CN105046127A - Encryption and decryption method and apparatus - Google Patents

Encryption and decryption method and apparatus Download PDF

Info

Publication number
CN105046127A
CN105046127A CN201510275138.7A CN201510275138A CN105046127A CN 105046127 A CN105046127 A CN 105046127A CN 201510275138 A CN201510275138 A CN 201510275138A CN 105046127 A CN105046127 A CN 105046127A
Authority
CN
China
Prior art keywords
biometric information
user
encrypted
terminal
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510275138.7A
Other languages
Chinese (zh)
Inventor
朱印
陈巧卓
李文昕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Technology Co Ltd
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201510275138.7A priority Critical patent/CN105046127A/en
Publication of CN105046127A publication Critical patent/CN105046127A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The present disclosure relates to an encryption and decryption method and apparatus and pertains to the technical field of computers. The method comprises: when receiving an encryption setting instruction, prompting users to input cryptographic information; then, receiving first biometric information input by a first user; identifying and recording the first biometric information; receiving second biometric information input by a second user; identifying and recording the second biometric information; and finally, encrypting a terminal by using the first biometric information and the second biometric information. By encrypting the terminal by using dual biometric information of two users, the security of the terminal apparatus is greatly improved.

Description

Encryption and decryption implementation method and device
Technical field
The disclosure relates to field of computer technology, particularly a kind of encryption and decryption implementation method and device.
Background technology
Along with the development of science and technology, electronic equipment not only as the carrier that multi-medium data is shown, also for storing and the carrier of various application program as wireless telecommunications, data.So, in order to ensure the use safety of electronic device information, need to carry out respective encrypted operation to real electronic equipment.
Summary of the invention
Disclosure embodiment provides a kind of encryption and decryption implementation method and device.Described technical scheme is as follows:
According to the first aspect of disclosure embodiment, provide a kind of encryption implementation method, for terminal, the method comprises:
When receiving encryption and arranging instruction, prompting user inputs encrypted message;
Receive the first biometric information of first user input, identify and record described first biometric information;
Receive the second biometric information of second user's input, identify and record described second biometric information;
Described first biometric information and the second biometric information is adopted to be encrypted described terminal.
In one embodiment, described first user and described second user are same users, and described first biometric information and the second biometric information are different biometric information.
In one embodiment, described first user and described second user are different users.
In one embodiment, described first biometric information of described employing and the second biometric information are encrypted described terminal, can comprise:
Described first biometric information and the second biometric information is adopted to be encrypted described terminal; Or,
Described first biometric information and the second biometric information is adopted to be encrypted the application that described terminal is installed; Or,
Adopt described first biometric information and the second biometric information in described terminal application is installed function be encrypted.
In one embodiment, receive the second biometric information of second user's input, to identify and after recording described second biometric information, described method also comprises:
Receive the 3rd biometric information of the 3rd user's input, identify and record the described 3rd biological raw other information;
Described first biometric information, the second biometric information and the 3rd biometric information is adopted to be encrypted described terminal.
According to the second aspect of disclosure embodiment, provide a kind of deciphering implementation method, described method can comprise:
When receiving the instruction of the function that opens a terminal, determine that whether described termination function is encrypted;
When described termination function is encrypted, prompting user inputs encrypted message;
Receive the first biometric information of first user input, and the second biometric information of the second user input;
Identify the second biometric information of the first biometric information that described first user inputs and the second user input, whether consistent with the first biometric information prestored and the second biometric information;
When above-mentioned recognition result is consistent, discharges described termination function, use for user.
According to the third aspect of disclosure embodiment, provide a kind of encryption implement device, for terminal, described device comprises:
Information reminding module, is configured to when receiving encryption and arranging instruction, and prompting user inputs encrypted message;
First information receiver module, is configured to the first biometric information receiving first user input, identifies and record described first biometric information;
Second information receiving module, is configured to the second biometric information of reception second user input, identifies and record described second biometric information;
Encrypting module, is configured to adopt described first biometric information and the second biometric information to be encrypted described terminal.
In one embodiment, described encrypting module, is specifically configured to adopt described first biometric information and the second biometric information to be encrypted described terminal; Or, adopt described first biometric information and the second biometric information to be encrypted the application that described terminal is installed; Or, adopt described first biometric information and the second biometric information in described terminal application is installed function be encrypted.
In one embodiment, described device also comprises: the 3rd information receiving module, is configured to the 3rd biometric information of reception the 3rd user input, identifies and records the described 3rd biological raw other information;
Correspondingly, described encrypting module, is configured to adopt described first biometric information, the second biometric information and the 3rd biometric information to be encrypted described terminal.
According to the fourth aspect of disclosure embodiment, provide a kind of deciphering implement device, for terminal, described device comprises:
Determination module, is configured to receive when opening a terminal the instruction of function, determines that whether described termination function is encrypted;
Information reminding module, is configured to when described termination function is encrypted, and prompting user inputs encrypted message;
MIM message input module, is configured to the first biometric information receiving first user input, and the second biometric information of the second user input;
Whether information identification module, is configured to the second biometric information of the first biometric information and the second user input identifying that described first user inputs, consistent with the first biometric information prestored and the second biometric information;
Deciphering module, is configured to, when above-mentioned recognition result is consistent, discharges described termination function, use for user.
According to the 5th aspect of disclosure embodiment, a kind of deciphering implement device is provided, comprises:
Processor;
For storing the storer of the executable instruction of described processor;
Wherein, described processor is configured to:
When receiving encryption and arranging instruction, prompting user inputs encrypted message;
Receive the first biometric information of first user input, identify and record described first biometric information;
Receive the second biometric information of second user's input, identify and record described second biometric information;
Described first biometric information and the second biometric information is adopted to be encrypted described terminal.
According to the 6th aspect of disclosure embodiment, a kind of deciphering implement device is provided, comprises:
Processor;
For storing the storer of the executable instruction of described processor;
Wherein, described processor is configured to:
When receiving the instruction of the function that opens a terminal, determine that whether described termination function is encrypted;
When described termination function is encrypted, prompting user inputs encrypted message;
Receive the first biometric information of first user input, and the second biometric information of the second user input;
Identify the second biometric information of the first biometric information that described first user inputs and the second user input, whether consistent with the first biometric information prestored and the second biometric information;
When above-mentioned recognition result is consistent, discharges described termination function, use for user.
The technical scheme that disclosure embodiment provides can comprise following beneficial effect:
When receiving encryption and arranging instruction, prompting user inputs encrypted message; Afterwards, receive the first biometric information of first user input, identify and record described first biometric information, and receive the second biometric information of second user's input, identify and record described second biometric information, finally adopting described first biometric information and the second biometric information to be encrypted described terminal.Adopt the two biological information of dual user to be encrypted terminal, enhance the security of terminal device greatly.
Should be understood that, it is only exemplary and explanatory that above general description and details hereinafter describe, and can not limit the disclosure.
Accompanying drawing explanation
Accompanying drawing to be herein merged in instructions and to form the part of this instructions, shows and meets embodiment of the present disclosure, and is used from instructions one and explains principle of the present disclosure.
Fig. 1 is the process flow diagram of a kind of encryption implementation method according to an exemplary embodiment;
Figure 1A and 1B is a kind of user interface map illustrated embodiment illustrated in fig. 1;
Fig. 2 is the process flow diagram of a kind of encryption implementation method according to an exemplary embodiment;
Fig. 2 A and 2B is a kind of user interface map illustrated embodiment illustrated in fig. 2;
Fig. 3 is a kind of process flow diagram deciphering implementation method according to an exemplary embodiment;
Fig. 3 A and 3B is a kind of user interface map illustrated embodiment illustrated in fig. 3;
Fig. 4 is a kind of process flow diagram deciphering implementation method according to an exemplary embodiment;
Fig. 4 A and 4B is a kind of user interface map illustrated embodiment illustrated in fig. 4;
Fig. 5 is a kind of block diagram encrypting implement device according to an exemplary embodiment;
Fig. 6 is a kind of block diagram encrypting implement device according to another exemplary embodiment;
A kind of block diagram of deciphering implement device of Fig. 7 according to an exemplary embodiment;
Fig. 8 is the block diagram of a kind of encryption and decryption implement device according to an exemplary embodiment.
By above-mentioned accompanying drawing, illustrate the embodiment that the disclosure is clear and definite more detailed description will be had hereinafter.These accompanying drawings and text description be not in order to limited by any mode the disclosure design scope, but by reference to specific embodiment for those skilled in the art illustrate concept of the present disclosure.
Embodiment
Here will be described exemplary embodiment in detail, its sample table shows in the accompanying drawings.When description below relates to accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawing represents same or analogous key element.Embodiment described in following exemplary embodiment does not represent all embodiments consistent with the disclosure.On the contrary, they only with as in appended claims describe in detail, the example of apparatus and method that aspects more of the present disclosure are consistent.
Fig. 1 is the process flow diagram of a kind of encryption implementation method according to an exemplary embodiment, the present embodiment is applied in terminal with this encryption implementation method and illustrates, wherein, this terminal can be the mobile device such as mobile phone, panel computer, and this encryption implementation method can comprise following several step:
In a step 101, when receiving encryption and arranging instruction, prompting user inputs encrypted message;
In a step 102, receive the first biometric information of first user input, identify and record described first biometric information;
In step 103, receive the second biometric information of second user's input, identify and record described second biometric information;
At step 104, described first biometric information and the second biometric information is adopted to be encrypted described terminal.
In one embodiment, above-mentioned biometric information can be the information such as finger print information, facial information or vocal print, and disclosure embodiment does not do too much restriction to this.
In one embodiment, above-mentioned first user and the second user can be same users, so, in this case, first biometric information and the second biometric information are different biometric information, can be such as that (the first biometric information is the fingerprint of middle finger to different biometric information of the same type, second biometric information is the fingerprint of forefinger), it can be dissimilar biometric information (the first biometric information can be finger print information, and the second biometric information can be voiceprint).
As illustrated by figures 1 a and 1b, disclosure embodiment can adopt the different biometric information of same user to be encrypted same function.Such as, this first user and second is with being user C per family, then the implementation procedure of technique scheme is: terminal device can point out user C to input its first biometric information, as the finger print information of the middle finger of user C, after the finger print information success of typing user C middle finger, user can be pointed out to input its second biometric information, as the finger print information of user C forefinger, after the finger print information success of typing user C forefinger, the middle finger of user C and the finger print information of forefinger is adopted to be encrypted termination function.
In one embodiment, above-mentioned first user and the second user can be different users, namely adopt the biometric information of different user to be encrypted same function.
Such as, as illustrated by figures 1 a and 1b, first user is user A, second user is user B, then the implementation procedure of technique scheme is: terminal device can point out user A to input its biometric information, as the finger print information of user A, after the finger print information success of terminal typing user A, user B can be pointed out to input its biometric information, as the finger print information of user B, after the finger print information success of terminal typing user B, the finger print information of user A and the finger print information of user B is adopted to be encrypted terminal device.
