CN105760733A - Data encrypting method and module and data accessing method and module - Google Patents

Data encrypting method and module and data accessing method and module Download PDF

Info

Publication number
CN105760733A
CN105760733A CN201610068365.7A CN201610068365A CN105760733A CN 105760733 A CN105760733 A CN 105760733A CN 201610068365 A CN201610068365 A CN 201610068365A CN 105760733 A CN105760733 A CN 105760733A
Authority
CN
China
Prior art keywords
data
finger
print cipher
user
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610068365.7A
Other languages
Chinese (zh)
Other versions
CN105760733B (en
Inventor
解宏彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Moruan Communication Technology Co Ltd
Original Assignee
Shanghai Moruan Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Moruan Communication Technology Co Ltd filed Critical Shanghai Moruan Communication Technology Co Ltd
Priority to CN201610068365.7A priority Critical patent/CN105760733B/en
Publication of CN105760733A publication Critical patent/CN105760733A/en
Application granted granted Critical
Publication of CN105760733B publication Critical patent/CN105760733B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2145Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy

Abstract

The invention relates to the field of information security, and discloses a data encrypting method and module and a data accessing method and module.The data encrypting method includes the following steps of providing an input prompting interface of a fingerprinting password when completing data recording, and binding data to the fingerprint password when receiving the fingerprint password input by a user.In this way, stored data is bound with the fingerprint password input by the user, that is, data is classified and encrypted according to fingerprint information input by the user.In addition, when a visitor accesses data, encrypted data bound with the fingerprint information and corresponding to the data type is provided according to the selected data type and the input fingerprint information, so the user can rapidly inquire about encrypted data which the user wants to browse, data can be encrypted and stored by a single device for multiple users, and operation is convenient.

Description

Data ciphering method and module, data access method and module
Technical field
The present invention relates to information security field, particularly to a kind of data ciphering method and module, data access method and module.
Background technology
Along with the arriving of information age, the safety of data becomes more and more important, and most of companies, industry, individual significant data are essentially all and leave in modern storage medium.As, personal data are left in computer, mobile phone or PDA (PersonalDigitalAssistant, personal digital assistant) by people;Company or industry data are left in the memory module of server.
Data encryption mode in the prior art, adopts the mode adding password to the access rights of storage device, mostly to ensure the safety of data.As, mobile phone being arranged finger-print cipher, when the finger print information that user's input verified by mobile phone is correct, then unlocks mobile phone, user can check all of data in mobile phone.Or, the mode of data encryption can also is that and is provided with encryption section in storage device, joins in encryption section by unified for data, inputs all data that the correct mode accessing password just may browse through in encryption section.
Being not difficult to find out, the cipher mode of data of the prior art is once input correct encrypted message, and current unblock user just can browse all of data, data can not be carried out sifting sort.
Summary of the invention
It is an object of the invention to provide a kind of data ciphering method and module, data access method and module so that each data of user's storage are bound mutually with the finger-print cipher that user inputs, it is achieved that multi-user data encryption and the preservation of single equipment, and easy to operate.
For solving above-mentioned technical problem, embodiments of the present invention provide a kind of data ciphering method, comprise the steps of when data inputting completes, it is provided that the input prompt interface of finger-print cipher;If receiving the finger-print cipher of user's input, then data are tied to finger-print cipher.
Embodiments of the present invention additionally provide a kind of data access method, comprise the steps of the browser interface of the data type providing user to select;In the process providing browser interface, if receiving the finger-print cipher of user's input, then obtain according to finger-print cipher and meet first and pre-conditioned add ciphertext data;Wherein, meet the first pre-conditioned encrypted packets containing: be bound to finger-print cipher and belong to the data of data type.
Embodiments of the present invention additionally provide a kind of data encryption module, comprise: data entry element, interface providing unit, finger-print cipher input block and data binding unit;Data entry element is used for logging data;Interface providing unit is for providing the input prompt interface of finger-print cipher;Finger-print cipher input block is for receiving the finger-print cipher of user's input;Data binding unit is for being tied to finger-print cipher by data.
Embodiments of the present invention additionally provide a kind of Data access module, comprise: interface providing unit, finger-print cipher input block and data capture unit;The browser interface of the data type that interface providing unit selects for providing user;Finger-print cipher input block is for receiving the finger-print cipher of user's input;Data capture unit meets first pre-conditioned add ciphertext data for obtaining according to finger-print cipher;Wherein, meet the first pre-conditioned encrypted packets containing: be bound to finger-print cipher and belong to the data of data type.
Embodiment of the present invention in terms of existing technologies, in data ciphering method, when data inputting completes, it is provided that the input prompt interface of finger-print cipher;If receiving the finger-print cipher of user's input, then data are tied to finger-print cipher.In this way so that stored each data are bound mutually with the finger-print cipher that user inputs, i.e. the finger print information according to user's input, the classification of complete paired data and encryption.In data access method, it is provided that the browser interface of the data type that user selects;In the process providing browser interface, if receiving the finger-print cipher of user's input, then obtain according to finger-print cipher and meet first and pre-conditioned add ciphertext data;Wherein, meet the first pre-conditioned encrypted packets containing: be bound to finger-print cipher and belong to the data of data type.So, when Accessor Access's data, finger print information according to its selected data type Yu input, there is provided with finger print information binding and corresponding to data type add ciphertext data, so that user quickly inquires oneself wants that what browse adds ciphertext data, achieve multi-user data encryption and the preservation of single equipment, and easy to operate.
It addition, in data ciphering method, if receiving the finger-print cipher of user's input, then, before data are tied to the step of finger-print cipher, also comprise the steps of the lasting input duration calculating finger-print cipher;If judging, persistently input duration more than preset duration, then enters the step that data are tied to finger-print cipher.In this way, thus more accurately user being encrypted the need of to the data completing typing, during to prevent user's imprudence that finger is positioned over fingerprint input area, implement maloperation.
It addition, in data ciphering method, if receiving the finger-print cipher of user's input, then, before or after data are tied to the step of finger-print cipher, also following steps: provide group to select interface;Group according to user's input arranges the Authorization Attributes of finger-print cipher, and Authorization Attributes includes at least access rights;Wherein, the data of subordinate's password bound that finger-print cipher Internet access is lower than the access rights of this finger-print cipher.It addition, in data access method, finger-print cipher has Authorization Attributes, and Authorization Attributes is including at least access rights;Meet the first pre-conditioned ciphertext data that adds also to comprise: be bound to subordinate's password of finger-print cipher and belong to the data of data type;Wherein, the access rights of subordinate's password of finger-print cipher are lower than the access rights of finger-print cipher.So, be equivalent to arrange the access level of correspondence to different finger-print ciphers, it is thus possible to according to the different identity of user to the access rights of user setup correspondence grade, so that the higher user of access rights is able to access that the relatively low user's of access rights adds ciphertext data.
It addition, in data ciphering method, when data inputting completes, and before providing the step at input prompt interface of finger-print cipher, also comprise the steps of offer encrypted acknowledgment interface;If receiving encrypted acknowledgment order, then enter the step at the input prompt interface that finger-print cipher is provided.So so that whether the data of current typing can be encrypted by user selects, in order to the data that need not encrypt shared.
It addition, the lasting input duration meeting the first pre-conditioned continuously display duration adding ciphertext data and finger-print cipher matches.That is, the continuously display duration adding ciphertext data is limited, so that the safety adding ciphertext data is higher.
It addition, before the step of the browser interface of the data type providing user to select, also comprise the steps of the selection interface providing encryption browsing data or clear data to browse;If receiving the selection order that clear data browses, then enter the step of the browser interface of the data type providing user to select;If receiving the selection order of encryption browsing data, then provide the input prompt interface of finger-print cipher;If receiving another finger-print cipher of user's input, then obtain according to another finger-print cipher and meet second and pre-conditioned add ciphertext data;Wherein, meet the second pre-conditioned encrypted packets containing: be bound to the data of another finger-print cipher.In this way, thus providing the mode of multiple data access, when user's Choice encryption browsing data so that all of ciphertext data that adds of finger print information bound can be browsed by user, in order to user intactly check all meet access rights add ciphertext data.
Accompanying drawing explanation
Fig. 1 is the flow chart according to a kind of data ciphering method in first embodiment of the invention;
Fig. 2 is the flow chart according to a kind of data access method in second embodiment of the invention;
Fig. 3 is the block diagram according to a kind of data encryption module in third embodiment of the invention;
Fig. 4 is the block diagram according to a kind of Data access module in four embodiment of the invention.
Detailed description of the invention
For making the object, technical solutions and advantages of the present invention clearly, below in conjunction with accompanying drawing, the embodiments of the present invention are explained in detail.But, it will be understood by those skilled in the art that in each embodiment of the present invention, propose many ins and outs in order to make reader be more fully understood that the application.But, even without these ins and outs with based on the many variations of following embodiment and amendment, it is also possible to realize the application each claim technical scheme required for protection.
First embodiment of the present invention relates to a kind of data ciphering method, and idiographic flow is as shown in Figure 1.Data ciphering method in present embodiment is carried out on an electronic device, or is carried out on the server.Electronic equipment can be computer, mobile phone or PDA etc., so, does not do any restriction at this.Following steps are to implement as an example on an electronic device:
Step 101, it is judged that whether data complete typing.If so, then perform step 102, otherwise perform step 101.
Specifically, the selection interface of the whether successful logging data of electronic equipment offer, select for user.This selection interface can include typing and be successfully selected frame, and when the complete typing of the data of user's input, user can click typing by finger and be successfully selected frame, then now electronic equipment judges that data complete typing.
Step 102, it is provided that encrypted acknowledgment interface.
Specifically, electronic equipment controls touch screen display encrypted acknowledgment interface, to point out user to input encrypted acknowledgment instruction.
Step 103, it may be judged whether receive encrypted acknowledgment order.If so, then perform step 104, otherwise terminate.
Specifically, comprising Encryption Options and not Encryption Options in encrypted acknowledgment interface, user can pass through physical button or select described Encryption Options or not Encryption Options by touching to click, to input encrypted acknowledgment order or to input not encrypted command.
Step 104, it is provided that the input prompt interface of finger-print cipher.
Specifically, electronic equipment is by the input prompt interface of touch screen display finger-print cipher, and the input prompt interface of this finger-print cipher is used for pointing out user to input finger-print cipher.
Step 105, it may be judged whether receive the finger-print cipher of user's input.If so, then perform step 106, otherwise perform step 105.
Specifically, electronic equipment can be provided with fingerprint sensor, and finger is positioned over the scanning area of fingerprint sensor by user, in order to electronic equipment gathers the finger print information of user.When electronic equipment is after collecting satisfactory finger print information, then the finger print information of user is arranged to finger-print cipher, and judges the finger-print cipher receiving user's input.
It is worth mentioning that, the input prompt interface of the finger-print cipher in step 104 is except the information that display reminding user inputs finger-print cipher, the current finger print image that user inputs can also be shown, it is adjusted so that finger is pressed direction by user in time, in order to user quickly inputs satisfactory finger print information.
Step 106, it is judged that whether the lasting input duration of finger-print cipher is more than preset duration.If so, then perform step 108, otherwise terminate.
Specifically, if electronic equipment detects that user's finger is placed on the scanning area of fingerprint sensor, then electronic equipment calculates the lasting input duration of the finger-print cipher of user's input in real time by timer, and the lasting input duration calculated in real time and preset duration are compared, to judge that whether the lasting input duration of finger-print cipher is more than preset duration;If judging, persistently input duration is more than preset duration, then it represents that finger-print cipher inputs successfully;Otherwise, if persistently input duration not yet arrives preset duration and detects that user's finger leaves the scanning area of fingerprint sensor, then thinking that finger-print cipher inputs unsuccessfully (being likely to be user misoperation), electronic equipment controls timer and is reset by current record duration.In this way, thus more accurately user being encrypted the need of to the data completing typing, the encryption maloperation implemented during to prevent user's imprudence that finger is positioned over fingerprint input area.
Data are tied to finger-print cipher by step 107.
Specifically, the corresponding relation of data and finger-print cipher set up by electronic equipment, and this corresponding relation can exist in table form, such as data finger-print cipher synopsis.
Step 108, it is provided that group selects interface.
Step 109, arranges the Authorization Attributes of finger-print cipher according to the group of user's input.
Wherein, Authorization Attributes includes at least access rights, the data of subordinate's password bound that finger-print cipher Internet access is lower than the access rights of this finger-print cipher.
Specifically, user's mode by physical button or by point touching screen selects and confirms group.Having the corresponding relation of group and Authorization Attributes in the electronic device in advance, this corresponding relation can exist in table form, such as group Authorization Attributes synopsis.Electronic equipment obtains the Authorization Attributes corresponding with the group of user's input by the mode tabled look-up, and by this Authorization Attributes and finger-print cipher binding.As, group 1, group 2 and group 3 can be prestored in electronic equipment, the access rights of default setting group 1 are higher than the access rights of group 2, and the access rights of group 2 are higher than the access rights of group 3.So, when user stores data in group 1, and when user inputs the finger print information of correspondence, then user can have access to and add ciphertext data in group 2 and group 3.Otherwise, when user stores data in group 3, when user inputs the finger print information of correspondence, can only have access to and group 3 adds ciphertext data, can not have access to and group 1 or group 2 add ciphertext data.So, any restriction is not done at this.
It is noted that owing to the corresponding relation of the group that prestores in the electronic device and Authorization Attributes can the mode of group Authorization Attributes synopsis exist.Therefore, it can combine group Authorization Attributes synopsis with the data fingerprint password synopsis in step 107, thus forming data fingerprint password Authorization Attributes synopsis.
It is noted that Authorization Attributes can also comprise execution authority, in order to user is newly-increased, delete or amendment adds ciphertext data.As, the ciphertext data that adds having has ageing, when user's these data of initial typing, it is necessary these data are encrypted, when these data are expired, then user can pass through the execution authority of finger print information to these data execution deletion action, and these data are vacated memory space and can be stored for the follow-up ciphertext data that adds such that it is able to effectively prevent the memory space of electronic equipment from reaching storage cap.
It is not difficult to find out, in present embodiment, when data inputting completes, it is provided that the input prompt interface of finger-print cipher;If receiving the finger-print cipher of user's input, then data are tied to finger-print cipher.In this way so that stored each data are bound mutually with the finger-print cipher that user inputs, i.e. the finger print information according to user's input, the classification of complete paired data and encryption.
Second embodiment of the present invention relates to a kind of data access method, and idiographic flow is as shown in Figure 2.Present embodiment is carried out on the electronic equipment that above-mentioned data ciphering method was arranged.
Step 201, it is provided that the selection interface that encryption browsing data or clear data browse.
Specifically, electronic equipment is classified to adding ciphertext data and clear data in advance, and by the selection interface that touch screen display encryption browsing data or clear data browse, this interface can include and add ciphertext data choice box and clear data choice box, selects for user.
Step 202, it may be judged whether receive the selection order that clear data browses.If so, then perform step 203, otherwise perform step 207.
Specifically, electronic equipment judges in preset duration, if receive the selection order of user's input.Whether the order that selects that if so, then electronic equipment judges that user inputs is the selection order that clear data browses;Otherwise, electronic equipment sends information, to point out user to input selection order.If, user is in preset duration, is selected by physical button or click clear data choice box by finger, then electronic equipment judges to receive in preset duration and selects order, and to determine this selection order be the selection order that clear data browses;Otherwise, when user is in preset duration, selected by physical button or add ciphertext data choice box by finger click;Then electronic equipment judges to receive in preset duration to select order, and determines the selection order that this selection order does not browse for clear data.
Step 203, it is provided that the browser interface of the data type that user selects.
Wherein, data type can be picture, audio frequency, video, document etc..
Specifically, when user is selected by physical button in preset duration or clicks clear data choice box by finger, then electronic equipment passes through touch screen video data type selection interface, selects data type corresponding to the data to access for user according to oneself actual demand.This data type selects interface can include the choice box of various data type, and when user is selected by physical button or is clicked the choice box of certain data type by mobile phone, then electronic equipment provides the browser interface of the data type corresponding with this choice box.Wherein, the browser interface of the data type that user selects can show the clear data that this data type is corresponding, check for user.As such, it is possible to make user check data according to data type classifications.
Step 204, it may be judged whether receive the finger-print cipher of user's input.If so, then perform step 205, otherwise perform step 204.
Specifically, when finger is placed on the scanning area of fingerprint sensor by user, then electronic equipment receives the finger print information of user's input.Now, received finger print information is mated by electronic equipment with the finger-print cipher prestored, it may be judged whether there is the finger-print cipher that a finger-print cipher prestored and user input and matches.If so, the qualified finger-print cipher that have received user's input is then judged;Otherwise, electronic equipment sends the information re-entering password, to point out user to input qualified finger-print cipher.
Step 205, obtains according to finger-print cipher and meets first and pre-conditioned add ciphertext data.
Wherein, first is pre-conditioned by user or go out manufacturer and pre-set and preserve in the electronic device, meet the first pre-conditioned encrypted packets containing: be bound to finger-print cipher and belong to the data of data type.
Specifically, electronic equipment by inquiring about the mode of data fingerprint password synopsis, obtain in current data type with this finger-print cipher bind add ciphertext data.As, user-selected data type is picture, then in step 205, electronic equipment obtains and the image data of this finger-print cipher binding.
It is noted that in present embodiment, finger-print cipher has Authorization Attributes, and Authorization Attributes is including at least access rights;Meet the first pre-conditioned ciphertext data that adds also to comprise: be bound to subordinate's password of finger-print cipher and belong to the data of data type;Wherein, the access rights of subordinate's password of finger-print cipher are lower than the access rights of finger-print cipher.So, be equivalent to arrange the access level of correspondence to different finger-print ciphers such that it is able to according to the different identity of user to the access rights of user setup correspondence grade, so that the higher user of access rights is able to access that the user's of access rights adds ciphertext data.
Step 206, display meets first and pre-conditioned adds ciphertext data.
Specifically, electronic equipment shows that by display screen meeting first pre-conditioned adds ciphertext data, checks for user.Further, electronic equipment can display meeting the first pre-conditioned encryption high priority data.As, it is placed in top, interface by meeting the first pre-conditioned ciphertext data that adds.
It is noted that in present embodiment, the lasting input duration meeting the first pre-conditioned continuously display duration adding ciphertext data and finger-print cipher matches.Wherein, the lasting input duration of the continuously display duration and finger-print cipher that add ciphertext data matches and refers to: the continuously display duration for adding ciphertext data is equal or slightly larger than the lasting input duration of finger-print cipher, namely user is by the finger Continued depression pickup area at fingerprint sensor, then display adds ciphertext data;When user's finger leaves the pickup area of fingerprint sensor, then do not show and add ciphertext data.When practical operation, it is also possible to arrange user when inputting finger-print cipher first, then display adds ciphertext data, and when electronic equipment detects that user inputs finger-print cipher again, then no longer display adds ciphertext data.So, it is not limited thereto at this.
Step 207, it may be judged whether receive the selection order of encryption browsing data.If so, then perform step 208, otherwise perform step 201.
Specifically, when user selects by physical button or clicked by finger to add ciphertext data choice box, then electronic equipment judges to receive the selection order encrypting browsing data.
Step 208, it is provided that the input prompt interface of finger-print cipher.
The input prompt interface providing finger-print cipher in this step is roughly the same with the step 104 in the first embodiment, for avoiding repeating, does not repeat them here.
Step 209, it may be judged whether receive another finger-print cipher of user's input.If so, then perform step 210, otherwise perform step 209.
Wherein, other finger print informations that another finger-print cipher is the finger print information being different from above-mentioned steps 204 to step 206 of user's input.The embodiment of this step is roughly the same with step 204, for avoiding repeating, does not repeat them here.
Step 210, obtains according to another finger-print cipher and meets second and pre-conditioned add ciphertext data.
Specifically, electronic equipment obtains according to finger-print cipher and corresponding with this password all of adds ciphertext data.Wherein, meet the second pre-conditioned encrypted packets containing: be bound to the data of another finger-print cipher described.
Another finger-print cipher in present embodiment can also have Authorization Attributes, and Authorization Attributes is including at least access rights;Meet the second pre-conditioned ciphertext data that adds also to comprise: be bound to the data of subordinate's password of another finger-print cipher;Wherein, the access rights of subordinate's password of another finger-print cipher are lower than the access rights of another finger-print cipher.
Step 211, display meets second and pre-conditioned adds ciphertext data.
Specifically, electronic equipment is shown by touch screen and corresponding with this password all of adds ciphertext data, checks for user.
It is not difficult to find out, in present embodiment, when Accessor Access's data, finger print information according to its selected data type Yu input, there is provided with finger print information binding and corresponding to data type add ciphertext data, so that user quickly inquires oneself wants that what browse adds ciphertext data, be equivalent to electronic equipment and help user that data have been done individual sort operation in advance, so that user is not disturbed by other kinds of data checking.
