrasted, to identify contact person corresponding to described arbitrary characteristic image;
Obtain the associated person information corresponding with described contact person of pre-stored, and from all contact files of described terminal storage, extract the target contact files being associated with described associated person information, and described target contact files is added in described secret file.
9. data guard method according to claim 6, is characterized in that, described characteristic image also comprises label information, and described treatment step also comprises:
Obtain the label information in described arbitrary characteristic image, and in all contact files of described terminal storage, extract the target contact files being associated with described label information, and described target contact files is added in described secret file.
10. according to the data guard method described in any one in claim 6 to 9, it is characterized in that, also comprise:
According to the order that arranges receiving, the private key corresponding with described secret file is set;
In the time receiving the instruction of opening described secret file, prompting user inputs private key; And
Private key and the private key corresponding with described secret file of the described user's input receiving are mated, and in the time that matching result is consistent, allow to open described secret file, otherwise, do not allow to open described secret file.
CN201410069463.3A 2014-02-27 2014-02-27 Data protection device and data protection method Pending CN103824030A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410069463.3A CN103824030A (en) 2014-02-27 2014-02-27 Data protection device and data protection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410069463.3A CN103824030A (en) 2014-02-27 2014-02-27 Data protection device and data protection method

Publications (1)

Publication Number Publication Date
CN103824030A true CN103824030A (en) 2014-05-28

Family

ID=50759085

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410069463.3A Pending CN103824030A (en) 2014-02-27 2014-02-27 Data protection device and data protection method

Country Status (1)

Country Link
CN (1) CN103824030A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104462900A (en) * 2014-12-05 2015-03-25 来安县新元机电设备设计有限公司 Method and system for protecting private pictures in mobile terminal
CN104463017A (en) * 2014-12-22 2015-03-25 联想(北京)有限公司 Information processing method and electronic device
CN105138918A (en) * 2015-09-01 2015-12-09 百度在线网络技术(北京)有限公司 Recognition method and device for secure file
CN105701413A (en) * 2015-12-29 2016-06-22 宇龙计算机通信科技(深圳)有限公司 Method and apparatus for protecting personal key information by intelligent device
WO2016106577A1 (en) * 2014-12-30 2016-07-07 华为技术有限公司 Document protection method and device
CN106919849A (en) * 2015-12-24 2017-07-04 北京三星通信技术研究有限公司 Method for secret protection and device
CN106921791A (en) * 2017-01-25 2017-07-04 北京奇虎科技有限公司 The storage and inspection method of a kind of multimedia file, device and mobile terminal
CN106971117A (en) * 2015-10-15 2017-07-21 富士通株式会社 Investigation apparatus and investigation method
CN107077570A (en) * 2014-09-10 2017-08-18 赛门铁克公司 System and method for detecting the trial that sensitive information is sent by data distribution passage
CN107516027A (en) * 2017-09-25 2017-12-26 联想(北京)有限公司 Image processing method and electronic equipment
CN109033858A (en) * 2016-02-17 2018-12-18 青岛海信移动通信技术股份有限公司 A kind of image guard method and device based on recognition of face

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005293399A (en) * 2004-04-02 2005-10-20 Matsushita Electric Ind Co Ltd Personal authentication method and device
CN101211371A (en) * 2006-12-27 2008-07-02 索尼株式会社 Image searching device, image searching method, image pick-up device and program
CN102067127A (en) * 2008-06-25 2011-05-18 索尼爱立信移动通讯有限公司 Method and apparatus for tagging images and providing notifications when images are tagged
CN103164441A (en) * 2011-12-14 2013-06-19 富泰华工业(深圳)有限公司 Image-classifying electronic device based on facial eigenvalue

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005293399A (en) * 2004-04-02 2005-10-20 Matsushita Electric Ind Co Ltd Personal authentication method and device
CN101211371A (en) * 2006-12-27 2008-07-02 索尼株式会社 Image searching device, image searching method, image pick-up device and program
CN102067127A (en) * 2008-06-25 2011-05-18 索尼爱立信移动通讯有限公司 Method and apparatus for tagging images and providing notifications when images are tagged
CN103164441A (en) * 2011-12-14 2013-06-19 富泰华工业(深圳)有限公司 Image-classifying electronic device based on facial eigenvalue

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107077570A (en) * 2014-09-10 2017-08-18 赛门铁克公司 System and method for detecting the trial that sensitive information is sent by data distribution passage
CN104462900A (en) * 2014-12-05 2015-03-25 来安县新元机电设备设计有限公司 Method and system for protecting private pictures in mobile terminal
CN104463017B (en) * 2014-12-22 2018-02-27 联想(北京)有限公司 A kind of information processing method and electronic equipment
CN104463017A (en) * 2014-12-22 2015-03-25 联想(北京)有限公司 Information processing method and electronic device
WO2016106577A1 (en) * 2014-12-30 2016-07-07 华为技术有限公司 Document protection method and device
CN107005606A (en) * 2014-12-30 2017-08-01 华为技术有限公司 A kind of guard method of file and device
CN105138918A (en) * 2015-09-01 2015-12-09 百度在线网络技术(北京)有限公司 Recognition method and device for secure file
CN105138918B (en) * 2015-09-01 2019-03-29 百度在线网络技术(北京)有限公司 A kind of recognition methods of secure file and device
CN106971117B (en) * 2015-10-15 2020-06-16 富士通株式会社 Investigation apparatus and investigation method
CN106971117A (en) * 2015-10-15 2017-07-21 富士通株式会社 Investigation apparatus and investigation method
CN106919849A (en) * 2015-12-24 2017-07-04 北京三星通信技术研究有限公司 Method for secret protection and device
CN105701413A (en) * 2015-12-29 2016-06-22 宇龙计算机通信科技(深圳)有限公司 Method and apparatus for protecting personal key information by intelligent device
CN109033858A (en) * 2016-02-17 2018-12-18 青岛海信移动通信技术股份有限公司 A kind of image guard method and device based on recognition of face
CN109063497A (en) * 2016-02-17 2018-12-21 青岛海信移动通信技术股份有限公司 A kind of image guard method and device based on recognition of face
CN109145615A (en) * 2016-02-17 2019-01-04 青岛海信移动通信技术股份有限公司 A kind of image guard method and device based on recognition of face
CN109145615B (en) * 2016-02-17 2020-08-25 青岛海信移动通信技术股份有限公司 Image protection method and device based on face recognition
CN109033858B (en) * 2016-02-17 2020-08-25 青岛海信移动通信技术股份有限公司 Image protection method and device based on face recognition
CN109063497B (en) * 2016-02-17 2020-11-24 青岛海信移动通信技术股份有限公司 Image protection method and device based on face recognition
CN106921791A (en) * 2017-01-25 2017-07-04 北京奇虎科技有限公司 The storage and inspection method of a kind of multimedia file, device and mobile terminal
CN106921791B (en) * 2017-01-25 2020-06-09 北京安云世纪科技有限公司 Multimedia file storage and viewing method and device and mobile terminal
CN107516027A (en) * 2017-09-25 2017-12-26 联想(北京)有限公司 Image processing method and electronic equipment

Similar Documents

Publication Publication Date Title
CN103824030A (en) Data protection device and data protection method
CN107169374B (en) Encryption and decryption system and method based on voiceprint and voice recognition technology
CN109040439B (en) Method and device for realizing privacy protection
WO2016061899A1 (en) Fingerprint decryption method and device
CN104200170B (en) The method for secret protection and electronic equipment of a kind of electronic equipment
CN104239815A (en) Electronic document encryption and decryption method and method based on iris identification
CN105260669B (en) The transmission method and Transmission system of photo
US10187383B2 (en) Method of pushing passwords, and pushing system
TW201424324A (en) Method and apparatus of account login
CN103559451A (en) Method and device for protecting and displaying privacy information
WO2016187940A1 (en) Information protecting method, mobile terminal and computer storage medium
WO2017008350A1 (en) Fingerprint storage method and device, and fingerprint recognition method and device
WO2016192165A1 (en) Data encryption method and apparatus
US9800577B2 (en) Method and apparatus for controlling communications terminal and corresponding communications terminal
US9276748B2 (en) Data-encrypting method and decrypting method for a mobile phone
US11405193B2 (en) Encrypted photographing method and system based on fingerprint recognition
WO2017020426A1 (en) Communication method, apparatus and system based on biological feature identification
TWI505126B (en) A method and apparatus to obtain a key
CN106487758B (en) data security signature method, service terminal and private key backup server
CN108073820A (en) Security processing, device and the mobile terminal of data
KR101052294B1 (en) Apparatus and method for contents security
CN106055941A (en) Terminal method and apparatus
KR101305901B1 (en) Method and system for authentication
WO2016119341A1 (en) Method and device for implementing multi-user login mode, and computer storage medium
WO2015196642A1 (en) Data encryption method, decryption method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20140528