CN104866773B - A kind of fingerprint search method, apparatus and terminal - Google Patents

A kind of fingerprint search method, apparatus and terminal Download PDF

Info

Publication number
CN104866773B
CN104866773B CN201510237989.2A CN201510237989A CN104866773B CN 104866773 B CN104866773 B CN 104866773B CN 201510237989 A CN201510237989 A CN 201510237989A CN 104866773 B CN104866773 B CN 104866773B
Authority
CN
China
Prior art keywords
finger print
print information
user
file
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510237989.2A
Other languages
Chinese (zh)
Other versions
CN104866773A (en
Inventor
王世强
杨鑫贵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Coolpad Software Technology Shenzhen Co Ltd
Original Assignee
Coolpad Software Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Coolpad Software Technology Shenzhen Co Ltd filed Critical Coolpad Software Technology Shenzhen Co Ltd
Priority to CN201510237989.2A priority Critical patent/CN104866773B/en
Priority to PCT/CN2015/082984 priority patent/WO2016179889A1/en
Publication of CN104866773A publication Critical patent/CN104866773A/en
Application granted granted Critical
Publication of CN104866773B publication Critical patent/CN104866773B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data

Abstract

The invention discloses a kind of fingerprint search method, apparatus and terminal.Wherein, this method includes:The confidential information to be added in terminal is encrypted based on the finger print information of user, obtains encrypting file;In the encryption file, corresponding encryption file is searched based on different finger print informations.It is poor that technical solution of the present invention solves end message cipher mode security, and the information after encrypting is difficult to the problem of search, realizes the quick encryption and decryption to information in terminal, and being capable of the fast search encryption information wishing to browse to user, Consumer's Experience is improved, improves product competitiveness.