The step of various methods divides above, is intended merely to description clear, it is achieved time can be merged into a step or some step is split, and is decomposed into multiple step, as long as comprising identical logical relation, all in the protection domain of this patent;To adding inessential amendment in algorithm or in flow process or introducing inessential design, but do not change the core design of its algorithm and flow process all in the protection domain of this patent.
Third embodiment of the invention relates to a kind of data encryption module, as it is shown on figure 3, comprise: data entry element 3, interface providing unit 6, finger-print cipher input block 1, timing unit 2, judging unit 5 and data binding unit 4.
Data entry element 3 is for logging data;Interface providing unit 6 is for providing the input prompt interface of finger-print cipher;Finger-print cipher input block 1 is for receiving the finger-print cipher of user's input;Timing unit 2 is for calculating the lasting input duration of finger-print cipher;Judging unit 5 is for judging that persistently whether input duration is more than preset duration;If so, data are tied to finger-print cipher by data binding unit 4;Data binding unit 4 is for being tied to finger-print cipher by data.
It is noted that in present embodiment, interface providing unit 6 also provides for group and selects interface and provide encrypted acknowledgment interface;If receiving encrypted acknowledgment order, then interface providing unit 6 provides the input prompt interface of finger-print cipher.
Data encryption module also comprises Authorization Attributes and arranges unit;Authorization Attributes arranges unit and arranges the Authorization Attributes of finger-print cipher according to the group that user inputs, and Authorization Attributes comprises access rights and performs authority.Wherein, the data of subordinate's password bound that finger-print cipher Internet access is lower than the access rights of this finger-print cipher.
It is seen that, present embodiment is the system embodiment corresponding with the first embodiment, and present embodiment can be worked in coordination enforcement with the first embodiment.The relevant technical details mentioned in first embodiment is still effective in the present embodiment, in order to reduce repetition, repeats no more here.Correspondingly, the relevant technical details mentioned in present embodiment is also applicable in the first embodiment.
It is noted that each module involved in present embodiment is logic module, in actual applications, a logical block can be a physical location, it is also possible to be a part for a physical location, it is also possible to realize with the combination of multiple physical locations.Additionally, for the innovative part highlighting the present invention, do not introduced by the unit less close with solving technical problem relation proposed by the invention in present embodiment, but this is not intended that in present embodiment to be absent from other unit.
Four embodiment of the invention relates to a kind of Data access module, comprises: interface providing unit 6, finger-print cipher input block 1, data capture unit 7 and display unit 8, as shown in Figure 4.
The browser interface of the data type that interface providing unit 6 selects for providing user;Finger-print cipher input block 1 is for receiving the finger-print cipher of user's input;Data capture unit 7 meets first pre-conditioned add ciphertext data for obtaining according to finger-print cipher;Display unit 8 is for showing that meeting first pre-conditioned adds ciphertext data.Wherein, meet the first pre-conditioned encrypted packets containing: be bound to finger-print cipher and belong to the data of data type, and the lasting input duration meeting the first pre-conditioned continuously display duration adding ciphertext data and finger-print cipher matches.
It is noted that in present embodiment, finger-print cipher has Authorization Attributes, and Authorization Attributes is including at least access rights;Meet the first pre-conditioned ciphertext data that adds also to comprise: be bound to subordinate's password of finger-print cipher and belong to the data of data type;Wherein, the access rights of subordinate's password of finger-print cipher are lower than the access rights of finger-print cipher.
Interface providing unit 6 also provides for encryption browsing data or the selection interface that browses of clear data;If receiving the selection order that clear data browses, then interface providing unit 6 provides the browser interface of the data type that user selects;If receiving the selection order of encryption browsing data, then interface providing unit 6 provides the input prompt interface of finger-print cipher;If receiving another finger-print cipher of user's input, then data capture unit 7 obtains according to another finger-print cipher and meets second and pre-conditioned add ciphertext data;Wherein, meet the second pre-conditioned encrypted packets containing: be bound to the data of another finger-print cipher.
Wherein, another finger-print cipher has also Authorization Attributes, and Authorization Attributes is including at least access rights;Meet the second pre-conditioned ciphertext data that adds also to comprise: be bound to the data of subordinate's password of another finger-print cipher;Wherein, the access rights of subordinate's password of another finger-print cipher are lower than the access rights of another finger-print cipher.
Owing to the second embodiment is mutually corresponding with present embodiment, therefore present embodiment can be worked in coordination enforcement with the second embodiment.The relevant technical details mentioned in second embodiment is still effective in the present embodiment, and the technique effect that can reach in this second embodiment is in the present embodiment too it is achieved that in order to reduce repetition, repeat no more here.Correspondingly, the relevant technical details mentioned in present embodiment is also applicable in the second embodiment.
It will be understood by those skilled in the art that the respective embodiments described above are to realize specific embodiments of the invention, and in actual applications, it is possible in the form and details it is done various change, without departing from the spirit and scope of the present invention.

Claims (21)

1. a data ciphering method, it is characterised in that comprise the steps of
When data inputting completes, it is provided that the input prompt interface of finger-print cipher;
If receiving the finger-print cipher of user's input, then described data are tied to described finger-print cipher.
2. data ciphering method according to claim 1, it is characterised in that if receiving the finger-print cipher of user's input, then, before described data are tied to the step of described finger-print cipher, also comprise the steps of
Calculate the lasting input duration of described finger-print cipher;
If judging, described persistently input duration is more than preset duration, then enter the step that described data are tied to described finger-print cipher.
3. data ciphering method according to claim 1, it is characterised in that if receiving the finger-print cipher of user's input, then, before or after described data are tied to the step of described finger-print cipher, also following steps:
Group is provided to select interface;
Group according to user's input arranges the Authorization Attributes of described finger-print cipher, and described Authorization Attributes includes at least access rights;
Wherein, the data of subordinate's password bound that described finger-print cipher Internet access is lower than the access rights of this finger-print cipher.
4. data ciphering method according to claim 3, it is characterised in that described Authorization Attributes also comprises execution authority.
5. data ciphering method according to claim 1, it is characterised in that when data inputting completes, and before the step at input prompt interface of finger-print cipher is provided, also comprise the steps of
Encrypted acknowledgment interface is provided;
If receiving encrypted acknowledgment order, then enter the step at the input prompt interface that finger-print cipher is provided.
6. a data access method, it is characterised in that comprise the steps of
The browser interface of the data type of user's selection is provided;
In the process providing described browser interface, if receiving the finger-print cipher of user's input, then obtain according to described finger-print cipher and meet first and pre-conditioned add ciphertext data;
Wherein, meet described in the first pre-conditioned encrypted packets containing: be bound to described finger-print cipher and belong to the data of described data type.
7. data access method according to claim 6, it is characterised in that described finger-print cipher has Authorization Attributes, and described Authorization Attributes is including at least access rights;
The described first pre-conditioned ciphertext data that adds that meets also comprises: is bound to subordinate's password of described finger-print cipher and belongs to the data of described data type;Wherein, the access rights of subordinate's password of described finger-print cipher are lower than the access rights of described finger-print cipher.
8. data access method according to claim 6, it is characterised in that after obtaining according to described finger-print cipher and meeting the first pre-conditioned step adding ciphertext data, also comprise the steps of
Meet first described in display and pre-conditioned add ciphertext data.
9. data access method according to claim 8, it is characterised in that described in meet the lasting input duration of the first pre-conditioned continuously display duration adding ciphertext data and described finger-print cipher and match.
10. data access method according to claim 6, it is characterised in that before the step of the browser interface of the data type providing user to select, also comprises the steps of
The selection interface that encryption browsing data or clear data browse is provided;
If receiving the selection order that clear data browses, then enter the step of the browser interface of the data type that the described user of offer selects;
If receiving the selection order of encryption browsing data, then provide the input prompt interface of finger-print cipher;
If receiving another finger-print cipher of user's input, then obtain according to another finger-print cipher described and meet second and pre-conditioned add ciphertext data;
Wherein, meet described in the second pre-conditioned encrypted packets containing: be bound to the data of another finger-print cipher described.
11. data access method according to claim 10, it is characterised in that another finger-print cipher described has Authorization Attributes, and described Authorization Attributes is including at least access rights;
The described second pre-conditioned ciphertext data that adds that meets also comprises: be bound to the data of subordinate's password of another finger-print cipher described;Wherein, the access rights of subordinate's password of another finger-print cipher described are lower than the access rights of another finger-print cipher described.
12. a data encryption module, it is characterised in that comprise: data entry element, interface providing unit, finger-print cipher input block and data binding unit;
Described data entry element is used for logging data;
Described interface providing unit is for providing the input prompt interface of finger-print cipher;
Described finger-print cipher input block is for receiving the finger-print cipher of user's input;
Described data binding unit is for being tied to described finger-print cipher by described data.
13. data encryption module according to claim 12, it is characterised in that described data encryption module also comprises timing unit and judging unit;
Described timing unit is for calculating the lasting input duration of described finger-print cipher;
Described judging unit is used for judging that whether described persistently input duration is more than preset duration;If so, described data are tied to described finger-print cipher by described data binding unit.
14. data encryption module according to claim 12, it is characterised in that:
Described interface providing unit also provides for group and selects interface;
Described data encryption module also comprises Authorization Attributes and arranges unit;Described Authorization Attributes arranges unit and arranges the Authorization Attributes of described finger-print cipher according to the group that user inputs, and described Authorization Attributes includes at least access rights;
Wherein, the data of subordinate's password bound that described finger-print cipher Internet access is lower than the access rights of this finger-print cipher.
15. data encryption module according to claim 14, it is characterised in that: described Authorization Attributes also comprises execution authority.
16. a Data access module, it is characterised in that comprise: interface providing unit, finger-print cipher input block and data capture unit;
The browser interface of the data type that described interface providing unit selects for providing user;
Described finger-print cipher input block is for receiving the finger-print cipher of user's input;
Described data capture unit meets first pre-conditioned add ciphertext data for obtaining according to described finger-print cipher;
Wherein, meet described in the first pre-conditioned encrypted packets containing: be bound to described finger-print cipher and belong to the data of described data type.
17. Data access module according to claim 16, it is characterised in that described finger-print cipher has Authorization Attributes, and described Authorization Attributes is including at least access rights;
The described first pre-conditioned ciphertext data that adds that meets also comprises: is bound to subordinate's password of described finger-print cipher and belongs to the data of described data type;Wherein, the access rights of subordinate's password of described finger-print cipher are lower than the access rights of described finger-print cipher.
18. Data access module according to claim 16, it is characterised in that described Data access module also comprises: display unit;
Described display unit pre-conditioned adds ciphertext data for meeting first described in showing.
19. Data access module according to claim 18, it is characterised in that described in meet the lasting input duration of the first pre-conditioned continuously display duration adding ciphertext data and described finger-print cipher and match.
20. Data access module according to claim 16, it is characterised in that:
Described interface providing unit also provides for encryption browsing data or the selection interface that browses of clear data;If receiving the selection order that clear data browses, then described interface providing unit provides the browser interface of the data type of user's selection;If receiving the selection order of encryption browsing data, then described interface providing unit provides the input prompt interface of finger-print cipher;
If receiving another finger-print cipher of user's input, then described data capture unit obtains according to another finger-print cipher described and meets second and pre-conditioned add ciphertext data;
Wherein, meet described in the second pre-conditioned encrypted packets containing: be bound to the data of another finger-print cipher described.
21. Data access module according to claim 20, it is characterised in that another finger-print cipher described has Authorization Attributes, and described Authorization Attributes is including at least access rights;
The described second pre-conditioned ciphertext data that adds that meets also comprises: be bound to the data of subordinate's password of another finger-print cipher described;Wherein, the access rights of subordinate's password of another finger-print cipher described are lower than the access rights of another finger-print cipher described.
CN201610068365.7A 2016-01-29 2016-01-29 Data ciphering method and module, data access method and module Active CN105760733B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610068365.7A CN105760733B (en) 2016-01-29 2016-01-29 Data ciphering method and module, data access method and module

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610068365.7A CN105760733B (en) 2016-01-29 2016-01-29 Data ciphering method and module, data access method and module

Publications (2)

Publication Number Publication Date
CN105760733A true CN105760733A (en) 2016-07-13
CN105760733B CN105760733B (en) 2018-11-23

Family

ID=56342806

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610068365.7A Active CN105760733B (en) 2016-01-29 2016-01-29 Data ciphering method and module, data access method and module

Country Status (1)

Country Link
CN (1) CN105760733B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107665175A (en) * 2016-07-27 2018-02-06 展讯通信(上海)有限公司 The method, apparatus and electronic equipment of memory partition isolation
CN108920927A (en) * 2018-07-30 2018-11-30 比奥香港有限公司 A kind of recording based on biological identification, speech playing method and equipment
CN111310217A (en) * 2020-02-26 2020-06-19 山东超越数控电子股份有限公司 Data security acquisition and summarization method, computer equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1717651A (en) * 2002-11-27 2006-01-04 摩托罗拉公司 Method and apparatus for secure data entry using multiple function keys
CN1940803A (en) * 2005-09-30 2007-04-04 联想(北京)有限公司 Data encryption storage method
CN102930194A (en) * 2012-09-20 2013-02-13 无锡华御信息技术有限公司 Data security operating system and method based on authority management and control
CN104008321A (en) * 2014-05-28 2014-08-27 惠州Tcl移动通信有限公司 Judging method and judging system for identifying user right based on fingerprint for mobile terminal
CN105243331A (en) * 2015-10-23 2016-01-13 中国联合网络通信集团有限公司 Encryption device and encryption method, and decryption device and decryption method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1717651A (en) * 2002-11-27 2006-01-04 摩托罗拉公司 Method and apparatus for secure data entry using multiple function keys
CN1940803A (en) * 2005-09-30 2007-04-04 联想(北京)有限公司 Data encryption storage method
CN102930194A (en) * 2012-09-20 2013-02-13 无锡华御信息技术有限公司 Data security operating system and method based on authority management and control
CN104008321A (en) * 2014-05-28 2014-08-27 惠州Tcl移动通信有限公司 Judging method and judging system for identifying user right based on fingerprint for mobile terminal
CN105243331A (en) * 2015-10-23 2016-01-13 中国联合网络通信集团有限公司 Encryption device and encryption method, and decryption device and decryption method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107665175A (en) * 2016-07-27 2018-02-06 展讯通信(上海)有限公司 The method, apparatus and electronic equipment of memory partition isolation
CN108920927A (en) * 2018-07-30 2018-11-30 比奥香港有限公司 A kind of recording based on biological identification, speech playing method and equipment
CN111310217A (en) * 2020-02-26 2020-06-19 山东超越数控电子股份有限公司 Data security acquisition and summarization method, computer equipment and storage medium

Also Published As

Publication number Publication date
CN105760733B (en) 2018-11-23

Similar Documents

Publication Publication Date Title
US11658979B2 (en) Systems and methods for efficient and secure temporary anonymous access to media content
JP4733167B2 (en) Information processing apparatus, information processing method, information processing program, and information processing system
US11764966B2 (en) Systems and methods for single-step out-of-band authentication
CA2798071C (en) Methods and systems for increasing the security of network-based transactions
CN103929400B (en) Quick Response Code acquisition methods, generation method, verification method, equipment and system
CN102576399B (en) Resource access based on multiple credentials
WO2021184755A1 (en) Application access method and apparatus, and electronic device and storage medium
CN101771676B (en) Setting and authentication method for cross-domain authorization and relevant device and system
WO2017143879A1 (en) File permission management method and device
CN102045367A (en) Registration method and authentication server of real-name authentication
CN106605232A (en) Preserving data protection with policy
CN106022196A (en) Information sharing method and intelligent terminal
CN105760733A (en) Data encrypting method and module and data accessing method and module
Korać et al. Information security in M-learning systems: Challenges and threats of using cookies
CN105095787A (en) Information processing method and device
CN106529232A (en) Startup method and device
CN117375986A (en) Application access method, device and server
EP3759629B1 (en) Method, entity and system for managing access to data through a late dynamic binding of its associated metadata
CN103414688A (en) Method for loading user security seal in visited page and device thereof
CN106453273B (en) A kind of information insurance management system and method based on cloud
CN113868702A (en) Object moving method and device
JP2007515730A (en) Safe operation of computer equipment
EP4231178A1 (en) Synthetic biometrics for user privacy
CN108197489A (en) A kind of processing method and processing unit for intelligent terminal secret file
CN110263553B (en) Database access control method and device based on public key verification and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant