CN105574387A - Information security processing method and user terminal - Google Patents

Information security processing method and user terminal Download PDF

Info

Publication number
CN105574387A
CN105574387A CN201510334582.1A CN201510334582A CN105574387A CN 105574387 A CN105574387 A CN 105574387A CN 201510334582 A CN201510334582 A CN 201510334582A CN 105574387 A CN105574387 A CN 105574387A
Authority
CN
China
Prior art keywords
file destination
information
user terminal
user
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510334582.1A
Other languages
Chinese (zh)
Inventor
欧志芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201510334582.1A priority Critical patent/CN105574387A/en
Publication of CN105574387A publication Critical patent/CN105574387A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Abstract

Embodiments of the invention disclose an information security processing method and a user terminal. The information security processing method comprises the steps of receiving an object file sent from a object user terminal; identifying whether the object file is encrypted or not; if the object file is encrypted, collecting biological feature information of a user; judging whether the biological feature information of the user is matched with object biological feature information for encrypting the object file or not; and if the biological feature information of the user is matched with the object biological feature information, performing encryption on the object file. By the implementation of the embodiments of the invention, the information security can be improved.

Description

A kind of information security processing method and user terminal
Technical field
The present invention relates to intelligent terminal technical field, particularly relate to a kind of information security processing method and user terminal.
Background technology
Along with popularizing of user terminal (as smart mobile phone, IPAD etc.) and becoming stronger day by day of function, user more and more likes using user terminal to handle official business, such as: carried out the office documents such as receiving and dispatching mail, file or note by smart mobile phone.In order to ensure the security of office document; user is sending to addressee after being usually encrypted office document; usually; the mode of user encryption is mainly for office document arranges Crypted password; and the mode of this set Crypted password is easy to be cracked by disabled user; so that office document exists the risk revealed, information security can not get ensureing.
Summary of the invention
Embodiments provide a kind of information security processing method and user terminal, the security of information can be improved.
Embodiment of the present invention first aspect discloses a kind of information security processing method, comprising:
The file destination that receiving target user terminal sends;
Identify whether described file destination is encrypted;
When identifying the encryption of described file destination, gather the biological information of user;
Judge whether the biological information of described user mates with the target biometric information be encrypted described file destination;
If coupling, be then decrypted described file destination.
Embodiment of the present invention second aspect discloses a kind of user terminal, comprising:
Receiving element, for the file destination that receiving target user terminal sends;
Recognition unit, for identifying whether described file destination is encrypted;
Collecting unit, for when file destination described in described recognition unit identification is encrypted, gathers the biological information of user;
Judging unit, for judging whether the biological information of described user mates with the target biometric information be encrypted described file destination;
Decryption unit, during for judging the biological information of described user and the target biometric information matches be encrypted described file destination when described judging unit, is decrypted described file destination.
In the embodiment of the present invention, the file destination that user terminal receiving target user terminal sends, identify whether file destination is encrypted, when identifying file destination encryption, gather the biological information of user, judge whether the biological information of user mates with the target biometric information be encrypted file destination, if coupling, then file destination is decrypted.Pass through the embodiment of the present invention, user terminal is after the file destination receiving target terminal user transmission, user terminal only needs the biological information of user to mate with the target biometric information be encrypted file destination, after the match is successful, when user terminal determines this user for validated user, just can file destination be decrypted, after deciphering, user just can see the content in file destination, thus can improve the security of information.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, below the accompanying drawing used required in describing embodiment is briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the schematic flow sheet of a kind of information security processing method disclosed in the embodiment of the present invention;
Fig. 2 is the schematic flow sheet of another kind of information security processing method disclosed in the embodiment of the present invention;
Fig. 3 is the schematic flow sheet of another kind of information security processing method disclosed in the embodiment of the present invention;
Fig. 4 is the structural representation of a kind of user terminal disclosed in the embodiment of the present invention;
Fig. 5 is the structural representation of another kind of user terminal disclosed in the embodiment of the present invention;
Fig. 6 is the structural representation of another kind of user terminal disclosed in the embodiment of the present invention;
Fig. 7 is the structural representation of another kind of user terminal disclosed in the embodiment of the present invention;
Fig. 8 is the structural representation of another kind of user terminal disclosed in the embodiment of the present invention;
Fig. 9 is the structural representation of another kind of user terminal disclosed in the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
The embodiment of the invention discloses a kind of information security processing method and user terminal, the security of information can be improved.Below be described in detail respectively.
In the embodiment of the present invention, user terminal can include but not limited to smart mobile phone, panel computer, notebook computer, palm PC etc. user terminal.Wherein, the operating system of this user terminal can include but not limited to Android operation system, IOS, Symbian (Saipan) operating system, BlackBerry (blackberry, blueberry) operating system, WindowsPhone8 operating system etc., and the embodiment of the present invention does not limit.
Refer to Fig. 1, Fig. 1 is the schematic flow sheet of a kind of information security processing method disclosed in the embodiment of the present invention.As shown in Figure 1, the method can comprise the following steps.
The file destination that S101, receiving target user terminal send.
In the embodiment of the present invention, the file destination that user terminal receiving target user terminal sends.Wherein, this target terminal user can include but not limited to smart mobile phone, panel computer, notebook computer, palm PC etc. user terminal, this file destination can be office document, as mail, file etc., or, this file destination is the file comprising individual privacy, as note, photo etc., the embodiment of the present invention is not construed as limiting, wherein, this file destination can carry some information, as addressee information.
Whether S102, identification file destination are encrypted, and if so, perform step S103, if not, and process ends.
In the embodiment of the present invention, user terminal is after the file destination receiving target terminal user transmission, user terminal can identify whether this file destination is encrypted, when this file destination of user terminal identification is encrypt file, after user terminal needs to be decrypted this file destination, user just can see the content that this file destination carries, and when this file destination of user terminal identification is not encrypted, user terminal can terminate current process.
The biological information of S103, collection user.
In the embodiment of the present invention, in order to prevent the leakage of file destination, the safety of protection information, target terminal user, before transmission file destination, uses the biological information of the addressee of this file destination to encrypt this file destination.Wherein, this biological information can comprise the combination of any one or more in iris feature information, fingerprint feature information, face characteristic information and vocal print characteristic information.This user is the current user using user terminal.
As the optional embodiment of one, when this biological information comprises iris feature information, the embodiment that user terminal gathers the biological information of user can comprise the following steps:
11) photographing module is started;
12) iris image of user is gathered by photographing module;
13) from iris image, iris feature information is extracted.
In this embodiment, user terminal is after the encryption of identification file destination, user terminal can start photographing module, camera as built-in in user terminal, the iris image of user is gathered by photographing module, further, user terminal can do further Image semantic classification to this iris image, such as: Iris Location, iris image normalization and image enhaucament etc., after carrying out Image semantic classification to iris image, user terminal just can adopt specific algorithm from pretreated iris image, extract iris feature information needed for iris recognition.
As the optional embodiment of another kind, when this biological information comprises face characteristic information, the embodiment that user terminal gathers the biological information of user can comprise the following steps:
21) photographing module is started;
22) facial image of user is gathered by photographing module;
23) from facial image, face characteristic information is extracted.
In this embodiment, user terminal is after the encryption of identification file destination, user terminal can start photographing module, camera as built-in in user terminal, the facial image of user is gathered by photographing module, further, user terminal can do further Image semantic classification to this facial image, such as: the light compensation of facial image, greyscale transformation, histogram equalization, normalization, geometry correction, filtering and sharpening etc., after pre-service is carried out to facial image, user terminal can obtain according to the shape description of human face and the range performance between them characteristic information contributing to face classification, as: face is by eyes, nose, mouth, the local such as chin is formed, user terminal can using to these local and between them the geometric description of structural relation as identifying the key character information of face, to extract face characteristic information.
As the optional embodiment of another kind, when this biological information comprises vocal print characteristic information, the embodiment that user terminal gathers the biological information of user can comprise the following steps:
31) sound acquisition module is started;
32) information for pointing out input speech signal is exported;
33) voice signal that inputs for information of user is received by sound acquisition module;
34) from voice signal, vocal print characteristic information is extracted.
In this embodiment, because everyone vocal organs are not quite similar, in the ordinary course of things, people still can distinguish the sound of different people or determine whether the sound that same person sends, and therefore, can be distinguished the identity of user by sound groove recognition technology in e.
In this embodiment, user terminal is after the encryption of identification file destination, user terminal can start sound acquisition module, microphones module as built-in in user terminal, further, user terminal can export the information for pointing out input speech signal, and receive the voice signal that inputs for information of user by sound acquisition module, vocal print characteristic information is extracted from voice signal, wherein, vocal print is the sound wave spectrum carrying voice messaging, the vocal print characteristic information that user terminal extracts is strong for having resolvability, the acoustics of the characteristics such as stability is high or language feature.
As the optional embodiment of another kind, after the encryption of user terminal identification file destination, and before the biological information of collection user, described method can also comprise the following steps:
41) export information, whether described information is used for prompting and is decrypted described file destination;
42) when receiving the confirmation instruction inputted for described information, responding described confirmation instruction, performing the step of the biological information of described collection user.
In this embodiment, after the encryption of user terminal identification file destination, user terminal can export the dialog box that comprises information, whether this information is used for prompting and is decrypted file destination, as " content is encrypted, whether decipher ", if user clicks the ACK button (as "Yes") in this dialog box, show that user needs to check the content of this file destination, then user terminal just can gather the biological information of user, if user clicks the negative button (as "No") in this dialog box, then user terminal does not need the biological information gathering user.
S104, judge whether the biological information of user mates with the target biometric information be encrypted file destination, if so, perform step S105, if not, process ends.
In the embodiment of the present invention, user terminal judges whether the biological information of user mates with the target biometric information be encrypted file destination, wherein, this target biometric information is biological information corresponding to the targeted recipient of this file destination, and this target biometric information can comprise the combination of any one or more in target iris feature information, target fingerprint characteristic information, target face characteristic information and target vocal print characteristic information.
As the optional embodiment of one, when this biological information comprises iris feature information, user terminal judges whether the biological information of user mates with the target biometric information be encrypted file destination, comprising:
Judge whether iris feature information mates with the target iris feature information be encrypted file destination, if coupling, then determine the biological information of user and the target biometric information matches that file destination is encrypted.
In this embodiment, user terminal is after the iris feature information collecting user, user terminal can obtain the target iris feature information be encrypted file destination, further, the iris feature information of user is mated with target iris feature information by user terminal, if the match is successful, then determine the biological information of user and the target biometric information matches that file destination is encrypted.
As the optional embodiment of another kind, when this biological information comprises face characteristic information, user terminal judges whether the biological information of user mates with the target biometric information be encrypted file destination, comprising:
Judge whether face characteristic information mates with the target face characteristic information be encrypted file destination, if coupling, then determine the biological information of user and the target biometric information matches that file destination is encrypted.