Description

A kind of fingerprint search method, apparatus and terminal
Technical field
The present invention relates to field of mobile communication, more particularly to a kind of fingerprint search method, apparatus and terminal.
Background technology
At present, for terminal (such as:Mobile phone) in information (such as:Short message content, photo, audio, using etc.) carry out The mode of encryption, most of realized by hiding or storing information in private space.This mode can not protect Demonstrate,prove the absolute safety of information.And in real-time information interaction, inconvenient using the information cipher mode of the above, efficiency is low, And security is poor.
Also, after the information in terminal is encrypted, it is typically concealed encrypted after information, or will be after encryption Information be stored in private space, after this, how intelligent search go out encryption after information, compare and be difficult to, influence Consumer's Experience.
For the above mentioned problem in correlation technique, effective solution is not yet proposed at present.
The content of the invention
The problem of poor for end message cipher mode security in correlation technique, and the information after encryption is difficult to search, The invention provides a kind of fingerprint search method, apparatus and terminal, to solve above-mentioned technical problem.
According to an aspect of the present invention, the invention provides a kind of fingerprint search method, wherein, this method includes:Base The confidential information to be added in terminal is encrypted in the finger print information of user, obtains encrypting file;In the encryption file, base Corresponding encryption file is searched in different finger print informations.
Confidential information to be added in terminal is encrypted the finger print information for being preferably based on user, obtains encrypting file, bag Include:The finger print information of different fingers based on user, treats encryption information and is encrypted, and obtains encrypting file;By each finger Finger print information and it is corresponding encryption file corresponding relation, as first index storage arrive database.
Confidential information to be added in terminal is encrypted the finger print information for being preferably based on user, obtains encrypting file, bag Include:Finger print information based on user is treated encryption information and is encrypted, and obtains encrypting file;The finger print information is converted to more Kind character string or a variety of identifying codes, will each encrypt a kind of character string of file association or identifying code;By each character string with it is right The corresponding relation for the encryption file answered, database is arrived as the second index storage;By each identifying code and corresponding encryption text The corresponding relation of part, database is arrived as the 3rd index storage.
Preferably, in the encryption file, corresponding encryption file, bag are searched based on different finger print informations Include:Obtain the finger print information of user's input;Based on first index stored in the database, search and the finger print information Corresponding encryption file.
Preferably, in the encryption file, corresponding encryption file, bag are searched based on different finger print informations Include:Obtain the finger print information of user's input, and the character string changed by the finger print information or identifying code of user's selection;It is based on The second index or the 3rd index stored in the database, searches encryption file corresponding with the finger print information.
According to another aspect of the present invention, present invention also offers a kind of fingerprint search device, wherein, the device includes: Encrypting fingerprint module, for the confidential information to be added in terminal to be encrypted based on the finger print information of user, obtain encrypting file; Fingerprint search module, in the encryption file, corresponding encryption file to be searched based on different finger print informations.
Preferably, the encrypting fingerprint module includes:First ciphering unit, the fingerprint for the different fingers based on user Information, treat encryption information and be encrypted, obtain encrypting file;By the finger print information of each finger and corresponding encryption file Corresponding relation, database is arrived as the first index storage;Or
Second ciphering unit, treat encryption information for the finger print information based on user and be encrypted, obtain encrypting file; The finger print information is converted into various characters string or a variety of identifying codes, will each encrypt a kind of character string of file association or checking Code;Corresponding relation by each character string with corresponding encryption file, database is arrived as the second index storage;By each Identifying code and the corresponding relation of corresponding encryption file, database is arrived as the 3rd index storage.
Preferably, the fingerprint search module includes:First search unit, for obtaining the finger print information of user's input; Based on first index stored in the database, encryption file corresponding with the finger print information is searched;
Preferably, the fingerprint search module includes:Second search unit, for obtaining the finger print information of user's input, And the character string changed by the finger print information or identifying code of user's selection;Based on the second index stored in the database Or the 3rd index, search it is corresponding with the finger print information encrypts file.
