CN105631290A - Safe file operation method and device as well as terminal - Google Patents

Safe file operation method and device as well as terminal Download PDF

Info

Publication number
CN105631290A
CN105631290A CN201510867972.5A CN201510867972A CN105631290A CN 105631290 A CN105631290 A CN 105631290A CN 201510867972 A CN201510867972 A CN 201510867972A CN 105631290 A CN105631290 A CN 105631290A
Authority
CN
China
Prior art keywords
file
default
default file
iris
iris information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510867972.5A
Other languages
Chinese (zh)
Inventor
陈少鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dongguan Coolpad Software Technology Co Ltd
Original Assignee
Dongguan Coolpad Software Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dongguan Coolpad Software Technology Co Ltd filed Critical Dongguan Coolpad Software Technology Co Ltd
Priority to CN201510867972.5A priority Critical patent/CN105631290A/en
Priority to PCT/CN2016/080832 priority patent/WO2017092228A1/en
Publication of CN105631290A publication Critical patent/CN105631290A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a safe file operation method, a safe file operation device and a terminal. The safe file operation method comprises the following steps: receiving an operation instruction for a preset file; starting an iris service according to the operation instruction to obtain the iris information of the current user; judging whether the iris information is preset iris information associated with the preset file; and determining whether the current user is endowed with an authority for operating the preset file according to the judging result. Through the technical scheme, the safety of the file operations such as access, deletion and edition can be effectively improved, the information can be prevented from leaking and/or being tampered randomly and then the user experience is enhanced.

Description

File security operations method, device and terminal
Technical field
The present invention relates to field of terminal technology, in particular to a kind of file security operations method, a kind of file security operations device and a kind of terminal.
Background technology
At present, for vital document, processing to prevent other people steal files information from it can be carried out some, existing conventional solution includes: document body is processed by (1), such as: encryption file, namely utilize existing encryption technology that file is encrypted; Hidden file. (2) file address is processed, namely set and access directory permission.
But, there is following defect in above two technical scheme: (1) encryption standard exists the risk being decrypted, and hidden file can make it show by corresponding operating; (2) directory permission can be modified, as long as obtaining the highest root authority (a kind of System Privileges) directory permission can be revised, thus steal files information.
Therefore, the access security of file how is improved, it is to avoid information leakage, thus the experience promoting user becomes technical problem urgently to be resolved hurrily.
Summary of the invention
The present invention is based on above-mentioned technical problem, propose a kind of new technical scheme, it is possible to be effectively improved the safety that file is operated, such as the operation such as access, deletion and editor, avoid information leakage and/or arbitrarily distorted, improving the experience of user.
In view of this, first aspect of the present invention it is proposed a kind of file security operations method, including: receive the operational order to default file; Iris service is opened, to obtain the iris information of active user according to described operational order; Judge whether described iris information is the default iris information associated with described default file; Determine whether to authorize the authority of default file described in described current user operation according to judged result.
In this technical scheme, when receiving the operational order of the default file in terminal, this default file is chosen as by click, open the iris information of iris service acquisition active user, and this iris information is compared with the default iris information (can have one or more) associated of this default file, and then determine whether that this default file is conducted interviews by this active user according to result, delete, the operations such as editor, what wherein default file can be that terminal use is arranged any is not desired to the text file that other users arbitrarily use, picture file, audio file and video file etc., so, by the iris information with uniqueness is bound with file, and then when to file operation, verify the legitimacy of the iris information collected, the safety that file is operated can be effectively improved, avoid information leakage and/or arbitrarily distorted, improve the experience of user.
In technique scheme, it is preferable that described determine whether to authorize the authority of default file described in described current user operation according to judged result, specifically include: when described judged result is for being, it is allowed to default file described in described current user operation; When described judged result is no, hide described default file, to refuse default file described in described current user operation.
In this technical scheme, when the iris information judging the active user got is the default iris information associated with default file, then can allow this active user that this default file is operated, on the contrary, automatically hide this default file, make this default file that active user is invisible, this default file is carried out any operation refusing this active user, so that it is guaranteed that the safety that file is operated, it is to avoid information leakage or maloperation.
In any of the above-described technical scheme, it is preferable that when described judged result is no, also include: arrange delay time, to hide described default file in described delay time.
In this technical scheme, when the iris information judging the active user got is not the default iris information associated with default file, the delay time (such as 5 minutes) that default file is hidden can also be set, to refuse any operation to this default file within this period, while guaranteeing the safety that file is operated, can be effectively prevented from identical illegal request is made duplicate responses, power consumption of terminal can be effectively reduced, promote the experience of user further.
In any of the above-described technical scheme, it is preferable that also include: add up the hiding time of described default file; When judging that the described hiding time reaches described delay time, automatically show described default file.
In this technical scheme, when judge the iris information of active user got be not default iris information associate with default file and by this default file hiding after, can start to add up its hiding time, and compare with the delay time arranged, when the hiding time reaches the delay time arranged, preferably automatically show this default file, for user, this default file is continued operation, improve intelligent; Or, when the hiding time reaches the delay time arranged, it is possible to point out user in modes such as file, sound or bright lights, user choose whether to cancel at once hide and again show this default file, more hommization, all can promote the experience of user further.
In any of the above-described technical scheme, it is preferable that when described judged result be whether time, also include: close described iris service, repeat application and operate described default file refusing described active user.
In this technical scheme, when judge the iris information of active user got be not default iris information associate with default file and by this default file hiding after, the iris service preferably can also directly closed a terminal, namely any iris information is no longer obtained, so that this active user cannot apply for this default file is operated again, provide the double shield guaranteeing file operation safety, thus further increasing the safety that file is operated, can simultaneously be effectively reduce power consumption of terminal, thus improving the experience of user.
According to the second aspect of the invention, it is proposed that a kind of file security operations device, including: receiver module, for receiving the operational order to default file; Acquisition module, for opening iris service according to described operational order, to obtain the iris information of active user; Judge module, for judging whether described iris information is the default iris information associated with described default file; Processing module, for determining whether to authorize the authority of default file described in described current user operation according to judged result.
In this technical scheme, when receiving the operational order of the default file in terminal, this default file is chosen as by click, open the iris information of iris service acquisition active user, and this iris information is compared with the default iris information (can have one or more) associated of this default file, and then determine whether that this default file is conducted interviews by this active user according to result, delete, the operations such as editor, what wherein default file can be that terminal use is arranged any is not desired to the text file that other users arbitrarily use, picture file, audio file and video file etc., so, by the iris information with uniqueness is bound with file, and then when to file operation, verify the legitimacy of the iris information collected, the safety that file is operated can be effectively improved, avoid information leakage and/or arbitrarily distorted, improve the experience of user.
In technique scheme, it is preferable that described processing module specifically for: when described judged result is for being, it is allowed to default file described in described current user operation, otherwise, hide described default file, to refuse default file described in described current user operation.
In this technical scheme, when the iris information judging the active user got is the default iris information associated with default file, then can allow this active user that this default file is operated, on the contrary, automatically hide this default file, make this default file that active user is invisible, this default file is carried out any operation refusing this active user, so that it is guaranteed that the safety that file is operated, it is to avoid information leakage or maloperation.
In any of the above-described technical scheme, it is preferable that also include: arrange module, for when described judged result is no, arranging delay time, to hide described default file in described delay time.
In this technical scheme, when the iris information judging the active user got is not the default iris information associated with default file, the delay time (such as 5 minutes) that default file is hidden can also be set, to refuse any operation to this default file within this period, while guaranteeing the safety that file is operated, can be effectively prevented from identical illegal request is made duplicate responses, power consumption of terminal can be effectively reduced, promote the experience of user further.
In any of the above-described technical scheme, it is preferable that also include: timing module, for adding up the hiding time of described default file; And described processing module is additionally operable to: when judging that the described hiding time reaches described delay time, automatically show described default file.
In this technical scheme, when judge the iris information of active user got be not default iris information associate with default file and by this default file hiding after, can start to add up its hiding time, and compare with the delay time arranged, when the hiding time reaches the delay time arranged, preferably automatically show this default file, for user, this default file is continued operation, improve intelligent; Or, when the hiding time reaches the delay time arranged, it is possible to point out user in modes such as file, sound or bright lights, user choose whether to cancel at once hide and again show this default file, more hommization, all can promote the experience of user further.
In any of the above-described technical scheme, it is preferable that described processing module is additionally operable to: when described judged result is for whether, close described iris service, repeat application and operate described default file refusing described active user.
In this technical scheme, when judge the iris information of active user got be not default iris information associate with default file and by this default file hiding after, the iris service preferably can also directly closed a terminal, namely any iris information is no longer obtained, so that this active user cannot apply for this default file is operated again, provide the double shield guaranteeing file operation safety, thus further increasing the safety that file is operated, can simultaneously be effectively reduce power consumption of terminal, thus improving the experience of user.
A third aspect of the present invention, propose a kind of terminal, including the file security operations device according to any one of technique scheme, therefore, this terminal has the technique effect identical with the file security operations device according to any one of technique scheme, does not repeat them here.
By above technical scheme, it is possible to be effectively improved the safety that file is operated, such as access, delete and the operation such as editor, it is to avoid information leakage and/or arbitrarily distorted, improve the experience of user.
Accompanying drawing explanation
Fig. 1 illustrates the schematic flow sheet of file security operations method according to an embodiment of the invention;
Fig. 2 illustrates the block diagram of file security operations device according to an embodiment of the invention;
Fig. 3 illustrates the block diagram of terminal according to an embodiment of the invention.
Detailed description of the invention
In order to be more clearly understood that the above-mentioned purpose of the present invention, feature and advantage, below in conjunction with the drawings and specific embodiments, the present invention is further described in detail. It should be noted that when not conflicting, embodiments herein and the feature in embodiment can be mutually combined.
Elaborate a lot of detail in the following description so that fully understanding the present invention; but; the present invention can also adopt other to be different from other modes described here to implement, and therefore, protection scope of the present invention is by the restriction of following public specific embodiment.
Fig. 1 illustrates the schematic flow sheet of file security operations method according to an embodiment of the invention.
As it is shown in figure 1, file security operations method according to an embodiment of the invention, including: step 102, receive the operational order to default file; Step 104, opens iris service according to described operational order, to obtain the iris information of active user; Step 106, it is judged that whether described iris information is the default iris information associated with described default file; Step 108, determines whether to authorize the authority of default file described in described current user operation according to judged result.
In this technical scheme, when receiving the operational order of the default file in terminal, this default file is chosen as by click, open the iris information of iris service acquisition active user, and this iris information is compared with the default iris information (can have one or more) associated of this default file, and then determine whether that this default file is conducted interviews by this active user according to result, delete, the operations such as editor, what wherein default file can be that terminal use is arranged any is not desired to the text file that other users arbitrarily use, picture file, audio file and video file etc., so, by the iris information with uniqueness is bound with file, and then when to file operation, verify the legitimacy of the iris information collected, the safety that file is operated can be effectively improved, avoid information leakage and/or arbitrarily distorted, improve the experience of user.
In technique scheme, it is preferable that described step 108 specifically includes: when described judged result is for being, it is allowed to default file described in described current user operation; When described judged result is no, hide described default file, to refuse default file described in described current user operation.
In this technical scheme, when the iris information judging the active user got is the default iris information associated with default file, then can allow this active user that this default file is operated, on the contrary, automatically hide this default file, make this default file that active user is invisible, this default file is carried out any operation refusing this active user, so that it is guaranteed that the safety that file is operated, it is to avoid information leakage or maloperation.
In any of the above-described technical scheme, it is preferable that when described judged result is no, also include: arrange delay time, to hide described default file in described delay time.
In this technical scheme, when the iris information judging the active user got is not the default iris information associated with default file, the delay time (such as 5 minutes) that default file is hidden can also be set, to refuse any operation to this default file within this period, while guaranteeing the safety that file is operated, can be effectively prevented from identical illegal request is made duplicate responses, power consumption of terminal can be effectively reduced, promote the experience of user further.
In any of the above-described technical scheme, it is preferable that also include: add up the hiding time of described default file; When judging that the described hiding time reaches described delay time, automatically show described default file.
In this technical scheme, when judge the iris information of active user got be not default iris information associate with default file and by this default file hiding after, can start to add up its hiding time, and compare with the delay time arranged, when the hiding time reaches the delay time arranged, preferably automatically show this default file, for user, this default file is continued operation, improve intelligent; Or, when the hiding time reaches the delay time arranged, it is possible to point out user in modes such as file, sound or bright lights, user choose whether to cancel at once hide and again show this default file, more hommization, all can promote the experience of user further.
In any of the above-described technical scheme, it is preferable that when described judged result be whether time, also include: close described iris service, repeat application and operate described default file refusing described active user.
In this technical scheme, when judge the iris information of active user got be not default iris information associate with default file and by this default file hiding after, the iris service preferably can also directly closed a terminal, namely any iris information is no longer obtained, so that this active user cannot apply for this default file is operated again, provide the double shield guaranteeing file operation safety, thus further increasing the safety that file is operated, can simultaneously be effectively reduce power consumption of terminal, thus improving the experience of user.
Fig. 2 illustrates the block diagram of file security operations device according to an embodiment of the invention.
As in figure 2 it is shown, file security operations device 200 according to an embodiment of the invention, including: receiver module 202, acquisition module 204, judge module 206 and processing module 208.
Wherein, receiver module 202, for receiving the operational order to default file; Acquisition module 204, for opening iris service according to described operational order, to obtain the iris information of active user; Judge module 206, for judging whether described iris information is the default iris information associated with described default file; Processing module 208, for determining whether to authorize the authority of default file described in described current user operation according to judged result.
In this technical scheme, when receiving the operational order of the default file in terminal, this default file is chosen as by click, open the iris information of iris service acquisition active user, and this iris information is compared with the default iris information (can have one or more) associated of this default file, and then determine whether that this default file is conducted interviews by this active user according to result, delete, the operations such as editor, what wherein default file can be that terminal use is arranged any is not desired to the text file that other users arbitrarily use, picture file, audio file and video file etc., so, by the iris information with uniqueness is bound with file, and then when to file operation, verify the legitimacy of the iris information collected, the safety that file is operated can be effectively improved, avoid information leakage and/or arbitrarily distorted, improve the experience of user.
In technique scheme, it is preferable that described processing module 208 specifically for: when described judged result is for being, allow default file described in described current user operation, otherwise, described default file is hidden, to refuse default file described in described current user operation.
In this technical scheme, when the iris information judging the active user got is the default iris information associated with default file, then can allow this active user that this default file is operated, on the contrary, automatically hide this default file, make this default file that active user is invisible, this default file is carried out any operation refusing this active user, so that it is guaranteed that the safety that file is operated, it is to avoid information leakage or maloperation.
In any of the above-described technical scheme, it is preferable that also include: arrange module 210, for when described judged result is no, arranging delay time, to hide described default file in described delay time.
In this technical scheme, when the iris information judging the active user got is not the default iris information associated with default file, the delay time (such as 5 minutes) that default file is hidden can also be set, to refuse any operation to this default file within this period, while guaranteeing the safety that file is operated, can be effectively prevented from identical illegal request is made duplicate responses, power consumption of terminal can be effectively reduced, promote the experience of user further.
In any of the above-described technical scheme, it is preferable that also include: timing module 212, for adding up the hiding time of described default file; And described processing module 208 is additionally operable to: when judging that the described hiding time reaches described delay time, automatically show described default file.
In this technical scheme, when judge the iris information of active user got be not default iris information associate with default file and by this default file hiding after, can start to add up its hiding time, and compare with the delay time arranged, when the hiding time reaches the delay time arranged, preferably automatically show this default file, for user, this default file is continued operation, improve intelligent; Or, when the hiding time reaches the delay time arranged, it is possible to point out user in modes such as file, sound or bright lights, user choose whether to cancel at once hide and again show this default file, more hommization, all can promote the experience of user further.
In any of the above-described technical scheme, it is preferable that described processing module 208 is additionally operable to: when described judged result is for whether, close described iris service, repeat application and operate described default file refusing described active user.
In this technical scheme, when judge the iris information of active user got be not default iris information associate with default file and by this default file hiding after, the iris service preferably can also directly closed a terminal, namely any iris information is no longer obtained, so that this active user cannot apply for this default file is operated again, provide the double shield guaranteeing file operation safety, thus further increasing the safety that file is operated, can simultaneously be effectively reduce power consumption of terminal, thus improving the experience of user.
Fig. 3 illustrates the block diagram of terminal according to an embodiment of the invention.
As shown in Figure 3, terminal 300 according to an embodiment of the invention, including the file security operations device 200 according to any one of technique scheme, therefore, this terminal 300 has the technique effect identical with the file security operations device 200 according to any one of technique scheme, does not repeat them here.
Below in conjunction with specific embodiment, technical scheme is described, including following process:
(1) iris capturing: open iris detection service, utilizes existing iris recognition technology to gather specific iris information, to mate iris main body (i.e. user).
Specifically, iris system interface at terminal unit, enable (startup) related control, use IPC (Inter-ProcessCommunication, interprocess communication) service of technical opening iris detection, namely the related hardware facility of terminal unit is utilized (such as, specific apparatus for making a video recording etc.) and existing Algorithm of Iris Recognition collection iris information, generate unique UID (UserIdentification, user identity proves, i.e. iris information), with in iris system interface identification iris main body label (label).
(2) iris binding: at iris system interface, the iris information using the iris main body gathered binds specific file (default file), after binding, the legitimacy of iris main body can be first verified when then clicking this specific file, this specific file could be operated after being proved to be successful, such as open access.
Concrete binding procedure, can pass through to add in ArrayList (tabular array) by the UID of each iris main body collected, wherein, use ArrayList to be easy to the UID of statistics and multiple iris main bodys of this specific file binding, then this ArrayList title is write in path_filename (path filename) field; When clicking this specific file, then first reading the value in path_filename field, default value is Empty_List (empty list).
(3) iris verification: open iris verification service, the legitimacy of the current iris information gathered of checking.
Specifically, when clicking this specific file (when receiving operational order), read the value in path_filename field, if non-Empty_List, then utilize reflex mechanism according to the UID in ArrayList name acquiring ArrayList, open iris verification service simultaneously, identify whether the UID of iris main body is present in ArrayList, if, this specific file can be operated.
(4) operation file: after being proved to be successful, gets final product operation file, in operation, if iris system detects strange iris main body, then hidden file, and closes iris service.
Specifically, if after iris system detects different iris main body UID (not namely being and the default iris information of default file binding), then send broadcast (broadcast), this specific file reception is after broadcast, onDestroy function (a kind of message response function) can be called and exit operation, and available delay technique is (such as, the schedule function (process scheduling function) of Timer (intervalometer)) hide this specific file, and close iris service, after time delay certain time, automatically show specific file.
To sum up; the technical scheme uniqueness by iris information; use iris recognition technology binding vital document; this vital document could be operated by the iris main body making only binding; efficiently solving the processing safety problem of vital document, this programme is practical equally for the individual privacy information protecting user simultaneously.
Describe technical scheme in detail above in association with accompanying drawing, it is possible to be effectively improved the safety that file is operated, such as access, delete and the operation such as editor, it is to avoid information leakage and/or arbitrarily distorted, improve the experience of user.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations. All within the spirit and principles in the present invention, any amendment of making, equivalent replacement, improvement etc., should be included within protection scope of the present invention.

Claims (11)

1. a file security operations method, it is characterised in that including:
Receive the operational order to default file;
Iris service is opened, to obtain the iris information of active user according to described operational order;
Judge whether described iris information is the default iris information associated with described default file;
Determine whether to authorize the authority of default file described in described current user operation according to judged result.
2. file security operations method according to claim 1, it is characterised in that described determine whether to authorize the authority of default file described in described current user operation according to judged result, specifically includes:
When described judged result is for being, it is allowed to default file described in described current user operation;
When described judged result is no, hide described default file, to refuse default file described in described current user operation.
3. file security operations method according to claim 2, it is characterised in that when described judged result is no, also include:
Delay time is set, to hide described default file in described delay time.
4. file security operations method according to claim 3, it is characterised in that also include:
Add up the hiding time of described default file;
When judging that the described hiding time reaches described delay time, automatically show described default file.
5. the file security operations method according to any one of claim 2 to 4, it is characterised in that when described judged result be whether time, also include:
Close described iris service, with refuse described active user repeat application operate described default file.
6. a file security operations device, it is characterised in that including:
Receiver module, for receiving the operational order to default file;
Acquisition module, for opening iris service according to described operational order, to obtain the iris information of active user;
Judge module, for judging whether described iris information is the default iris information associated with described default file;
Processing module, for determining whether to authorize the authority of default file described in described current user operation according to judged result.
7. file security operations device according to claim 6, it is characterized in that, described processing module specifically for: when described judged result is for being, allow default file described in described current user operation, otherwise, hide described default file, to refuse default file described in described current user operation.
8. file security operations device according to claim 7, it is characterised in that also include:
Module is set, for when described judged result is no, arranging delay time, to hide described default file in described delay time.
9. file security operations device according to claim 8, it is characterised in that also include:
Timing module, for adding up the hiding time of described default file; And
Described processing module is additionally operable to: when judging that the described hiding time reaches described delay time, automatically shows described default file.
10. the file security operations device according to any one of claim 7 to 9, it is characterised in that described processing module is additionally operable to:
When described judged result be whether time, close described iris service, repeat application and operate described default file refusing described active user.
11. a terminal, it is characterised in that including: the file security operations device as according to any one of claim 6 to 10.
CN201510867972.5A 2015-11-30 2015-11-30 Safe file operation method and device as well as terminal Pending CN105631290A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510867972.5A CN105631290A (en) 2015-11-30 2015-11-30 Safe file operation method and device as well as terminal
PCT/CN2016/080832 WO2017092228A1 (en) 2015-11-30 2016-04-29 Method and device for performing security operation on file, and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510867972.5A CN105631290A (en) 2015-11-30 2015-11-30 Safe file operation method and device as well as terminal

Publications (1)

Publication Number Publication Date
CN105631290A true CN105631290A (en) 2016-06-01

Family

ID=56046216

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510867972.5A Pending CN105631290A (en) 2015-11-30 2015-11-30 Safe file operation method and device as well as terminal

Country Status (2)

Country Link
CN (1) CN105631290A (en)
WO (1) WO2017092228A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106777386A (en) * 2017-02-16 2017-05-31 北京珠穆朗玛移动通信有限公司 Document display method and mobile terminal
CN107077217A (en) * 2016-09-28 2017-08-18 达闼科技(北京)有限公司 For the control method of electronic equipment, device and electronic equipment
CN108182351A (en) * 2017-12-26 2018-06-19 华中科技大学同济医学院附属协和医院 A kind of Automatic work system of high safety grade
CN108737649A (en) * 2018-05-10 2018-11-02 Oppo广东移动通信有限公司 A kind of method, apparatus and computer storage media sending file

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102955746A (en) * 2011-08-18 2013-03-06 北京爱国者信息技术有限公司 Read-only mode mobile storage device and data access method thereof
CN103927470A (en) * 2014-04-30 2014-07-16 北京释码大华科技有限公司 File encryption and decryption system and method based on iris recognition
CN104091106A (en) * 2014-07-11 2014-10-08 北京释码大华科技有限公司 Mouse and method supporting iris encryption
CN104239815A (en) * 2014-09-19 2014-12-24 西安凯虹电子科技有限公司 Electronic document encryption and decryption method and method based on iris identification
CN104268455A (en) * 2014-10-13 2015-01-07 深圳市中兴移动通信有限公司 Mobile terminal, and information protection method and device thereof

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104639517B (en) * 2013-11-15 2019-09-17 阿里巴巴集团控股有限公司 The method and apparatus for carrying out authentication using human body biological characteristics

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102955746A (en) * 2011-08-18 2013-03-06 北京爱国者信息技术有限公司 Read-only mode mobile storage device and data access method thereof
CN103927470A (en) * 2014-04-30 2014-07-16 北京释码大华科技有限公司 File encryption and decryption system and method based on iris recognition
CN104091106A (en) * 2014-07-11 2014-10-08 北京释码大华科技有限公司 Mouse and method supporting iris encryption
CN104239815A (en) * 2014-09-19 2014-12-24 西安凯虹电子科技有限公司 Electronic document encryption and decryption method and method based on iris identification
CN104268455A (en) * 2014-10-13 2015-01-07 深圳市中兴移动通信有限公司 Mobile terminal, and information protection method and device thereof

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107077217A (en) * 2016-09-28 2017-08-18 达闼科技(北京)有限公司 For the control method of electronic equipment, device and electronic equipment
WO2018058373A1 (en) * 2016-09-28 2018-04-05 达闼科技(北京)有限公司 Control method and apparatus for electronic device, and electronic device
CN106777386A (en) * 2017-02-16 2017-05-31 北京珠穆朗玛移动通信有限公司 Document display method and mobile terminal
CN108182351A (en) * 2017-12-26 2018-06-19 华中科技大学同济医学院附属协和医院 A kind of Automatic work system of high safety grade
CN108737649A (en) * 2018-05-10 2018-11-02 Oppo广东移动通信有限公司 A kind of method, apparatus and computer storage media sending file

Also Published As

Publication number Publication date
WO2017092228A1 (en) 2017-06-08

Similar Documents

Publication Publication Date Title
EP3100171B1 (en) Client authentication using social relationship data
WO2015169158A1 (en) Information protection method and system
US10411901B2 (en) Multi-user strong authentication token
CN105631290A (en) Safe file operation method and device as well as terminal
CN105631293A (en) Data access method, data access system and terminal
CN106446632A (en) Hide display starting device and hide display starting method for application programs
CN103813334A (en) Right control method and right control device
CN105790962B (en) Method, device and system for acquiring conference document
JP2009501964A (en) Apparatus and method for detecting and managing unauthenticated executable instructions on a wireless device
CN104639624A (en) Method and device for realizing remotely controlling entrance guard through mobile terminal
CN102624699A (en) Method and system for protecting data
US9489529B2 (en) Data security system
CN105577619B (en) Client login method, client and system
CN106534496A (en) Mobile terminal control method and system based on earphones, and mobile terminal
CN115810232A (en) Passage control method based on offline two-dimensional code and face characteristic value
WO2016078429A1 (en) Identity recognition method and apparatus
CN101694683A (en) Method for preventing Trojans ferrying via movable memories to steal files
CN108566389B (en) Cross-application fingerprint identity authentication method and device
CN111600701B (en) Private key storage method, device and storage medium based on blockchain
CN110233828B (en) Mobile office method and device based on block chain
CN105760777A (en) Safety information management method and system based on intelligent platform
CN110084947B (en) Access control information updating method and device
WO2016180234A1 (en) Method and apparatus for building secure environment
CN106453057A (en) Method and terminal for preventing short message from being stolen
Yun et al. A study on security requirments analysis through security threat modeling of home IoT appliance

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160601