In one embodiment, the first biometric information and the second biometric information can be adopted to be encrypted described terminal; Or, adopt described first biometric information and the second biometric information to be encrypted the application that described terminal is installed; Or, adopt described first biometric information and the second biometric information in described terminal application is installed function be encrypted.
In sum, the encryption implementation method that disclosure embodiment provides, when receiving encryption and arranging instruction, prompting user inputs encrypted message; Afterwards, receive the first biometric information of first user input, identify and record described first biometric information, and receive the second biometric information of second user's input, identify and record described second biometric information, finally adopting described first biometric information and the second biometric information to be encrypted described terminal.Adopt the two biological information of dual user to be encrypted terminal, enhance the security of terminal device greatly.
Below in conjunction with concrete application example, the technical program and effect thereof are described:
Adopt the cipher mode described by the technical program, couple can be encrypted the application with payment function, so when this application is used, the authorized party obtaining couple is just needed to use, add on the one hand encrypt the security of application, another aspect can make the service condition of this application of couple's managed together.
In one embodiment, adopt the encryption implementation method described in the technical program, be to adopt the biometric information of two users to be encrypted same termination function in specific implementation, the biometric information of two or more user (as three users or four users) also can be adopted to be encrypted same termination function.Below in conjunction with specific embodiment, be encrypted adopting multi-user's biometric information to be described the mode that termination function is encrypted to adopt the biometric information of three users to same termination function:
Fig. 2 is the process flow diagram of a kind of encryption implementation method according to another exemplary embodiment, the present embodiment is applied in terminal with this encryption implementation method and illustrates, wherein, this terminal device can be the mobile terminal such as mobile phone, panel computer, and this mobile terminal device has bio-identification module, such as, have fingerprint identification module, facial recognition modules or/and voiceprint identification module, this encryption implementation method can comprise following several step:
In step 201, when receiving encryption and arranging instruction, prompting user inputs encrypted message;
When receiving user for terminal, certain application that terminal is installed, or when in application, the encryption of a certain function arranges instruction, display encryption arranges the page, inputs encrypted message to point out user.
As shown in Figure 1A, such as, when user will be encrypted the application A that terminal device is installed, just can be entered by Operation system setting and the encryption of application A is arranged, terminal can show password is set the page is set, prompting user inputs encrypted message.
In step 202., receive the first biometric information of first user input, identify and record described first biometric information;
The present embodiment is when specific implementation, and above-mentioned first biometric information can be the finger print information, facial information, voiceprint etc. of user, and the present embodiment is to this and be not specifically limited.
As shown in Figure 1A, terminal shows password to user and arranges the page, carry and state first user and input the first biometric information, the corresponding biometric information of typing in the bio-identification module that first user can provide in terminal, such as, by arranging fingerprint identification module typing finger print information in terminal, by the camera module typing facial information of terminal device, or pass through the recording module typing acoustic information of terminal device.
In step 203, receive the second biometric information of second user's input, identify and record described second biometric information;
As shown in Figure 2 A, in step 201, terminal identified and have recorded first biometric information success after, the second user can be pointed out to input the second biometric information, as shown in Figure 2 B, second user can input the second biometric information by corresponding bio-identification module, and terminal can identify and record described second biometric information.
In step 204, receive the 3rd biometric information of the 3rd user's input, identify and record the described 3rd biological raw other information;
As shown in Figure 2 B, after the success of terminal recognition typing second biological information, the 3rd user is pointed out to input the 3rd biometric information, as shown in Figure 2 B, 3rd user can by corresponding bio-identification module input the 3rd biometric information, and terminal can identify and record described 3rd biometric information.
In one embodiment, described first user, described second user and the 3rd user can be same user, and described first biometric information, second biometric information is different biometric information from the 3rd biometric information, such as, this first user, second user and the 3rd is with being user C per family, then the implementation procedure of technique scheme is: terminal device can point out user C to input its first biometric information, as the finger print information of the middle finger of user C, after the finger print information success of typing user C middle finger, user can be pointed out to input its second biometric information, as the finger print information of user C forefinger, and after the finger print information success of the forefinger of typing user C, user C can be pointed out to input its 3rd biometric information, as the voiceprint of user C.
In one embodiment, above-mentioned first user, the second user and the 3rd user can be different users, namely adopt the biometric information of different user to be encrypted same function.Such as, first user is user A, second user is user B, 3rd user is user D, then the implementation procedure of technique scheme is: terminal device can point out user A to input its biometric information, as the finger print information of user A, after the finger print information success of terminal typing user A, user B can be pointed out to input its biometric information, as the finger print information of user B, after the finger print information of terminal device typing user B, user D can be pointed out to input its biometric information, as the face recognition information of user D.
In step 205, described first biometric information, the second biometric information and the 3rd biometric information is adopted to be encrypted described terminal.
In one embodiment, described first biometric information, the second biometric information and the 3rd biometric information can be adopted to be encrypted described terminal, or the application that described terminal is installed is encrypted, or a certain function in application is encrypted.
The biological information of the employing multi-user that disclosure embodiment provides is encrypted terminal, enhances the security of terminal device greatly.。
Correspondingly, the disclosure embodiment still provides a kind of method of deciphering realization, Fig. 3 is a kind of process flow diagram deciphering implementation method according to an exemplary embodiment, the present embodiment is applied in terminal with this deciphering implementation method and illustrates, wherein, this terminal can be the mobile device such as mobile phone, panel computer, and this mobile terminal device has bio-identification module, such as, have fingerprint identification module, facial recognition modules or/and voiceprint identification module, this deciphering implementation method can comprise following several step:
In step 301, when receiving the instruction of the function that opens a terminal, determine that whether described termination function is encrypted;
In step 302, when described termination function is encrypted, prompting user inputs encrypted message;
As shown in Figure 3A, when user will open and use a certain encrypted termination function, the display Password Input page, prompting user inputs corresponding encrypted message.
In step 303, receive the first biometric information of first user input, and the second biometric information of the second user input;
In step 304, identify the second biometric information of the first biometric information that described first user inputs and the second user input, whether consistent with the first biometric information prestored and the second biometric information;
In step 305, when above-mentioned recognition result is consistent, discharges described termination function, use for user.
In one embodiment, in this decryption method implementation procedure, also can identify the first biometric information of first user input and the second biometric information of the second user input respectively by received in-order, as shown in figures 3 a and 3b, prompting first user inputs the first biometric information, and identify that whether this first biometric information is consistent with the first biometric information prestored, the second user is pointed out to input the second biometric information when consistent, if inconsistent, then first user is pointed out again to input the first biometric information.Whether the second biometric information of terminal recognition second user input is consistent with the second biometric information prestored, when consistent, discharge the termination function encrypted, use for user, when inconsistent, then the second user is pointed out again to input the second biometric information.
In one embodiment, in this decryption method implementation procedure, can require that first user and the second user input the first biometric information and the second biometric information simultaneously, after the first biometric information receiving first user and the second user input and the second biometric information, first biometric information and second biometric information of simultaneous verification input whether with the first biometric information prestored and the second biometric information consistent, when consistent, decryption terminal function, use for user, in the case of inconsistencies, require first user and the second user inputs the first biometric information again and the second biometric information is verified.
In one embodiment, the number of times that above-mentioned first user or the second user input biometric information is again limited in the given time, such as, only can input three times in one minute.The number of times inputting the first biometric information when first user reach three times still inconsistent with the first biometric information of pre-stored, then do not allow the second user to input biometric information, unlock this ciphering terminal function failure.The number of times inputting the second biometric information as the second user reach three times still inconsistent with the second biometric information prestored, then unlock this ciphering terminal function failure.Need again be decrypted flow process after predetermined amount of time to be decrypted.
In one embodiment, above-mentioned biometric information can be the information such as finger print information, facial information or vocal print, and disclosure embodiment does not do too much restriction to this.
In one embodiment, above-mentioned first user and the second user can be same users, and so, in this case, the first biometric information and the second biometric information are different biometric information.
In one embodiment, above-mentioned first user and the second user can be different users.
In sum, the deciphering implementation method that disclosure embodiment provides, receives the first biometric information of first user input, and the second biometric information of the second user input; Identify the second biometric information of the first biometric information that described first user inputs and the second user input, whether consistent with the first biometric information prestored and the second biometric information; When above-mentioned recognition result is consistent, discharges described termination function, use for user.Adopt the two biological information of dual user to be decrypted terminal, enhance the security of terminal device greatly.
In one embodiment, if described termination function adopts the biometric information of two or more user to be encrypted, so correspondingly, just need to adopt the biometric feature of two or more user to be decrypted termination function, deciphering realization flow when below to adopt the biometric information of three users to be encrypted termination function is described, specifically as shown in Figure 4, following operation steps is comprised:
In step 401, when receiving the instruction of the function that opens a terminal, determine that whether described termination function is encrypted;
In step 402, when described termination function is encrypted, prompting user inputs encrypted message;
As shown in fig. 4 a and 4b, when user will open and use a certain encrypted termination function, the display Password Input page, prompting user inputs corresponding encrypted message.
In step 403, receive the first biometric information of first user input, identify that whether the first biometric information of this input is consistent with the first biometric information prestored;
Above-mentioned recognition result performs step 404 when consistent;
When above-mentioned recognition result is inconsistent, prompting first user inputs the first biometric information again;
In one embodiment, the number of times that first user inputs the first biometric information within a certain period of time is again limited, such as twice, and identify that if each first biometric information of input is all failed, then this is deciphered unsuccessfully.Deciphering flow process is again entered after a period of time need be waited.
In step 404, receive the second biometric information of second user's input, identify that whether the second biometric information of input is consistent with the second biometric information prestored;
Above-mentioned recognition result performs step 405 when consistent;
When above-mentioned recognition result is inconsistent, the second user is pointed out again to input the second biometric information;
In one embodiment, the number of times that the second user inputs the second biometric information within a certain period of time is again limited, such as twice, and identify that if each second biometric information of input is all failed, then this is deciphered unsuccessfully.Deciphering flow process is again entered after a period of time need be waited.
In step 405, receive the 3rd biometric information of the 3rd user's input, and identify that whether the 3rd biometric information of input is consistent with the 3rd biometric information prestored;
Above-mentioned recognition result performs step 406 when consistent;
When above-mentioned recognition result is inconsistent, prompting the 3rd user inputs the 3rd biometric information again;
In one embodiment, the number of times that the 3rd user inputs the 3rd biometric information within a certain period of time is again limited, such as twice, and identify that if each 3rd biometric information of input is all failed, then this is deciphered unsuccessfully.Deciphering flow process is again entered after a period of time need be waited.
In a step 406, discharge described termination function, use for user.
Above-mentioned termination function comprises: enter operating system, opens certain application of installing in terminal, or uses a certain function in certain application.
In sum, technique scheme adopts the biometric information of multi-user (three users) to be decrypted termination function simultaneously, strengthens the security of upper termination function greatly.
It should be noted that, technical scheme shown in Fig. 4 inputs with order and identifies the biometric information of input, after the biometric information successfully identifying a user, just can identify the biometric information of next user, to when being all identified correct to all encryptions by the biometric information of user, unlock terminal function.And when specific implementation, when unlock terminal function, can also require participate in encryption all users input its biometric information simultaneously, simultaneously to its input biometric information identify, and when identifying successfully unlock terminal function.
Following is disclosure device embodiment, may be used for performing disclosure embodiment of the method.For the details do not disclosed in disclosure device embodiment, please refer to disclosure embodiment of the method.
Fig. 5 is a kind of block diagram encrypting implement device 500 according to an exemplary embodiment, this encryption implement device 500 can realize becoming the some or all of of terminal by software, hardware or both combinations, comprise: information reminding module 501, first information receiver module 502, second information receiving module 503 and encrypting module 504;
Information reminding module 501, is configured to when receiving encryption and arranging instruction, and prompting user inputs encrypted message;
First information receiver module 502, is configured to the first biometric information receiving first user input, identifies and record described first biometric information;
Second information receiving module 503, is configured to the second biometric information of reception second user input, identifies and record described second biometric information;
Encrypting module 504, is configured to adopt described first biometric information and the second biometric information to be encrypted described terminal.
In one embodiment, encrypting module 504, is specifically configured to adopt described first biometric information and the second biometric information to be encrypted described terminal; Or, adopt described first biometric information and the second biometric information to be encrypted the application that described terminal is installed; Or, adopt described first biometric information and the second biometric information in described terminal application is installed function be encrypted.
As shown in Figure 6, in one embodiment, described encryption implement device 500 can also comprise:
3rd information receiving module 505, is configured to the 3rd biometric information of reception the 3rd user input, identifies and records the described 3rd biological raw other information;
Correspondingly, described encrypting module 504, is configured to adopt described first biometric information, the second biometric information and the 3rd biometric information to be encrypted described terminal.
In sum, the encryption implement device that disclosure embodiment provides, when receiving encryption and arranging instruction, prompting user inputs encrypted message; Afterwards, receive the first biometric information of first user input, identify and record described first biometric information, and receive the second biometric information of second user's input, identify and record described second biometric information, finally adopting described first biometric information and the second biometric information to be encrypted described terminal.Adopt the two biological information of dual user to be encrypted terminal, enhance the security of terminal device greatly.
Fig. 7 is a kind of block diagram deciphering implement device 600 according to another exemplary embodiment, this application deciphering implement device 600 can realize becoming the some or all of of terminal by software, hardware or both combinations, this deciphering implement device 600 can include but not limited to: determination module 601, information reminding module 602, MIM message input module 603, information identification module 604 and deciphering module 605;
Determination module 601, is configured to receive when opening a terminal the instruction of function, determines that whether described termination function is encrypted;
Information reminding module 602, is configured to when described termination function is encrypted, and prompting user inputs encrypted message;
MIM message input module 603, is configured to the first biometric information receiving first user input, and the second biometric information of the second user input;
Whether information identification module 604, is configured to the second biometric information of the first biometric information and the second user input identifying that described first user inputs, consistent with the first biometric information prestored and the second biometric information;
Deciphering module 605, is configured to, when above-mentioned recognition result is consistent, discharges described termination function, use for user.
In one embodiment, described MIM message input module 603, is configured to the first biometric information receiving first user input, the second biometric information of second user's input and the 3rd biometric information of the 3rd user input; Accordingly, described information identification module 604, be configured to the first biometric information, the second biometric information of second user's input and the 3rd biometric information of the 3rd user input that identify that described first user inputs, whether with the first biometric information prestored, the second biometric information and the 3rd biometric information consistent.
About the device in above-described embodiment, wherein the concrete mode of modules executable operations has been described in detail in about the embodiment of the method, will not elaborate explanation herein.
In sum, the deciphering implement device that disclosure embodiment provides, receives the first biometric information of first user input, and the second biometric information of the second user input; Identify the second biometric information of the first biometric information that described first user inputs and the second user input, whether consistent with the first biometric information prestored and the second biometric information; When above-mentioned recognition result is consistent, discharges described termination function, use for user.Adopt the two biological information of dual user to be decrypted terminal, enhance the security of terminal device greatly.
In addition, the disclosure one exemplary embodiment provides a kind of encryption implement device, and can realize the encryption implementation method that the disclosure provides, this device comprises: processor, storer for storage of processor executable instruction;
Wherein, processor is configured to:
When receiving encryption and arranging instruction, prompting user inputs encrypted message;
Receive the first biometric information of first user input, identify and record described first biometric information;
Receive the second biometric information of second user's input, identify and record described second biometric information;
Described first biometric information and the second biometric information is adopted to be encrypted described terminal.
Moreover the disclosure one exemplary embodiment provides a kind of deciphering implement device, and can realize the deciphering implementation method that the disclosure provides, this device comprises: processor, storer for storage of processor executable instruction;
Wherein, described processor is configured to:
When receiving the instruction of the function that opens a terminal, determine that whether described termination function is encrypted;
When described termination function is encrypted, prompting user inputs encrypted message;
Receive the first biometric information of first user input, and the second biometric information of the second user input;
Identify the second biometric information of the first biometric information that described first user inputs and the second user input, whether consistent with the first biometric information prestored and the second biometric information;
When above-mentioned recognition result is consistent, discharges described termination function, use for user.
About the device in above-described embodiment, wherein the concrete mode of modules executable operations has been described in detail in about the embodiment of the method, will not elaborate explanation herein.
Please refer to Fig. 8, it illustrates a kind of block diagram for applying the device 700 shared shown in an exemplary embodiment.Such as, device 700 can be mobile phone, computing machine, digital broadcast terminal, messaging devices, game console, tablet device, Medical Devices, body-building equipment, personal digital assistant etc.
With reference to Fig. 8, device 700 can comprise following one or more assembly: processing components 702, storer 704, power supply module 707, multimedia groupware 708, audio-frequency assembly 710, I/O (I/O) interface 712, sensor module 714, and communications component 717.
The integrated operation of the usual control device 700 of processing components 702, such as with display, call, data communication, camera operation and record operate the operation be associated.Processing components 702 can comprise one or more processor 720 to perform instruction, to complete all or part of step of above-mentioned method.In addition, processing components 702 can comprise one or more module, and what be convenient between processing components 702 and other assemblies is mutual.Such as, processing components 702 can comprise multi-media module, mutual with what facilitate between multimedia groupware 708 and processing components 702.
Storer 704 is configured to store various types of data to be supported in the operation on device 700.The example of these data comprises for any application of operation on device 700 or the instruction of method, contact data, telephone book data, message, picture, video etc.Storer 704 can be realized by the volatibility of any type or non-volatile memory device or their combination, as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), Erasable Programmable Read Only Memory EPROM (EPROM), programmable read only memory (PROM), ROM (read-only memory) (ROM), magnetic store, flash memory, disk or CD.
The various assemblies that power supply module 707 is device 700 provide electric power.Power supply module 707 can comprise power-supply management system, one or more power supply, and other and the assembly generating, manage and distribute electric power for device 700 and be associated.
Multimedia groupware 708 is included in the screen providing an output interface between device 700 and user.In certain embodiments, screen can comprise liquid crystal display (LCD) and touch panel (TP).If screen comprises touch panel, screen may be implemented as touch-screen, to receive the input signal from user.Touch panel comprises one or more touch sensor with the gesture on sensing touch, slip and touch panel.Touch sensor can the border of not only sensing touch or sliding action, but also detects the duration relevant with touch or slide and pressure.In certain embodiments, multimedia groupware 708 comprises a front-facing camera and/or post-positioned pick-up head.When device 700 is in operator scheme, during as screening-mode or video mode, front-facing camera and/or post-positioned pick-up head can receive outside multi-medium data.Each front-facing camera and post-positioned pick-up head can be fixing optical lens systems or have focal length and optical zoom ability.
Audio-frequency assembly 710 is configured to export and/or input audio signal.Such as, audio-frequency assembly 710 comprises a microphone (MIC), and when device 700 is in operator scheme, during as call model, logging mode and speech recognition mode, microphone is configured to receive external audio signal.The sound signal received can be stored in storer 704 further or be sent via communications component 717.In certain embodiments, audio-frequency assembly 710 also comprises a loudspeaker, for output audio signal.
I/O interface 712 is for providing interface between processing components 702 and peripheral interface module, and above-mentioned peripheral interface module can be keyboard, some striking wheel, button etc.These buttons can include but not limited to: home button, volume button, start button and locking press button.
Sensor module 714 comprises one or more sensor, for providing the state estimation of various aspects for device 700.Such as, sensor module 714 can detect the opening/closing state of device 700, the relative positioning of assembly, such as assembly is display and the keypad of device 700, the position of all right pick-up unit 700 of sensor module 714 or device 700 1 assemblies changes, the presence or absence that user contacts with device 700, the temperature variation of device 700 orientation or acceleration/deceleration and device 700.Sensor module 714 can comprise proximity transducer, be configured to without any physical contact time detect near the existence of object.Sensor module 714 can also comprise optical sensor, as CMOS or ccd image sensor, for using in imaging applications.In certain embodiments, this sensor module 714 can also comprise acceleration transducer, gyro sensor, Magnetic Sensor, pressure transducer or temperature sensor.
Communications component 717 is configured to the communication being convenient to wired or wireless mode between device 700 and other equipment.Device 700 can access the wireless network based on communication standard, as WiFi, 2G or 3G, or their combination.In one exemplary embodiment, communications component 717 receives from the broadcast singal of external broadcasting management system or broadcast related information via broadcast channel.In one exemplary embodiment, communications component 717 also comprises near-field communication (NFC) module, to promote junction service.Such as, can based on radio-frequency (RF) identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology, bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 700 can be realized by one or more application specific integrated circuit (ASIC), digital signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD) (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components, for performing above-mentioned encryption implementation method or deciphering implementation method.
In the exemplary embodiment, additionally provide a kind of non-transitory computer-readable recording medium comprising instruction, such as, comprise the storer 704 of instruction, above-mentioned instruction can perform said method by the processor 720 of device 700.Such as, non-transitory computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and optical data storage devices etc.
A kind of non-transitory computer-readable recording medium, when the instruction in storage medium is performed by the processor of device 700, makes device 700 can perform a kind of application sharing method.
Term "and/or" in the disclosure, being only a kind of incidence relation describing affiliated partner, can there are three kinds of relations in expression, and such as, A and/or B, can represent: individualism A, exists A and B simultaneously, these three kinds of situations of individualism B.In addition, character "/" herein, general expression forward-backward correlation is to the relation liking a kind of "or".
Those skilled in the art, at consideration instructions and after putting into practice invention disclosed herein, will easily expect other embodiment of the present disclosure.The application is intended to contain any modification of the present disclosure, purposes or adaptations, and these modification, purposes or adaptations are followed general principle of the present disclosure and comprised the undocumented common practise in the art of the disclosure or conventional techniques means.Instructions and embodiment are only regarded as exemplary, and true scope of the present disclosure and spirit are pointed out by claim below.
Should be understood that, the disclosure is not limited to precision architecture described above and illustrated in the accompanying drawings, and can carry out various amendment and change not departing from its scope.The scope of the present disclosure is only limited by appended claim.

Claims (12)

1. an encryption implementation method, is characterized in that, for terminal, described method comprises:
When receiving encryption and arranging instruction, prompting user inputs encrypted message;
Receive the first biometric information of first user input, identify and record described first biometric information;
Receive the second biometric information of second user's input, identify and record described second biometric information;
Described first biometric information and the second biometric information is adopted to be encrypted described terminal.
2. method according to claim 1, is characterized in that, described first user and described second user are same users, and described first biometric information and the second biometric information are different biometric information.
3. method according to claim 2, is characterized in that, described first user and described second user are different users.
4. method according to claim 1, is characterized in that, described first biometric information of described employing and the second biometric information are encrypted described terminal, comprising:
Described first biometric information and the second biometric information is adopted to be encrypted described terminal; Or,
Described first biometric information and the second biometric information is adopted to be encrypted the application that described terminal is installed; Or,
Adopt described first biometric information and the second biometric information in described terminal application is installed function be encrypted.
5. according to the arbitrary described method of Claims 1-4, it is characterized in that, receive the second biometric information of second user's input, to identify and after recording described second biometric information, described method also comprises:
Receive the 3rd biometric information of the 3rd user's input, identify and record the described 3rd biological raw other information;
Described first biometric information, the second biometric information and the 3rd biometric information is adopted to be encrypted described terminal.
6. decipher an implementation method, it is characterized in that, described method is applied to terminal, comprising:
When receiving the instruction of the function that opens a terminal, determine that whether described termination function is encrypted;
When described termination function is encrypted, prompting user inputs encrypted message;
Receive the first biometric information of first user input, and the second biometric information of the second user input;
Identify the second biometric information of the first biometric information that described first user inputs and the second user input, whether consistent with the first biometric information prestored and the second biometric information;
When above-mentioned recognition result is consistent, discharges described termination function, use for user.
7. encrypt an implement device, it is characterized in that, for terminal, described device comprises:
Information reminding module, is configured to when receiving encryption and arranging instruction, and prompting user inputs encrypted message;
First information receiver module, is configured to the first biometric information receiving first user input, identifies and record described first biometric information;
Second information receiving module, is configured to the second biometric information of reception second user input, identifies and record described second biometric information;
Encrypting module, is configured to adopt described first biometric information and the second biometric information to be encrypted described terminal.
8. device according to claim 7, is characterized in that, described encrypting module, is specifically configured to adopt described first biometric information and the second biometric information to be encrypted described terminal; Or, adopt described first biometric information and the second biometric information to be encrypted the application that described terminal is installed; Or, adopt described first biometric information and the second biometric information in described terminal application is installed function be encrypted.
9. device according to claim 7, is characterized in that, described device also comprises: the 3rd information receiving module, is configured to the 3rd biometric information of reception the 3rd user input, identifies and records the described 3rd biological raw other information;
Correspondingly, described encrypting module, is configured to adopt described first biometric information, the second biometric information and the 3rd biometric information to be encrypted described terminal.
10. decipher an implement device, it is characterized in that, described application of installation, in terminal, comprising:
Determination module, is configured to receive when opening a terminal the instruction of function, determines that whether described termination function is encrypted;
Information reminding module, is configured to when described termination function is encrypted, and prompting user inputs encrypted message;
MIM message input module, is configured to the first biometric information receiving first user input, and the second biometric information of the second user input;
Whether information identification module, is configured to the second biometric information of the first biometric information and the second user input identifying that described first user inputs, consistent with the first biometric information prestored and the second biometric information;
Deciphering module, is configured to, when above-mentioned recognition result is consistent, discharges described termination function, use for user.
11. 1 kinds of deciphering implement devices, is characterized in that, comprising:
Processor;
For storing the storer of the executable instruction of described processor;
Wherein, described processor is configured to:
When receiving encryption and arranging instruction, prompting user inputs encrypted message;
Receive the first biometric information of first user input, identify and record described first biometric information;
Receive the second biometric information of second user's input, identify and record described second biometric information;
Described first biometric information and the second biometric information is adopted to be encrypted described terminal.
12. 1 kinds of deciphering implement devices, is characterized in that, comprising:
Processor;
For storing the storer of the executable instruction of described processor;
Wherein, described processor is configured to:
When receiving the instruction of the function that opens a terminal, determine that whether described termination function is encrypted;
When described termination function is encrypted, prompting user inputs encrypted message;
Receive the first biometric information of first user input, and the second biometric information of the second user input;
Identify the second biometric information of the first biometric information that described first user inputs and the second user input, whether consistent with the first biometric information prestored and the second biometric information;
When above-mentioned recognition result is consistent, discharges described termination function, use for user.
CN201510275138.7A 2015-05-26 2015-05-26 Encryption and decryption method and apparatus Pending CN105046127A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510275138.7A CN105046127A (en) 2015-05-26 2015-05-26 Encryption and decryption method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510275138.7A CN105046127A (en) 2015-05-26 2015-05-26 Encryption and decryption method and apparatus

Publications (1)

Publication Number Publication Date
CN105046127A true CN105046127A (en) 2015-11-11

Family

ID=54452666

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510275138.7A Pending CN105046127A (en) 2015-05-26 2015-05-26 Encryption and decryption method and apparatus

Country Status (1)

Country Link
CN (1) CN105046127A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107480495A (en) * 2017-07-24 2017-12-15 广东欧珀移动通信有限公司 The unlocking method and Related product of mobile terminal
CN109711177A (en) * 2018-12-14 2019-05-03 国家电网有限公司 Data safety control method and terminal device based on biological information identification
WO2021105946A1 (en) * 2019-11-29 2021-06-03 Gottardo Advisory Limited Biometric registration and verification device for aircraft service and maintenance
US11194996B2 (en) 2017-07-28 2021-12-07 Shenzhen Heytap Technology Corp., Ltd. Method of unlocking control, mobile terminal, and computer storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040221164A1 (en) * 2003-02-25 2004-11-04 Thomas Birkhoelzer Method for the encryption and decryption of data by various users
CN101105775A (en) * 2007-08-29 2008-01-16 利特国际有限公司 Method for storing and inquiring user data in data storage device and data safety storage device
CN101350724A (en) * 2008-08-15 2009-01-21 西安电子科技大学 Encrypting method base on biology characteristic information
CN101977197A (en) * 2010-10-29 2011-02-16 西安电子科技大学 Multi-receiver encryption method based on biological characteristics
US20120131350A1 (en) * 2009-05-18 2012-05-24 Mikoh Corporation Biometric identification method
CN103200009A (en) * 2013-04-11 2013-07-10 迪士恩信息科技(上海)有限公司 System and method for fingerprint encryption and decryption
CN103927658A (en) * 2014-04-08 2014-07-16 深圳市中兴移动通信有限公司 Mobile payment method and terminal
CN104023133A (en) * 2014-05-23 2014-09-03 北京金山安全软件有限公司 Anti-theft method and device for mobile terminal
CN104537290A (en) * 2014-12-18 2015-04-22 无敌科技(西安)有限公司 Password system and achievement method based on multi-fingerprint identification
CN104573550A (en) * 2014-12-27 2015-04-29 小米科技有限责任公司 Method and device for protecting data

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040221164A1 (en) * 2003-02-25 2004-11-04 Thomas Birkhoelzer Method for the encryption and decryption of data by various users
CN101105775A (en) * 2007-08-29 2008-01-16 利特国际有限公司 Method for storing and inquiring user data in data storage device and data safety storage device
CN101350724A (en) * 2008-08-15 2009-01-21 西安电子科技大学 Encrypting method base on biology characteristic information
US20120131350A1 (en) * 2009-05-18 2012-05-24 Mikoh Corporation Biometric identification method
CN101977197A (en) * 2010-10-29 2011-02-16 西安电子科技大学 Multi-receiver encryption method based on biological characteristics
CN103200009A (en) * 2013-04-11 2013-07-10 迪士恩信息科技(上海)有限公司 System and method for fingerprint encryption and decryption
CN103927658A (en) * 2014-04-08 2014-07-16 深圳市中兴移动通信有限公司 Mobile payment method and terminal
CN104023133A (en) * 2014-05-23 2014-09-03 北京金山安全软件有限公司 Anti-theft method and device for mobile terminal
CN104537290A (en) * 2014-12-18 2015-04-22 无敌科技(西安)有限公司 Password system and achievement method based on multi-fingerprint identification
CN104573550A (en) * 2014-12-27 2015-04-29 小米科技有限责任公司 Method and device for protecting data

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107480495A (en) * 2017-07-24 2017-12-15 广东欧珀移动通信有限公司 The unlocking method and Related product of mobile terminal
CN107480495B (en) * 2017-07-24 2020-12-01 Oppo广东移动通信有限公司 Unlocking method of mobile terminal and related product
US11194996B2 (en) 2017-07-28 2021-12-07 Shenzhen Heytap Technology Corp., Ltd. Method of unlocking control, mobile terminal, and computer storage medium
CN109711177A (en) * 2018-12-14 2019-05-03 国家电网有限公司 Data safety control method and terminal device based on biological information identification
WO2021105946A1 (en) * 2019-11-29 2021-06-03 Gottardo Advisory Limited Biometric registration and verification device for aircraft service and maintenance

Similar Documents

Publication Publication Date Title
CN104219058B (en) Authentication, identification authorization method and device
CN103916233B (en) A kind of information ciphering method and device
CN104243484B (en) Information interacting method and device, electronic equipment
CN104573550A (en) Method and device for protecting data
CN104283876A (en) Operation authorization method and device
CN104008348A (en) Application program control method, application program control device and terminal
CN104503688A (en) Intelligent hardware device control achieving method and device
CN104715337A (en) Attendance method, and attendance management method and device
CN104933351A (en) Information security processing method and information security processing device
CN104093119B (en) unlocking method and device
CN106097494A (en) The method for unlocking of smart lock and device
CN104331668A (en) Wrong password prompting method and device
CN105786609A (en) Control method and device of terminal
CN104391712A (en) Shutdown method and device
CN104318177A (en) Protection method and protection device for data of terminal equipment
CN104331228A (en) Screen locking method and device
CN106156561A (en) Application locking method, application unlocking method and a device
CN104468581B (en) The method and device of login application program
CN105407070A (en) Logging-in authorization method and device
CN105893854B (en) Encryption and decryption method and device
CN104219053A (en) Information displaying method, information concealing method and information concealing device
CN104217328A (en) Multi-verification payment method and multi-verification payment device
CN106127062A (en) unlocking method and device
CN104038537A (en) Contact list information management method and device and mobile terminal
CN105046127A (en) Encryption and decryption method and apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20151111

RJ01 Rejection of invention patent application after publication