According to another aspect of the present invention, present invention also offers a kind of terminal, wherein, the terminal includes:Fingerprint inputs Module, for when receiving the CIPHERING REQUEST of user, there is provided fingerprint inputting interface inputs the fingerprint for encryption for user Information;Wherein, the finger print information of the encryption is used to the confidential information to be added in terminal be encrypted, and obtains encrypting file;Refer to Line search module, for when receiving the fingerprint search request of user, there is provided fingerprint inputting interface is used for so that user inputs The finger print information of search;Wherein, the finger print information for being used to search for is corresponding for being searched in the encryption file Encrypt file.File display module, for showing the encryption file found in display interface.
The present invention has the beneficial effect that:
Technical solution of the present invention solves in correlation technique that end message cipher mode security is poor, and the information after encrypting The problem of being difficult to search, realize the quick encryption and decryption to information in terminal, and can fast search wish what is browsed to user Encryption information, Consumer's Experience is improved, improve product competitiveness.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention, And can be practiced according to the content of specification, and in order to allow above and other objects of the present invention, feature and advantage can Become apparent, below especially exemplified by the embodiment of the present invention.
Brief description of the drawings
Fig. 1 is the flow chart of fingerprint search method according to embodiments of the present invention;
Fig. 2 is encryption and decryption flow chart according to embodiments of the present invention;
Fig. 3 is fingerprint search flow chart according to embodiments of the present invention;
Fig. 4 is the structured flowchart of fingerprint search device according to embodiments of the present invention;
Fig. 5 is the structured flowchart of terminal according to embodiments of the present invention.
Embodiment
End message cipher mode security is poor in correlation technique in order to solve, and the asking of being difficult to search for of the information after encrypting Topic, the invention provides a kind of fingerprint search method, apparatus and terminal, below in conjunction with accompanying drawing and embodiment, enters to the present invention Row is further described.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, this is not limited Invention.
A kind of fingerprint search method is present embodiments provided, this method can realize that Fig. 1 is according to the present invention in end side The flow chart of the fingerprint search method of embodiment, as shown in figure 1, this method comprises the following steps (step S102- step S104):
Step S102, the confidential information to be added in terminal is encrypted based on the finger print information of user, obtains encrypting file;
Step S104, in above-mentioned encryption file, corresponding encryption file is searched based on different finger print informations.
By the present embodiment, solve in correlation technique that end message cipher mode security is poor, and the information after encrypting The problem of being difficult to search, realize the quick encryption and decryption to information in terminal, and can fast search wish what is browsed to user Encryption information, Consumer's Experience is improved, improve product competitiveness.
The process that the information in terminal is encrypted the finger print information using holder terminal below, and utilize and refer to The process that line information carries out fast search to encryption information is introduced.
(1) information to be encrypted is encrypted using finger print information:
When holder terminal want in terminal information (such as:Short message content, photo, audio, using etc.) added When close, the information (or continuously quickly clicking the modes such as the information) by long-press can be set and eject input frame, for selection by the user Whether the information is encrypted, if it is determined that need to encrypt, holder terminal needs to input the fingerprint of oneself in input frame Information, then system encryption information can be treated based on the finger print information and be encrypted.
Specific encryption can be divided into two classes:
1) short message, the encryption of photo and audio category information
The encryption of the category information, by the way of carrying out finger print information and confidential information to be added to merge encryption, fingerprint is believed Cease as encryption and decrypt the key of the information.The encryption file obtained after encryption is deposited with mess code or encrypted state in the terminal Storage.
2) encryption of category information is applied
Encrypt for application, the unlatching operation of the application is encrypted using finger print information.Application after encryption is only The finger print information for having input terminal holder could open application, then carry out associative operation.
(2) decryption of file is encrypted
In the present embodiment, the confidential information to be added in terminal is encrypted based on the finger print information of user, encrypted After file, the above method also includes:After the decoding request of user is received, the decryption finger print information of user's input is obtained; The decryption finger print information is compared with finger print information, determines whether encryption file being decrypted according to comparison result.
When the encryption file obtained after specifically, being encrypted to information is decrypted (such as user needs to browse the information content When), the information (or continuously quickly clicking the modes such as the information) by long-press can be set and eject input frame, system can prompt user The finger print information of input terminal holder in input frame, after inputting correct finger print information, encryption file could be solved It is close, normal browsing information.
Fig. 2 is encryption and decryption flow chart according to embodiments of the present invention, as shown in Fig. 2 the flow includes:
Step S201, determine whether the information in terminal is encrypted according to user's request;If it is, perform step S203, if it is not, then performing step S202.
Step S202, according to normal mode storage information.
Step S203, obtain the finger print information of holder terminal.
Step S204, treat encryption information using finger print information and be encrypted, obtain encrypting file.
Step S205, determined whether to browse encryption file according to user's request;If it is, step S207 is performed, if It is no, then perform step S206.
Step S206, take encryption mode (hiding, mess code or encrypted state etc.) storage.
Step S207, the finger print information of input terminal holder.
Step S208, encryption file is decrypted, user can normal browsing information.
Forgoing describe the process for carrying out encryption and decryption to the information in terminal based on finger print information.In the present embodiment, base The information in terminal, which is encrypted, in finger print information can following at least two implementation,
The first, the finger print information of the different fingers based on user, treats encryption information and is encrypted, and obtains encryption text Part;Store each finger finger print information and it is corresponding encryption file corresponding relation, i.e. by the finger print information of each finger with The corresponding relation of corresponding encryption file, database is arrived as the first index storage.
Second, the finger print information based on user is treated encryption information and is encrypted, and obtains encrypting file;By finger print information Various characters string or a variety of identifying codes are converted to, will each encrypt a kind of character string of file association or identifying code;Store each The corresponding relation of character string or identifying code and corresponding encryption file, i.e. by each character string and corresponding file of encrypting Corresponding relation, database is arrived as the second index storage;Corresponding relation by each identifying code with corresponding encryption file, makees Database is arrived for the 3rd index storage.
Above two cipher mode can select one use, can also the two superposition use.Pass through above two encryption side Formula so that the mode being encrypted based on finger print information is more complicated, and safety coefficient is higher, and cipher round results are more preferable.Certainly, also may be used By the finger print information using the specified finger based on holder terminal be encrypted this most it is simple it is direct in a manner of.It is specific to use Which kind of mode, it is predeterminable also to be changed according to user's request.
Certain type of encryption file is searched for the ease of user, for above two cipher mode, can be set following Two kinds of fingerprint search modes:
The first, encryption document stage is being searched for based on finger print information:Obtain the finger print information of user's input;Based on storage The finger print information of each finger and the corresponding relation (stored in database first index) of corresponding encryption file, lookup It is corresponding with the finger print information to encrypt file.
For example, the finger print information of holder terminal thumb is used to encrypt the short message in mobile phone, the finger print information of forefinger is used In encrypting the picture in mobile phone, the finger print information of middle finger is used to encrypt the video in mobile phone.So need to search for encryption in user During rear video, the finger print information that refers in need to only being inputted in input frame can show list of videos in mobile phone interface.
Second, encryption document stage is being searched for based on finger print information:Obtain the finger print information of user's input, and user The character string changed by the finger print information or identifying code of selection;Each character string or identifying code based on storage with it is corresponding The corresponding relation (the second index or the 3rd index that are stored in database) of file is encrypted, is searched corresponding with the finger print information Encrypt file.
For example, the finger print information of the specified finger of holder terminal is converted into three kinds of character strings, by the first character string It is added in the file name of the encryption file formed after SMS encryption, is formed after second of character string is added into image ciphering Encryption file file name in, the third character string is added to formed after video-encryption encryption file file name In, so, when user needs to search for the video after encrypting, the fingerprint letter of above-mentioned specified finger need to be only inputted in input frame Breath, and the third character string is selected, list of videos can be shown in mobile phone interface.
Above two fingerprint search mode can select one use, can also the two superposition use.Referred to by above two Line way of search, the encryption information that fast search wishes to browse to user is realized, Consumer's Experience is improved, it is competing to improve product Strive power.User can update above-mentioned index and database according to self-demand dynamic, so as to improve Consumer's Experience.
It is of course also possible to use relatively simple and straightforward mode, i.e. by the file of the encryption file formed after image ciphering " jpg " is added in title, " rmvb " will be added in the file name of the encryption file formed after video-encryption.So, in user When needing the video after search encryption, the finger print information of above-mentioned specified finger only need to be inputted in input frame, and input keyword " rmvb ", list of videos can be shown in mobile phone interface.
Fig. 3 is fingerprint search flow chart according to embodiments of the present invention, as shown in figure 3, the flow includes:
Step S301, clicks on " fast search encryption file " button on mobile phone desktop, and ejection " fingerprint input " button is (or defeated Enter frame).
Step S302, long-press " fingerprint input " button (or input frame), to input the finger print information of user.
Step S303, encryption file is quickly shown with tabular form on mobile phone desktop.
Step S304, click on the encryption file that user wants to read and browsed.
Corresponding to the fingerprint search method of above-described embodiment introduction, a kind of fingerprint search device is present embodiments provided, should Device can be arranged on end side, to realize above-described embodiment.Fig. 4 is fingerprint search device according to embodiments of the present invention Structured flowchart, as shown in figure 4, the device includes:Encrypting fingerprint module 10 and fingerprint search module 12.The structure is carried out below It is discussed in detail.
Encrypting fingerprint module 10, for the confidential information to be added in terminal to be encrypted based on the finger print information of user, obtain To encryption file;
Fingerprint search module 12, in file is encrypted, corresponding encryption to be searched based on different finger print informations File.
By the present embodiment, solve in correlation technique that end message cipher mode security is poor, and the information after encrypting The problem of being difficult to search, realize the quick encryption and decryption to information in terminal, and can fast search wish what is browsed to user Encryption information, Consumer's Experience is improved, improve product competitiveness.
The information in terminal, which is encrypted, based on finger print information can at least two implementations, i.e.,:Above-mentioned fingerprint Encrypting module 10 includes:
First ciphering unit, for the finger print information of the different fingers based on user, treat encryption information and be encrypted, obtain To encryption file;Store the finger print information of each finger and the corresponding relation of corresponding encryption file, i.e. by the finger of each finger Line information and the corresponding relation of corresponding encryption file, database is arrived as the first index storage;
Or
Second ciphering unit, treat encryption information for the finger print information based on user and be encrypted, obtain encrypting file; Finger print information is converted into various characters string or a variety of identifying codes, will each encrypt a kind of character string of file association or identifying code; Store each character string or identifying code and it is corresponding encryption file corresponding relation, i.e. by each character string with it is corresponding The corresponding relation of file is encrypted, database is arrived as the second index storage, by each identifying code and corresponding encryption file Corresponding relation, database is arrived as the 3rd index storage.
For above two cipher mode, following two kinds of fingerprint search modes can be set, i.e.,:Above-mentioned fingerprint search module 12 include:
First search unit, for obtaining the finger print information of user's input;The finger print information of each finger based on storage With the corresponding relation (the first index stored in database) of corresponding encryption file, add corresponding with the finger print information is searched Ciphertext part;
Or
Second search unit, the finger print information inputted for obtaining user, and user's selection are turned by the finger print information The character string or identifying code changed;Each character string or identifying code and the corresponding corresponding relation for encrypting file based on storage (the second index or the 3rd index that are stored in database), searches encryption file corresponding with the finger print information.
Corresponding to the fingerprint search method of above-described embodiment introduction, a kind of terminal is present embodiments provided, Fig. 5 is according to this The structured flowchart of the terminal of inventive embodiments, as shown in figure 5, the terminal includes:Fingerprint input module 20, fingerprint search module 22 With file display module 24.The structure is described in detail below.
Fingerprint input module 20, for when receiving the CIPHERING REQUEST of user, there is provided fingerprint inputting interface is for user Input the finger print information for encryption;Wherein, the finger print information of encryption is used to the confidential information to be added in terminal be encrypted, and obtains To encryption file;
Fingerprint search module 22, for receive user fingerprint search ask when, there is provided fingerprint inputting interface for User inputs the finger print information for search;Wherein, it is right with it to be used for the lookup in file is encrypted for the finger print information for search The encryption file answered.
File display module 24, for showing the encryption file found in display interface.
By the present embodiment, solve in correlation technique that end message cipher mode security is poor, and the information after encrypting The problem of being difficult to search, realize the quick encryption and decryption to information in terminal, and can fast search wish what is browsed to user Encryption information, Consumer's Experience is improved, improve product competitiveness.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, the change or replacement that can readily occur in, all should It is included within the scope of the present invention.Therefore, protection scope of the present invention should using the scope of the claims as It is accurate.

Claims (7)

  1. A kind of 1. fingerprint search method, it is characterised in that methods described includes:
    Confidential information to be added in terminal is encrypted the finger print information of different fingers based on user, obtains encrypting file;
    In the encryption file, the finger print information of the different fingers based on user searches corresponding encryption file;
    Wherein, the confidential information to be added in terminal is encrypted the finger print information of the different fingers based on user, obtains encryption text Part, including:
    The finger print information is converted into various characters string or a variety of identifying codes, will each encrypt a kind of character string of file association or Identifying code;Corresponding relation by each character string with corresponding encryption file, database is arrived as the second index storage;Will be every A kind of identifying code and the corresponding relation of corresponding encryption file, database is arrived as the 3rd index storage;
    The finger print information of different fingers based on user searches corresponding encryption file, including:
    Obtain the finger print information of user's input, and the character string changed by the finger print information or identifying code of user's selection;Base The second index or the 3rd index stored in the database, searches encryption file corresponding with the finger print information.
  2. 2. the method as described in claim 1, it is characterised in that the finger print information of the different fingers based on user is in terminal Confidential information to be added is encrypted, and obtains encrypting file, including:
    Corresponding relation by the finger print information of each finger with corresponding encryption file, database is arrived as the first index storage.
  3. 3. method as claimed in claim 2, it is characterised in that in the encryption file, the different fingers based on user Finger print information searches corresponding encryption file, including:
    Obtain the finger print information of user's input;
    Based on first index stored in the database, encryption file corresponding with the finger print information is searched.
  4. 4. a kind of fingerprint search device, it is characterised in that described device includes:
    Encrypting fingerprint module, the finger print information for the different fingers based on user add to the confidential information to be added in terminal It is close, obtain encrypting file;
    Fingerprint search module, in the encryption file, the finger print information lookup of the different fingers based on user to be right with it The encryption file answered;
    Wherein, the encrypting fingerprint module includes:
    Second ciphering unit, for the finger print information to be converted into various characters string or a variety of identifying codes, it will each encrypt text Part associates a kind of character string or identifying code;Corresponding relation by each character string with corresponding encryption file, as the second rope Draw storage and arrive database;Corresponding relation by each identifying code with corresponding encryption file, as the 3rd index storage to number According to storehouse;
    The fingerprint search module includes:
    Second search unit, for obtaining the finger print information of user's input, and user's selection is changed by the finger print information Character string or identifying code;Based on the second index or the 3rd index stored in the database, search corresponding with the finger print information Encryption file.
  5. 5. device as claimed in claim 4, it is characterised in that the encrypting fingerprint module also includes:
    First ciphering unit, for the corresponding relation by the finger print information of each finger with corresponding encryption file, as first Database is arrived in index storage.
  6. 6. device as claimed in claim 5, it is characterised in that the fingerprint search module also includes:
    First search unit, for obtaining the finger print information of user's input;Based on first rope stored in the database Draw, search encryption file corresponding with the finger print information.
  7. 7. a kind of terminal, it is characterised in that the terminal includes:
    Fingerprint input module, for when receiving the CIPHERING REQUEST of user, there is provided fingerprint inputting interface is used so that user inputs Various characters string or a variety of identifying codes are converted in the finger print information of the different fingers of encryption, and by the finger print information, will be every It is individual to encrypt a kind of character string of file association or identifying code;Corresponding relation by each character string with corresponding encryption file, makees Database is arrived for the second index storage;Corresponding relation by each identifying code with corresponding encryption file, as the 3rd index Store database;Wherein, the finger print information of the different fingers of the encryption is used to add the confidential information to be added in terminal It is close, obtain encrypting file;
    Fingerprint search module, for when receiving the fingerprint search request of user, there is provided fingerprint inputting interface is defeated for user Enter the finger print information of the different fingers for search, and obtain the character string changed by the finger print information or the checking of user's selection Code, based on the second index or the 3rd index stored in the database, search encryption file corresponding with the finger print information;Its In, the finger print information of the different fingers for being used to search for is used in the encryption file search corresponding encryption text Part;
    File display module, for showing the encryption file found in display interface.
CN201510237989.2A 2015-05-11 2015-05-11 A kind of fingerprint search method, apparatus and terminal Active CN104866773B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510237989.2A CN104866773B (en) 2015-05-11 2015-05-11 A kind of fingerprint search method, apparatus and terminal
PCT/CN2015/082984 WO2016179889A1 (en) 2015-05-11 2015-06-30 Fingerprint search method and apparatus, and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510237989.2A CN104866773B (en) 2015-05-11 2015-05-11 A kind of fingerprint search method, apparatus and terminal