In this embodiment, user terminal is after the face characteristic information collecting user, user terminal can obtain the target face characteristic information be encrypted file destination, further, the face characteristic information of user is mated with target face characteristic information by user terminal, if the match is successful, then determine the biological information of user and the target biometric information matches that file destination is encrypted.
As the optional embodiment of another kind, when this biological information comprises vocal print characteristic information, user terminal judges whether the biological information of user mates with the target biometric information be encrypted file destination, comprising:
Judge whether vocal print characteristic information mates with the target vocal print characteristic information be encrypted file destination, if coupling, then determine the biological information of user and the target biometric information matches that file destination is encrypted.
In this embodiment, user terminal is after the vocal print characteristic information collecting user, user terminal can obtain the target vocal print characteristic information be encrypted file destination, further, the vocal print characteristic information of user mates with target vocal print characteristic information by user terminal, if the match is successful, then determine the biological information of user and the target biometric information matches that file destination is encrypted.
S105, file destination to be decrypted.
In the embodiment of the present invention, after the biological information that user terminal judges user and the target biometric information matches that file destination is encrypted, user terminal can use the biological information of this user to be decrypted file destination, after deciphering, user just can see the content of carrying in the file destination of user terminal displays, as the text message in addressee information, file, accessory information etc.
In the embodiment of the present invention, biological information due to everyone is unique, therefore, this mode file destination is encrypted by biological information, can prevent disabled user from stealing the content of this file destination, meanwhile, when fat file is to other people for user terminal by mistake, the leakage of confidential information or privacy information can also be prevented.
In the method flow described by Fig. 1, the file destination that user terminal receiving target user terminal sends, identify whether file destination is encrypted, when identifying file destination encryption, gather the biological information of user, judge whether the biological information of user mates with the target biometric information be encrypted file destination, if coupling, then file destination is decrypted.Pass through the embodiment of the present invention, user terminal is after the file destination receiving target terminal user transmission, user terminal only needs the biological information of user to mate with the target biometric information be encrypted file destination, after the match is successful, when user terminal determines this user for validated user, just can file destination be decrypted, after deciphering, user just can see the content in file destination, thus can improve the security of information.
Refer to Fig. 2, Fig. 2 is the schematic flow sheet of another kind of information security processing method disclosed in the embodiment of the present invention.As shown in Figure 2, the method can comprise the following steps.
The file destination that S201, user terminal receiving target user terminal send.
S202, user terminal detect the instruction of biological information encryption and decryption.
In the embodiment of the present invention, this biological information encryption and decryption instruction can trigger generation by targets option.User terminal can detect targets option open command in advance, and responds targets option open command, opens targets option, and like this, user terminal just can trigger and generate the instruction of biological information encryption and decryption.Wherein, the mode that this targets option open command can be inputted by user triggers, such as, user arrange interface click targets option release the button or the slider bar of targets option slided into the position of unlatching, or user clicks targets option and releases the button or the slider bar of targets option slided into the position of unlatching at mail transmission/reception interface; This targets option open command also can be the instruction of input automatically, such as, automatically opens targets option etc. at special time.
The instruction of S203, user terminal response biological information encryption and decryption, identifies whether file destination is encrypted, if so, performs step S204, if not, perform step S209.
In the embodiment of the present invention, user terminal is after the instruction of biological information encryption and decryption being detected, user terminal just can respond the instruction of biological information encryption and decryption, identify whether file destination is encrypted, if identify file destination encryption, then, after user terminal needs are decrypted this file destination, user just can see the content of file destination, if identify file destination not encrypt, then user terminal can the content of direct display-object file.
S204, user terminal obtain the targeted recipient information that file destination carries.
In the embodiment of the present invention, target terminal user by internet transmission file destination before, user needs in target terminal user, input targeted recipient information, this targeted recipient information is generally the network address that targeted recipient receives file, as e-mail address, this e-mail address is made up of three parts usually: the account number of Part I " USER " representative of consumer mailbox, and for same mail reception server, this account number must be unique; Part II " " is separator; Part III is the mail reception server domain name of letter box, in order to indicate the position at its place.For example, this e-mail address is litingqq.com.
S205, user terminal for foundation, extract the target biometric information that the targeted recipient information that is encrypted file destination is corresponding with targeted recipient information from the biological attribute data storehouse that this locality stores.
In the embodiment of the present invention, user terminal in advance by biological attribute data library storage in this locality, store the target biometric information of multiple targeted recipient in this biological attribute data storehouse, and establish the corresponding relation between targeted recipient and target biometric information.After user terminal gets the targeted recipient information that file destination carries, user terminal just can with targeted recipient information for foundation, the target biometric information that query aim addressee information is corresponding from the biological attribute data storehouse that this locality stores, like this, user terminal just can extract the target biometric information that file destination is encrypted.
S206, user terminal gather the biological information of user.
S207, user terminal judge whether the biological information of user mates with the target biometric information be encrypted file destination, if so, perform step S208, if not, and process ends.
S208, user terminal are decrypted file destination.
The content of S209, user terminal displays file destination.
In the embodiment of the present invention, when user terminal identification file destination is not encrypted, user terminal can the content of direct display-object file, or, when the encryption of user terminal identification file destination, and after file destination is decrypted, user terminal also can the content of display-object file, wherein, the content of this file destination can include but not limited to addressee information, text message in file, accessory information etc., addressee information can be the name on account of addressee, text message in file can be word, picture and music etc., accessory information can be word document, condensed document and PDF document etc., the embodiment of the present invention is not construed as limiting.
In the method flow described by Fig. 2, the file destination that user terminal receiving target user terminal sends, and detect the instruction of biological information encryption and decryption, the instruction of response biological information encryption and decryption, identify whether file destination is encrypted, if, obtain the targeted recipient information that file destination carries, with targeted recipient information for foundation, the target biometric information that the targeted recipient information that is encrypted file destination is corresponding is extracted from the biological attribute data storehouse that this locality stores, further, user terminal gathers the biological information of user, judge whether the biological information of user mates with the target biometric information be encrypted file destination, if, then file destination is decrypted, and the content of display-object file.Pass through the embodiment of the present invention, user terminal is after the encryption of identification file destination, according to the target biometric information that targeted recipient acquisition of information is encrypted file destination, further, when determining this user for validated user, just can file destination be decrypted, after deciphering, user just can see the content in file destination, thus can improve the security of information.
Refer to Fig. 3, Fig. 3 is the schematic flow sheet of another kind of information security processing method disclosed in the embodiment of the present invention.As shown in Figure 3, the method can comprise the following steps.
The file destination that S301, user terminal receiving target user terminal send.
S302, user terminal detect the instruction of biological information encryption and decryption.
The instruction of S303, user terminal response biological information encryption and decryption, identifies whether file destination is encrypted, if so, performs step S304, if not, perform step S308.
S304, user terminal obtain the target biometric information be encrypted file destination that file destination carries.
In the embodiment of the present invention, target terminal user is before transmission file destination, target terminal user just with targeted recipient information for foundation, the target biometric information that the targeted recipient information that is encrypted file destination is corresponding is extracted from the biological attribute data storehouse that this locality stores, after to file destination encryption, the file destination carrying target biometric information is just sent to user terminal by target terminal user.After the encryption of user terminal identification file destination, user terminal just can obtain the target biometric information be encrypted file destination that file destination carries.
S305, user terminal gather the biological information of user.
S306, user terminal judge whether the biological information of user mates with the target biometric information be encrypted file destination, if so, perform step S307, if not, and process ends.
S307, user terminal are decrypted file destination.
The content of S308, user terminal displays file destination.
In the method flow described by Fig. 3, after the file destination that user terminal receiving target user terminal sends, user terminal detects the instruction of biological information encryption and decryption, the instruction of response biological information encryption and decryption, identify whether file destination is encrypted, if, obtain the target biometric information that file destination is encrypted that file destination carries, gather the biological information of user, and judge whether the biological information of user mates with the target biometric information be encrypted file destination, if, file destination is decrypted, and the content of display-object file.Pass through the embodiment of the present invention, user terminal is after the encryption of identification file destination, user terminal directly can obtain the target biometric information be encrypted file destination that file destination carries, further, when determining this user for validated user, just can file destination be decrypted, after deciphering, user just can see the content in file destination, thus can improve the security of information.
Be apparatus of the present invention embodiment below, apparatus of the present invention embodiment, for performing the method in the inventive method embodiment, for convenience of explanation, illustrate only the part relevant to the embodiment of the present invention, concrete ins and outs do not disclose, and please refer to said method embodiment of the present invention.
Refer to Fig. 4, Fig. 4 is the structural representation of a kind of user terminal disclosed in the embodiment of the present invention, as shown in Figure 4, this user terminal 400 can comprise: receiving element 401, recognition unit 402, collecting unit 403, judging unit 404 and decryption unit 405, wherein:
Receiving element 401, for the file destination that receiving target user terminal sends.
In the embodiment of the present invention, the file destination that receiving element 401 receiving target user terminal sends.Wherein, this target terminal user can include but not limited to smart mobile phone, panel computer, notebook computer, palm PC etc. user terminal, this file destination can be office document, as mail, file etc., or, this file destination is the file comprising individual privacy, as note, photo etc., the embodiment of the present invention is not construed as limiting, wherein, this file destination can carry some information, as addressee information.
Recognition unit 402, for identifying whether file destination is encrypted.
In the embodiment of the present invention, receiving element 401 is after the file destination receiving target terminal user transmission, recognition unit 402 can identify whether this file destination is encrypted, when recognition unit 402 identifies that this file destination is encrypt file, after user terminal needs to be decrypted this file destination, user just can see the content that this file destination carries, and when recognition unit 402 identifies that this file destination is not encrypted, user terminal can terminate current process.
Collecting unit 403, for when recognition unit 402 identifies that file destination is encrypted, gathers the biological information of user.
In the embodiment of the present invention, in order to prevent the leakage of file destination, the safety of protection information, target terminal user, before transmission file destination, uses the biological information of the addressee of this file destination to encrypt this file destination.Wherein, this biological information can comprise the combination of any one or more in iris feature information, fingerprint feature information, face characteristic information and vocal print characteristic information.This user is the current user using user terminal.
Judging unit 404, for judging whether the biological information of user mates with the target biometric information be encrypted file destination.
In the embodiment of the present invention, judging unit 404 judges whether the biological information of user mates with the target biometric information be encrypted file destination, wherein, this target biometric information is biological information corresponding to the targeted recipient of this file destination, and this target biometric information can comprise the combination of any one or more in target iris feature information, target fingerprint characteristic information, target face characteristic information and target vocal print characteristic information.
Decryption unit 405, during for judging the biological information of user and the target biometric information matches be encrypted file destination when judging unit 404, is decrypted file destination.
In the embodiment of the present invention, after the biological information that judging unit 404 judges user and the target biometric information matches that file destination is encrypted, decryption unit 405 can use the biological information of this user to be decrypted file destination, after deciphering, user just can see the content of carrying in the file destination of user terminal displays, as the text message in addressee information, file, accessory information etc.
In the embodiment of the present invention, biological information due to everyone is unique, therefore, this mode file destination is encrypted by biological information, can prevent disabled user from stealing the content of this file destination, meanwhile, when fat file is to other people for user terminal by mistake, the leakage of confidential information or privacy information can also be prevented.
Refer to Fig. 5, Fig. 5 is the structural representation of another kind of user terminal disclosed in the embodiment of the present invention, wherein, user terminal shown in Fig. 5 is that the enterprising one-step optimization in basis of user terminal shown in Fig. 4 obtains, compared with the user terminal shown in Fig. 4, user terminal shown in Fig. 5, except all unit comprising the user terminal shown in Fig. 4, can also comprise:
Detecting unit 406, for after the file destination that sends at receiving element 401 receiving target user terminal, and before recognition unit 402 identifies whether file destination is encrypted, detects the instruction of biological information encryption and decryption.
In the embodiment of the present invention, this biological information encryption and decryption instruction can trigger generation by targets option.User terminal can detect targets option open command in advance, and responds targets option open command, opens targets option, and like this, user terminal just can trigger and generate the instruction of biological information encryption and decryption.Wherein, the mode that this targets option open command can be inputted by user triggers, such as, user arrange interface click targets option release the button or the slider bar of targets option slided into the position of unlatching, or user clicks targets option and releases the button or the slider bar of targets option slided into the position of unlatching at mail transmission/reception interface; This targets option open command also can be the instruction of input automatically, such as, automatically opens targets option etc. at special time.
Above-mentioned recognition unit 402, specifically for the instruction of response biological information encryption and decryption, identifies whether file destination is encrypted.
As the optional embodiment of one, the user terminal 400 shown in Fig. 5 can also comprise:
First acquiring unit 407, for identify file destination encryption at recognition unit 402 after, and before the biological information gathering user at collecting unit 403, obtains the targeted recipient information that file destination carries.
In the embodiment of the present invention, target terminal user by internet transmission file destination before, user needs in target terminal user, input targeted recipient information, this targeted recipient information is generally the network address that targeted recipient receives file, as e-mail address, this e-mail address is made up of three parts usually: the account number of Part I " USER " representative of consumer mailbox, and for same mail reception server, this account number must be unique; Part II " " is separator; Part III is the mail reception server domain name of letter box, in order to indicate the position at its place.For example, this e-mail address is litingqq.com.
Extraction unit 408, for targeted recipient information for foundation, from the biological attribute data storehouse that this locality stores, extract the target biometric information that the targeted recipient information that is encrypted file destination is corresponding.
In the embodiment of the present invention, user terminal in advance by biological attribute data library storage in this locality, store the target biometric information of multiple targeted recipient in this biological attribute data storehouse, and establish the corresponding relation between targeted recipient and target biometric information.After the first acquiring unit 407 gets the targeted recipient information that file destination carries, extraction unit 408 just can with targeted recipient information for foundation, the target biometric information that query aim addressee information is corresponding from the biological attribute data storehouse that this locality stores, like this, extraction unit 408 just can extract the target biometric information that file destination is encrypted.
As the optional embodiment of another kind, the user terminal 400 shown in Fig. 5 can also comprise:
Display unit 409, for the content of display-object file.
In the embodiment of the present invention, when recognition unit 402 identifies that file destination is not encrypted, display unit 409 can the content of direct display-object file, or, when recognition unit 402 identifies that file destination is encrypted, after decryption unit 405 pairs of file destinations are decrypted, display unit 409 also can the content of display-object file, wherein, the content of this file destination can include but not limited to addressee information, text message in file, accessory information etc., addressee information can be the name on account of addressee, text message in file can be word, picture and music etc., accessory information can be word document, condensed document and PDF document etc., the embodiment of the present invention is not construed as limiting.
Refer to Fig. 6, Fig. 6 is the structural representation of another kind of user terminal disclosed in the embodiment of the present invention, wherein, user terminal shown in Fig. 6 is that the enterprising one-step optimization in basis of user terminal shown in Fig. 4 obtains, compared with the user terminal shown in Fig. 4, user terminal shown in Fig. 6, except all unit comprising the user terminal shown in Fig. 4, can also comprise:
Detecting unit 406, for after the file destination that sends at receiving element 401 receiving target user terminal, and before recognition unit 402 identifies whether file destination is encrypted, detects the instruction of biological information encryption and decryption.
Above-mentioned recognition unit 402, specifically for the instruction of response biological information encryption and decryption, identifies whether file destination is encrypted.
Display unit 409, for the content of display-object file.
Second acquisition unit 410, for identify file destination encryption at recognition unit 402 after, and before the biological information gathering single 403 collection users, obtains the target biometric information be encrypted file destination that file destination carries.
In the embodiment of the present invention, target terminal user is before transmission file destination, target terminal user just with targeted recipient information for foundation, the target biometric information that the targeted recipient information that is encrypted file destination is corresponding is extracted from the biological attribute data storehouse that this locality stores, after to file destination encryption, the file destination carrying target biometric information is just sent to user terminal by target terminal user.After recognition unit 402 identifies file destination encryption, second acquisition unit 410 just can obtain the target biometric information be encrypted file destination that file destination carries.
Refer to Fig. 7, Fig. 7 is the structural representation of another kind of user terminal disclosed in the embodiment of the present invention, wherein, user terminal shown in Fig. 7 is that the enterprising one-step optimization in basis of user terminal shown in Fig. 4 obtains, compared with the user terminal shown in Fig. 4, user terminal shown in Fig. 7 is except all unit comprising the user terminal shown in Fig. 4, and collecting unit 403 can comprise:
First promoter unit 4031, for starting photographing module.
First gathers subelement 4032, for being gathered the iris image of user by photographing module.
First extracts subelement 4033, for extracting iris feature information from iris image.
In the embodiment of the present invention, when this biological information comprises iris feature information, recognition unit 402 is after the encryption of identification file destination, first promoter unit 4031 can start photographing module, camera as built-in in user terminal, first gathers subelement 4032 gathers user iris image by photographing module, further, user terminal can do further Image semantic classification to this iris image, such as: Iris Location, iris image normalization and image enhaucament etc., after Image semantic classification is carried out to iris image, first extracts subelement 4033 just can adopt specific algorithm from pretreated iris image, extract iris feature information needed for iris recognition.
Judging unit 404 is specifically for judging whether iris feature information mates with the target iris feature information be encrypted file destination, if coupling, then determines the biological information of user and the target biometric information matches be encrypted file destination.
Refer to Fig. 8, Fig. 8 is the structural representation of another kind of user terminal disclosed in the embodiment of the present invention, wherein, user terminal shown in Fig. 8 is that the enterprising one-step optimization in basis of user terminal shown in Fig. 4 obtains, compared with the user terminal shown in Fig. 4, user terminal shown in Fig. 8 is except all unit comprising the user terminal shown in Fig. 4, and collecting unit 403 can comprise:
Second promoter unit 4034, for starting photographing module.
Second gathers subelement 4035, for being gathered the facial image of user by photographing module.
Second extracts subelement 4036, for extracting face characteristic information from facial image.
In the embodiment of the present invention, when this biological information comprises face characteristic information, recognition unit 402 is after the encryption of identification file destination, second promoter unit 4034 can start photographing module, camera as built-in in user terminal, second gathers subelement 4035 gathers user facial image by photographing module, further, user terminal can do further Image semantic classification to this facial image, such as: the light compensation of facial image, greyscale transformation, histogram equalization, normalization, geometry correction, filtering and sharpening etc., after pre-service is carried out to facial image, second extracts subelement 4036 can extract according to the shape description of human face and the range performance between them characteristic information contributing to face classification, as: face is by eyes, nose, mouth, the local such as chin is formed, second extract subelement 4036 can using to these local and between them the geometric description of structural relation as identifying the key character information of face, to extract face characteristic information.
Judging unit 404 is specifically for judging whether face characteristic information mates with the target face characteristic information be encrypted file destination, if coupling, then determines the biological information of user and the target biometric information matches be encrypted file destination.
Refer to Fig. 9, Fig. 9 is the structural representation of another kind of user terminal disclosed in the embodiment of the present invention, wherein, user terminal shown in Fig. 9 is that the enterprising one-step optimization in basis of user terminal shown in Fig. 4 obtains, compared with the user terminal shown in Fig. 4, user terminal shown in Fig. 9 is except all unit comprising the user terminal shown in Fig. 4, and collecting unit 403 can comprise:
3rd promoter unit 4037, for starting sound acquisition module.
Export subelement 4038, for exporting the information for pointing out input speech signal.
Receive subelement 4039, for being received the voice signal that user inputs for information by sound acquisition module.
3rd extracts subelement 40310, for extracting vocal print characteristic information from voice signal.
In the embodiment of the present invention, because everyone vocal organs are not quite similar, in the ordinary course of things, people still can distinguish the sound of different people or determine whether the sound that same person sends, and therefore, can be distinguished the identity of user by sound groove recognition technology in e.
In the embodiment of the present invention, when this biological information comprises vocal print characteristic information, recognition unit 402 is after the encryption of identification file destination, 3rd promoter unit 4037 can start sound acquisition module, microphones module as built-in in user terminal, further, output subelement 4038 can export the information for pointing out input speech signal, receive the voice signal that subelement 4039 is inputted for information by sound acquisition module reception user, 3rd extracts subelement 40310 extracts vocal print characteristic information from voice signal, wherein, vocal print is the sound wave spectrum carrying voice messaging, the vocal print characteristic information that user terminal extracts is strong for having resolvability, the acoustics of the characteristics such as stability is high or language feature.
Judging unit 404 is specifically for judging whether vocal print characteristic information mates with the target vocal print characteristic information be encrypted file destination, if coupling, then determines the biological information of user and the target biometric information matches be encrypted file destination.
In the user terminal 400 described by Fig. 4 ~ Fig. 9, the file destination that receiving element 401 receiving target user terminal sends, recognition unit 402 identifies whether file destination is encrypted, when identifying file destination encryption, collecting unit 403 gathers the biological information of user, judging unit 404 judges whether the biological information of user mates with the target biometric information be encrypted file destination, if coupling, then decryption unit 405 pairs of file destinations are decrypted.Pass through the embodiment of the present invention, receiving element 401 is after the file destination receiving target terminal user transmission, user terminal only needs the biological information of user to mate with the target biometric information be encrypted file destination, after judging unit 404 judges that the match is successful, when user terminal determines this user for validated user, decryption unit 405 just can be decrypted file destination, after deciphering, user just can see the content in file destination, thus can improve the security of information.
It should be noted that, for each embodiment of the method aforesaid, in order to simple description, therefore it is all expressed as a series of combination of actions, but those skilled in the art should know, the application is not by the restriction of described sequence of movement, because according to the application, certain some step can adopt other orders or carry out simultaneously.Secondly, those skilled in the art also should know, the embodiment described in instructions all belongs to preferred embodiment, and involved action and unit might not be that the application is necessary.
In the above-described embodiments, the description of each embodiment is all emphasized particularly on different fields, in certain embodiment, there is no the part described in detail, can see the associated description of other embodiments.
One of ordinary skill in the art will appreciate that all or part of flow process realized in above-described embodiment method, that the hardware that can carry out instruction relevant by computer program has come, described program can be stored in computer read/write memory medium, this program, when performing, can comprise the flow process of the embodiment as above-mentioned each side method.Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-OnlyMemory, ROM) or random store-memory body (RandomAccessMemory, RAM) etc.
Above disclosedly be only present pre-ferred embodiments, certainly can not limit the interest field of the present invention with this, therefore according to the equivalent variations that the claims in the present invention are done, still belong to the scope that the present invention is contained.

Claims (10)

1. an information security processing method, is characterized in that, comprising:
The file destination that receiving target user terminal sends;
Identify whether described file destination is encrypted;
When identifying the encryption of described file destination, gather the biological information of user;
Judge whether the biological information of described user mates with the target biometric information be encrypted described file destination;
If coupling, be then decrypted described file destination.
2. method according to claim 1, is characterized in that, after the file destination that described receiving target user terminal sends, and before whether the described file destination of described identification encrypt, described method also comprises:
Detect the instruction of biological information encryption and decryption;
Whether the described file destination of described identification is encrypted, and comprising:
Respond the instruction of described biological information encryption and decryption, identify whether described file destination is encrypted.
3. method according to claim 2, is characterized in that, after the described file destination encryption of identification, and before the biological information of described collection user, described method also comprises:
Obtain the targeted recipient information that described file destination carries;
With described targeted recipient information for foundation, from the biological attribute data storehouse that this locality stores, extract the target biometric information that the described targeted recipient information that is encrypted described file destination is corresponding.
4. method according to claim 2, is characterized in that, after the described file destination encryption of identification, and before the biological information of described collection user, described method also comprises:
Obtain the target biometric information that described file destination is encrypted that described file destination carries.
5. the method according to any one of Claims 1 to 4, it is characterized in that, described biological information comprises the combination of any one or more in iris feature information, face characteristic information, fingerprint feature information and vocal print characteristic information, and described target biometric information comprises the combination of any one or more in target iris feature information, target face characteristic information, target fingerprint characteristic information and target vocal print characteristic information.
6. a user terminal, is characterized in that, comprising:
Receiving element, for the file destination that receiving target user terminal sends;
Recognition unit, for identifying whether described file destination is encrypted;
Collecting unit, for when file destination described in described recognition unit identification is encrypted, gathers the biological information of user;
Judging unit, for judging whether the biological information of described user mates with the target biometric information be encrypted described file destination;
Decryption unit, during for judging the biological information of described user and the target biometric information matches be encrypted described file destination when described judging unit, is decrypted described file destination.
7. user terminal according to claim 6, is characterized in that, described user terminal also comprises:
Detecting unit, for after the file destination of described receiving element receiving target user terminal transmission, and before whether file destination is encrypted described in described recognition unit identification, detects the instruction of biological information encryption and decryption;
Described recognition unit, specifically for responding the instruction of described biological information encryption and decryption, identifies whether described file destination is encrypted.
8. user terminal according to claim 7, is characterized in that, described user terminal also comprises:
First acquiring unit, for after file destination encryption described in described recognition unit identification, and before the biological information of described collecting unit collection user, obtains the targeted recipient information that described file destination carries;
Extraction unit, for described targeted recipient information for foundation, from the biological attribute data storehouse that this locality stores, extract the target biometric information that the described targeted recipient information that is encrypted described file destination is corresponding.
9. user terminal according to claim 7, is characterized in that, described user terminal also comprises:
Second acquisition unit, for after file destination encryption described in described recognition unit identification, and before the biological information of described collecting unit collection user, obtain the target biometric information that described file destination is encrypted that described file destination carries.
10. the user terminal according to any one of claim 6 ~ 9, it is characterized in that, described biological information comprises the combination of any one or more in iris feature information, face characteristic information, fingerprint feature information and vocal print characteristic information, and described target biometric information comprises the combination of any one or more in target iris feature information, target face characteristic information, target fingerprint characteristic information and target vocal print characteristic information.
CN201510334582.1A 2015-06-16 2015-06-16 Information security processing method and user terminal Pending CN105574387A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510334582.1A CN105574387A (en) 2015-06-16 2015-06-16 Information security processing method and user terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510334582.1A CN105574387A (en) 2015-06-16 2015-06-16 Information security processing method and user terminal

Publications (1)

Publication Number Publication Date
CN105574387A true CN105574387A (en) 2016-05-11

Family

ID=55884508

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510334582.1A Pending CN105574387A (en) 2015-06-16 2015-06-16 Information security processing method and user terminal

Country Status (1)

Country Link
CN (1) CN105574387A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107506111A (en) * 2017-08-30 2017-12-22 维沃移动通信有限公司 The encryption and decryption method and terminal of a kind of terminal applies
CN108287855A (en) * 2017-01-10 2018-07-17 阿里巴巴集团控股有限公司 Data identification method and device, interface alternation device based on social worker library
WO2019023886A1 (en) * 2017-07-31 2019-02-07 深圳传音通讯有限公司 Smart terminal-based image storage method and image storage system
CN110619228A (en) * 2019-09-23 2019-12-27 珠海格力电器股份有限公司 File decryption method, file encryption method, file management system and storage medium
CN112671782A (en) * 2020-12-28 2021-04-16 福建网龙计算机网络信息技术有限公司 File encryption method and terminal

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060158307A1 (en) * 2005-01-13 2006-07-20 Samsung Electronics Co., Ltd. System and method for face recognition
CN101221612A (en) * 2007-01-11 2008-07-16 上海银晨智能识别科技有限公司 Method for enciphering and deciphering electric document file by face recognition
CN101815063A (en) * 2009-12-04 2010-08-25 强敏 File security management system applied to network and management method thereof
CN101977197A (en) * 2010-10-29 2011-02-16 西安电子科技大学 Multi-receiver encryption method based on biological characteristics
CN103200009A (en) * 2013-04-11 2013-07-10 迪士恩信息科技(上海)有限公司 System and method for fingerprint encryption and decryption
CN103400082A (en) * 2013-08-16 2013-11-20 中科创达软件股份有限公司 File encryption/decryption method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060158307A1 (en) * 2005-01-13 2006-07-20 Samsung Electronics Co., Ltd. System and method for face recognition
CN101221612A (en) * 2007-01-11 2008-07-16 上海银晨智能识别科技有限公司 Method for enciphering and deciphering electric document file by face recognition
CN101815063A (en) * 2009-12-04 2010-08-25 强敏 File security management system applied to network and management method thereof
CN101977197A (en) * 2010-10-29 2011-02-16 西安电子科技大学 Multi-receiver encryption method based on biological characteristics
CN103200009A (en) * 2013-04-11 2013-07-10 迪士恩信息科技(上海)有限公司 System and method for fingerprint encryption and decryption
CN103400082A (en) * 2013-08-16 2013-11-20 中科创达软件股份有限公司 File encryption/decryption method and system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108287855A (en) * 2017-01-10 2018-07-17 阿里巴巴集团控股有限公司 Data identification method and device, interface alternation device based on social worker library
WO2019023886A1 (en) * 2017-07-31 2019-02-07 深圳传音通讯有限公司 Smart terminal-based image storage method and image storage system
CN107506111A (en) * 2017-08-30 2017-12-22 维沃移动通信有限公司 The encryption and decryption method and terminal of a kind of terminal applies
CN110619228A (en) * 2019-09-23 2019-12-27 珠海格力电器股份有限公司 File decryption method, file encryption method, file management system and storage medium
CN112671782A (en) * 2020-12-28 2021-04-16 福建网龙计算机网络信息技术有限公司 File encryption method and terminal
CN112671782B (en) * 2020-12-28 2023-03-14 福建网龙计算机网络信息技术有限公司 File encryption method and terminal

Similar Documents

Publication Publication Date Title
CN105335643B (en) The processing method and processing system of file
CN105574387A (en) Information security processing method and user terminal
CN103366745B (en) Based on method and the terminal device thereof of speech recognition protection terminal device
EP2739006A1 (en) Validation processing method, user equipment, and server
CN102902935A (en) Mobile terminal privacy protection method and device
CN109117665A (en) Realize method for secret protection and device
CN103606047A (en) Password management system
CN104717360A (en) Call recording method and terminal
CN104935440A (en) Authentication method and authentication device for remote opening of financial account
CN105975837B (en) Calculate equipment, biological feather recognition method and template register method
CN103164645A (en) Information security management method and mobile terminal
CN104778392A (en) Privilege validation method and system on basis of biological identification
CN104318201A (en) Fingerprint processing method, chip and terminal
CN105827409A (en) Identity verification method and device
CN104392162A (en) Authentication method and smart card
CN104036200A (en) Fingerprint based data classifying and encrypting method and system and mobile terminal
CN105426727B (en) Fingerprint decryption method and mobile terminal
WO2020073916A1 (en) Encryption method and apparatus for storage device, and storage medium
Yusuf et al. A survey of biometric approaches of authentication
CN105550556A (en) Information encryption method and terminal device
CN108073820A (en) Security processing, device and the mobile terminal of data
CN106170794A (en) A kind of information processing method and mobile terminal
CN102385673B (en) Human body lock
CN106355112A (en) Method of destructing data in encrypted mobile storage device and server
US20200026866A1 (en) Method and device for covering private data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160511