Publications (2)

Publication Number Publication Date
CN104866773A CN104866773A (en) 2015-08-26
CN104866773B true CN104866773B (en) 2018-04-10

Family

ID=53912595

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510237989.2A Active CN104866773B (en) 2015-05-11 2015-05-11 A kind of fingerprint search method, apparatus and terminal

Country Status (2)

Country Link
CN (1) CN104866773B (en)
WO (1) WO2016179889A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105677788B (en) * 2015-12-30 2019-12-27 Oppo广东移动通信有限公司 File searching method and user terminal
CN106650368A (en) * 2016-10-12 2017-05-10 珠海格力电器股份有限公司 Encrypted information display method and apparatus
CN107784232B (en) * 2017-10-18 2020-05-05 维沃移动通信有限公司 Picture processing method and mobile terminal
CN111353060B (en) * 2020-03-16 2020-11-06 黄华 Block chain-based cloud computing big data picture storage method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101827148A (en) * 2010-05-18 2010-09-08 深圳桑菲消费通信有限公司 Fingerprint identification system applied to mobile phone and operating method thereof
CN103186761A (en) * 2011-12-28 2013-07-03 宇龙计算机通信科技(深圳)有限公司 Fingerprint encryption method of private file and communication terminal
CN104182675A (en) * 2014-08-26 2014-12-03 上海斐讯数据通信技术有限公司 Mobile equipment terminal and application hiding system and application hiding and starting method thereof

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101231216B1 (en) * 2012-07-13 2013-02-07 주식회사 베프스 Removable storage device with fingerprint recognition and control method thereof
CN103236930A (en) * 2013-04-27 2013-08-07 深圳市中兴移动通信有限公司 Data encryption method and system
CN103699847A (en) * 2013-11-29 2014-04-02 上海合合信息科技发展有限公司 Fingerprint encryption method and device, and encrypted shooting method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101827148A (en) * 2010-05-18 2010-09-08 深圳桑菲消费通信有限公司 Fingerprint identification system applied to mobile phone and operating method thereof
CN103186761A (en) * 2011-12-28 2013-07-03 宇龙计算机通信科技(深圳)有限公司 Fingerprint encryption method of private file and communication terminal
CN104182675A (en) * 2014-08-26 2014-12-03 上海斐讯数据通信技术有限公司 Mobile equipment terminal and application hiding system and application hiding and starting method thereof

Also Published As

Publication number Publication date
WO2016179889A1 (en) 2016-11-17
CN104866773A (en) 2015-08-26

Similar Documents

Publication Publication Date Title
US10013574B2 (en) Method and apparatus for secure storage and retrieval of encrypted files in public cloud-computing platforms
EP3220573B1 (en) Method and system for controlling encryption of information and analyzing information as well as terminal
CN106850220A (en) Data ciphering method, data decryption method and device
CN110347723A (en) A kind of data query method, system and electronic equipment and storage medium
CN104866773B (en) A kind of fingerprint search method, apparatus and terminal
CN103914541B (en) The method and device of information search
US10461934B2 (en) Authentication-based message display method and communication terminal thereof
CN112287372B (en) Method and apparatus for protecting clipboard privacy
US8769302B2 (en) Encrypting data and characterization data that describes valid contents of a column
US9641328B1 (en) Generation of public-private key pairs
EP3039811B1 (en) Method, content owner device, computer program, and computer program product for distributing content items to authorized users
CN111984175B (en) Audio information processing method and device
CN112567441A (en) Information processing system, information processing method, and information processing apparatus
JP2000011001A (en) Retrieving device and medium stored with control program for retrieving device
CN105243331A (en) Encryption device and encryption method, and decryption device and decryption method
CN106570405A (en) Method and apparatus for performing encryption/decryption on text in input method
CN106203141A (en) The data processing method of a kind of application and device
CN104978536B (en) A kind of secret protection cloud image management system
US8347113B2 (en) System and method for encrypting an electronic file in a mobile electronic device
CN102768671B (en) File processing method and system
TWI406204B (en) Design method of cipher and picture cipher system
CN114844853A (en) Information processing method, information processing apparatus, electronic device, and medium
CN110830252B (en) Data encryption method, device, equipment and storage medium
CN112270004B (en) Content encryption method and device and electronic equipment
CN104994160B (en) Document transmission method and relevant apparatus and Transmission system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant