CN105787329A - Encryption method and system based on synthetic recognition - Google Patents
Encryption method and system based on synthetic recognition Download PDFInfo
- Publication number
- CN105787329A CN105787329A CN201610189735.2A CN201610189735A CN105787329A CN 105787329 A CN105787329 A CN 105787329A CN 201610189735 A CN201610189735 A CN 201610189735A CN 105787329 A CN105787329 A CN 105787329A
- Authority
- CN
- China
- Prior art keywords
- duration
- decryption
- voiceprint
- information
- finger print
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Telephonic Communication Services (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention provides an encryption method and system based on synthetic recognition. The method comprises steps as follows: S1, pre-storing decryption information of a mobile terminal, wherein the decryption information comprises voiceprint information, fingerprint information and password information of a valid user; setting all the decryption information and decryption authority weight of the decryption information combination; S2, setting efficacy duration of all the decryption information; S3, monitoring any one or more of the voiceprint information, the fingerprint information and the password information on the mobile terminal in real time; S4, when monitoring any one or more of the voiceprint information, the fingerprint information and the password information which are matched with the decryption information, judging whether the voiceprint information, the fingerprint information and the password information are within the efficacy duration of the decryption information and the decryption information combination, within the efficacy duration, generating a decryption operation instruction according to the decryption authority weight of all the decryption information and the decryption information combination as well as the efficacy duration of all the decryption information, executing the decryption operation according to the decryption operation instruction, and otherwise, promoting the user that decryption fails.
Description
Technical field
The present invention relates to technical field of information encryption, particularly to a kind of based on the comprehensive encryption method identified and system.
Background technology
Day by day perfect along with mobile terminal function, mobile terminal institute's role in people's daily life works is increasingly important, and meanwhile, the safety of mobile terminal and the privacy concern of user increasingly receive publicity.At present, most of mobile terminals all support encryption function, including the encryption function supporting the screen for mobile terminal, such as current password screen locking function;Support the encryption function for the file in mobile terminal, such as current atlas, photograph album encryption function etc..
But existing Crypted password cannot carry out general on mobile terminals, the different encryption requirements of different file also cannot be met.
Summary of the invention
In view of this, the present invention proposes a kind of based on the comprehensive encryption method identified and system.
A kind of based on the comprehensive encryption method identified, it comprises the steps:
S1, the mobile terminal that prestores decryption information, described decryption information includes the voiceprint of validated user, finger print information and encrypted message;Each decryption information and the decrypted rights weights of decryption information combination are set;
S2, the effect duration of each decryption information is set;
Any one or several in S3, real-time voiceprint, finger print information and the encrypted message monitored on mobile terminal;
When S4, any one or several in listening to voiceprint, finger print information and the encrypted message mated with decryption information, judge whether within the effect duration of each decryption information, time within effect duration, the decrypted rights weights combined according to each decryption information and decryption information and the effect duration of each decryption information generate decryption oprerations instruction, performing decryption oprerations according to decryption oprerations instruction, otherwise prompting user cannot decipher.
In the encryption method based on comprehensive identification of the present invention,
In described step S1:
The decrypted rights weights of each decryption information and decryption information combination are as follows: the weights that the weights that the weights of voiceprint are 1.5, the weights of finger print information are 1.5, the weights of encrypted message are 1, the weights of voiceprint and finger print information combination are 3, the weights of voiceprint and encrypted message combination are 2.5, finger print information and encrypted message combine are 2.5, voiceprint, voiceprint and finger print information and encrypted message combine are 4.
In the encryption method based on comprehensive identification of the present invention,
In described step S2:
The effect duration of each decryption information and decryption information combination is as follows:
The effect duration of voiceprint be preset 2 times of duration of basis, the effect duration of finger print information be preset 2 times of duration of basis, encrypted message effect duration for presetting basis duration.
In the encryption method based on comprehensive identification of the present invention,
Described step S3 includes:
Monitor any one or several in the voiceprint on any one application program occurred on mobile terminal or main operation interface, finger print information and encrypted message in real time;
In listening to voiceprint, finger print information, encrypted message any one or several time, record voiceprint, finger print information, encrypted message occur time point and start timing.
In the encryption method based on comprehensive identification of the present invention,
Described step S4 includes:
During any one or several in listening to voiceprint, finger print information and the encrypted message mated with decryption information, the time point and the clocking information that occur according to voiceprint, finger print information, encrypted message judge that voiceprint, finger print information, encrypted message are whether within the effect duration of each decryption information;
It is retained in the voiceprint within effect duration, finger print information, encrypted message;
The duration of configuration decryption oprerations instruction:
Situation one: when voiceprint, finger print information, encrypted message are all within effect duration, using the duration the shortest for lingering effect duration in the voiceprint being retained within effect duration, finger print information, the encrypted message duration as the 5th grade decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation two to situation six;
Situation two: when voiceprint, finger print information are all within effect duration, using the duration the shortest for lingering effect duration in the voiceprint being retained within effect duration, the finger print information duration as fourth estate decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation five;
Situation three: when voiceprint, encrypted message are all within effect duration, using the duration the shortest for lingering effect duration in the voiceprint being retained within effect duration, the encrypted message duration as tertiary gradient decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation five to situation six;
Situation four: when finger print information, encrypted message are all within effect duration, using the duration the shortest for lingering effect duration in the finger print information being retained within effect duration, the encrypted message duration as tertiary gradient decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation five to situation six;
Situation five: when voiceprint, finger print information one of which information are within effect duration, using the duration as the second grade decryption oprerations instruction of the lingering effect duration in the voiceprint being retained within effect duration, finger print information;
Situation six: when encrypted message is within effect duration, will be retained in the encrypted message within effect duration lingering effect duration as the duration of the first estate decryption oprerations instruction.
The present invention also provides for a kind of based on the comprehensive encryption system identified, it includes such as lower unit:
Authority dispensing unit, for the decryption information of the mobile terminal that prestores, described decryption information includes the voiceprint of validated user, finger print information and encrypted message;Each decryption information and the decrypted rights weights of decryption information combination are set;
Duration dispensing unit, for arranging the effect duration of each decryption information;
Monitoring unit, any one or several in real-time voiceprint, finger print information and the encrypted message monitored on mobile terminal;
Decryption unit, during for any one or several in listening to voiceprint, finger print information and the encrypted message mated with decryption information, judge whether within the effect duration of each decryption information, time within effect duration, the decrypted rights weights combined according to each decryption information and decryption information and the effect duration of each decryption information generate decryption oprerations instruction, performing decryption oprerations according to decryption oprerations instruction, otherwise prompting user cannot decipher.
In the encryption system based on comprehensive identification of the present invention,
In described authority dispensing unit:
The decrypted rights weights of each decryption information and decryption information combination are as follows: the weights that the weights that the weights of voiceprint are 1.5, the weights of finger print information are 1.5, the weights of encrypted message are 1, the weights of voiceprint and finger print information combination are 3, the weights of voiceprint and encrypted message combination are 2.5, finger print information and encrypted message combine are 2.5, voiceprint, voiceprint and finger print information and encrypted message combine are 4.
In the encryption system based on comprehensive identification of the present invention,
In described duration dispensing unit:
The effect duration of each decryption information and decryption information combination is as follows:
The effect duration of voiceprint be preset 2 times of duration of basis, the effect duration of finger print information be preset 2 times of duration of basis, encrypted message effect duration for presetting basis duration.
In the encryption system based on comprehensive identification of the present invention,
Described monitoring unit includes:
Monitor any one or several in the voiceprint on any one application program occurred on mobile terminal or main operation interface, finger print information and encrypted message in real time;
In listening to voiceprint, finger print information, encrypted message any one or several time, record voiceprint, finger print information, encrypted message occur time point and start timing.
In the encryption system based on comprehensive identification of the present invention,
Described decryption unit includes:
During any one or several in listening to voiceprint, finger print information and the encrypted message mated with decryption information, the time point and the clocking information that occur according to voiceprint, finger print information, encrypted message judge that voiceprint, finger print information, encrypted message are whether within the effect duration of each decryption information;
It is retained in the voiceprint within effect duration, finger print information, encrypted message;
The duration of configuration decryption oprerations instruction:
Situation one: when voiceprint, finger print information, encrypted message are all within effect duration, using the duration the shortest for lingering effect duration in the voiceprint being retained within effect duration, finger print information, the encrypted message duration as the 5th grade decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation two to situation six;
Situation two: when voiceprint, finger print information are all within effect duration, using the duration the shortest for lingering effect duration in the voiceprint being retained within effect duration, the finger print information duration as fourth estate decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation five;
Situation three: when voiceprint, encrypted message are all within effect duration, using the duration the shortest for lingering effect duration in the voiceprint being retained within effect duration, the encrypted message duration as tertiary gradient decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation five to situation six;
Situation four: when finger print information, encrypted message are all within effect duration, using the duration the shortest for lingering effect duration in the finger print information being retained within effect duration, the encrypted message duration as tertiary gradient decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation five to situation six;
Situation five: when voiceprint, finger print information one of which information are within effect duration, using the duration as the second grade decryption oprerations instruction of the lingering effect duration in the voiceprint being retained within effect duration, finger print information;
Situation six: when encrypted message is within effect duration, will be retained in the encrypted message within effect duration lingering effect duration as the duration of the first estate decryption oprerations instruction.
Implement the encryption method based on comprehensive identification provided by the invention and system compared with prior art has the advantages that the present invention passes through to monitor the voiceprint on mobile terminal, finger print information and encrypted message, and these information occur when being not exclusively for decryption oprerations, and exist and unlock with user fingerprints, take phone, among the scenes such as Video chat, the decrypted rights weights combined according to each decryption information and decryption information and the effect duration of each decryption information generate decryption oprerations instruction, decryption oprerations is performed according to decryption oprerations instruction, make user without inputting clear crytpographic key specially, and can dynamically adjust the grade of deciphering, intelligence degree is high.
Accompanying drawing explanation
Fig. 1 is the encryption method flow chart based on comprehensive identification of the embodiment of the present invention;
Fig. 2 is the encryption system structured flowchart based on comprehensive identification of the embodiment of the present invention.
Detailed description of the invention
As it is shown in figure 1, a kind of based on the comprehensive encryption method identified, it comprises the steps:
S1, the mobile terminal that prestores decryption information, described decryption information includes the voiceprint of validated user, finger print information and encrypted message;Each decryption information and the decrypted rights weights of decryption information combination are set.
Alternatively,
In described step S1:
The decrypted rights weights of each decryption information and decryption information combination are as follows: the weights that the weights that the weights of voiceprint are 1.5, the weights of finger print information are 1.5, the weights of encrypted message are 1, the weights of voiceprint and finger print information combination are 3, the weights of voiceprint and encrypted message combination are 2.5, finger print information and encrypted message combine are 2.5, voiceprint, voiceprint and finger print information and encrypted message combine are 4.
The voiceprint of validated user, finger print information and encrypted message refer to the information for encrypting file in decrypting mobile terminal.Be divided into the first order to level V the encryption file in mobile terminal, accordingly, weights be 1 encrypted message can decipher the encryption file of the first order, corresponding the first estate decryption oprerations instruction.Weights be 1.5 encrypted message can decipher the encryption file of the second level, corresponding second grade decryption oprerations instruction.Weights be 2.5 encrypted message can decipher the encryption file of the third level, corresponding tertiary gradient decryption oprerations instruction.Weights be 3 encrypted message can decipher the encryption file of the fourth stage, corresponding fourth estate decryption oprerations instruction.Weights be 4 encrypted message can decipher the encryption file of the fourth stage, corresponding fourth estate decryption oprerations instruction.
S2, the effect duration of each decryption information is set.
Alternatively,
In described step S2:
The effect duration of each decryption information and decryption information combination is as follows:
The effect duration of voiceprint be preset 2 times of duration of basis, the effect duration of finger print information be preset 2 times of duration of basis, encrypted message effect duration for presetting basis duration.
Any one or several in S3, real-time voiceprint, finger print information and the encrypted message monitored on mobile terminal.
Alternatively,
Described step S3 includes:
Monitor any one or several in the voiceprint on any one application program occurred on mobile terminal or main operation interface, finger print information and encrypted message in real time;
In listening to voiceprint, finger print information, encrypted message any one or several time, record voiceprint, finger print information, encrypted message occur time point and start timing.
When S4, any one or several in listening to voiceprint, finger print information and the encrypted message mated with decryption information, judge whether within the effect duration of each decryption information, time within effect duration, the decrypted rights weights combined according to each decryption information and decryption information and the effect duration of each decryption information generate decryption oprerations instruction, performing decryption oprerations according to decryption oprerations instruction, otherwise prompting user cannot decipher.
Alternatively,
Described step S4 includes:
During any one or several in listening to voiceprint, finger print information and the encrypted message mated with decryption information, the time point and the clocking information that occur according to voiceprint, finger print information, encrypted message judge that voiceprint, finger print information, encrypted message are whether within the effect duration of each decryption information;
It is retained in the voiceprint within effect duration, finger print information, encrypted message;
The duration of configuration decryption oprerations instruction:
Situation one: when voiceprint, finger print information, encrypted message are all within effect duration, using the duration the shortest for lingering effect duration in the voiceprint being retained within effect duration, finger print information, the encrypted message duration as the 5th grade decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation two to situation six;
Situation two: when voiceprint, finger print information are all within effect duration, using the duration the shortest for lingering effect duration in the voiceprint being retained within effect duration, the finger print information duration as fourth estate decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation five;
Situation three: when voiceprint, encrypted message are all within effect duration, using the duration the shortest for lingering effect duration in the voiceprint being retained within effect duration, the encrypted message duration as tertiary gradient decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation five to situation six;
Situation four: when finger print information, encrypted message are all within effect duration, using the duration the shortest for lingering effect duration in the finger print information being retained within effect duration, the encrypted message duration as tertiary gradient decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation five to situation six;
Situation five: when voiceprint, finger print information one of which information are within effect duration, using the duration as the second grade decryption oprerations instruction of the lingering effect duration in the voiceprint being retained within effect duration, finger print information;
Situation six: when encrypted message is within effect duration, will be retained in the encrypted message within effect duration lingering effect duration as the duration of the first estate decryption oprerations instruction.
By this step, the different grades of encryption document time that can decipher and grade are changeably, it is that listened to the voiceprint, finger print information and the encrypted message that mate with decryption information to mobile terminal relevant, and these decryption informations can be user's information when operating other application programs and carrying out the operations such as unlocking screen, because intelligence degree is higher.
As in figure 2 it is shown, the present invention also provides for a kind of based on the comprehensive encryption system identified, it includes such as lower unit:
Authority dispensing unit, for the decryption information of the mobile terminal that prestores, described decryption information includes the voiceprint of validated user, finger print information and encrypted message;Each decryption information and the decrypted rights weights of decryption information combination are set;
Duration dispensing unit, for arranging the effect duration of each decryption information;
Monitoring unit, any one or several in real-time voiceprint, finger print information and the encrypted message monitored on mobile terminal;
Decryption unit, during for any one or several in listening to voiceprint, finger print information and the encrypted message mated with decryption information, judge whether within the effect duration of each decryption information, time within effect duration, the decrypted rights weights combined according to each decryption information and decryption information and the effect duration of each decryption information generate decryption oprerations instruction, performing decryption oprerations according to decryption oprerations instruction, otherwise prompting user cannot decipher.
Alternatively,
In described authority dispensing unit:
The decrypted rights weights of each decryption information and decryption information combination are as follows: the weights that the weights that the weights of voiceprint are 1.5, the weights of finger print information are 1.5, the weights of encrypted message are 1, the weights of voiceprint and finger print information combination are 3, the weights of voiceprint and encrypted message combination are 2.5, finger print information and encrypted message combine are 2.5, voiceprint, voiceprint and finger print information and encrypted message combine are 4.
Alternatively,
In described duration dispensing unit:
The effect duration of each decryption information and decryption information combination is as follows:
The effect duration of voiceprint be preset 2 times of duration of basis, the effect duration of finger print information be preset 2 times of duration of basis, encrypted message effect duration for presetting basis duration.
Alternatively,
Described monitoring unit includes:
Monitor any one or several in the voiceprint on any one application program occurred on mobile terminal or main operation interface, finger print information and encrypted message in real time;
In listening to voiceprint, finger print information, encrypted message any one or several time, record voiceprint, finger print information, encrypted message occur time point and start timing.
Alternatively,
Described decryption unit includes:
During any one or several in listening to voiceprint, finger print information and the encrypted message mated with decryption information, the time point and the clocking information that occur according to voiceprint, finger print information, encrypted message judge that voiceprint, finger print information, encrypted message are whether within the effect duration of each decryption information;
It is retained in the voiceprint within effect duration, finger print information, encrypted message;
The duration of configuration decryption oprerations instruction:
Situation one: when voiceprint, finger print information, encrypted message are all within effect duration, using the duration the shortest for lingering effect duration in the voiceprint being retained within effect duration, finger print information, the encrypted message duration as the 5th grade decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation two to situation six;
Situation two: when voiceprint, finger print information are all within effect duration, using the duration the shortest for lingering effect duration in the voiceprint being retained within effect duration, the finger print information duration as fourth estate decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation five;
Situation three: when voiceprint, encrypted message are all within effect duration, using the duration the shortest for lingering effect duration in the voiceprint being retained within effect duration, the encrypted message duration as tertiary gradient decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation five to situation six;
Situation four: when finger print information, encrypted message are all within effect duration, using the duration the shortest for lingering effect duration in the finger print information being retained within effect duration, the encrypted message duration as tertiary gradient decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation five to situation six;
Situation five: when voiceprint, finger print information one of which information are within effect duration, using the duration as the second grade decryption oprerations instruction of the lingering effect duration in the voiceprint being retained within effect duration, finger print information;
Situation six: when encrypted message is within effect duration, will be retained in the encrypted message within effect duration lingering effect duration as the duration of the first estate decryption oprerations instruction.
Implement the encryption method based on comprehensive identification provided by the invention and system compared with prior art has the advantages that the present invention passes through to monitor the voiceprint on mobile terminal, finger print information and encrypted message, and these information occur when being not exclusively for decryption oprerations, and exist and unlock with user fingerprints, take phone, among the scenes such as Video chat, the decrypted rights weights combined according to each decryption information and decryption information and the effect duration of each decryption information generate decryption oprerations instruction, decryption oprerations is performed according to decryption oprerations instruction, make user without inputting clear crytpographic key specially, and can dynamically adjust the grade of deciphering, intelligence degree is high.
Said method embodiment and system embodiment are one to one, and therefore, the extension of embodiment of the method is equally applicable to said system embodiment.
The method described in conjunction with the embodiments described herein or the step of algorithm can directly use the software module that hardware, processor perform, or the combination of the two is implemented.Software module can be placed in the storage medium of other forms any known in random access memory, internal memory, read only memory, electrically programmable ROM, electrically erasable ROM, depositor, hard disk, moveable magnetic disc, CD-ROM or technical field.
It is understood that for the person of ordinary skill of the art, it is possible to conceive according to the technology of the present invention and make other various corresponding changes and deformation, and all these change and deform the protection domain that all should belong to the claims in the present invention.
Claims (10)
1., based on the comprehensive encryption method identified, it comprises the steps:
S1, the mobile terminal that prestores decryption information, described decryption information includes the voiceprint of validated user, finger print information and encrypted message;Each decryption information and the decrypted rights weights of decryption information combination are set;
S2, the effect duration of each decryption information is set;
Any one or several in S3, real-time voiceprint, finger print information and the encrypted message monitored on mobile terminal;
When S4, any one or several in listening to voiceprint, finger print information and the encrypted message mated with decryption information, judge whether within the effect duration of each decryption information, time within effect duration, the decrypted rights weights combined according to each decryption information and decryption information and the effect duration of each decryption information generate decryption oprerations instruction, performing decryption oprerations according to decryption oprerations instruction, otherwise prompting user cannot decipher.
2. according to claim 1 based on the comprehensive encryption method identified, it is characterised in that
In described step S1:
The decrypted rights weights of each decryption information and decryption information combination are as follows: the weights that the weights that the weights of voiceprint are 1.5, the weights of finger print information are 1.5, the weights of encrypted message are 1, the weights of voiceprint and finger print information combination are 3, the weights of voiceprint and encrypted message combination are 2.5, finger print information and encrypted message combine are 2.5, voiceprint, voiceprint and finger print information and encrypted message combine are 4.
3. according to claim 2 based on the comprehensive encryption method identified, it is characterised in that
In described step S2:
The effect duration of each decryption information and decryption information combination is as follows:
The effect duration of voiceprint be preset 2 times of duration of basis, the effect duration of finger print information be preset 2 times of duration of basis, encrypted message effect duration for presetting basis duration.
4. according to claim 3 based on the comprehensive encryption method identified, it is characterised in that
Described step S3 includes:
Monitor any one or several in the voiceprint on any one application program occurred on mobile terminal or main operation interface, finger print information and encrypted message in real time;
In listening to voiceprint, finger print information, encrypted message any one or several time, record voiceprint, finger print information, encrypted message occur time point and start timing.
5. according to claim 3 based on the comprehensive encryption method identified, it is characterised in that
Described step S4 includes:
During any one or several in listening to voiceprint, finger print information and the encrypted message mated with decryption information, the time point and the clocking information that occur according to voiceprint, finger print information, encrypted message judge that voiceprint, finger print information, encrypted message are whether within the effect duration of each decryption information;
It is retained in the voiceprint within effect duration, finger print information, encrypted message;
The duration of configuration decryption oprerations instruction:
Situation one: when voiceprint, finger print information, encrypted message are all within effect duration, using the duration the shortest for lingering effect duration in the voiceprint being retained within effect duration, finger print information, the encrypted message duration as the 5th grade decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation two to situation six;
Situation two: when voiceprint, finger print information are all within effect duration, using the duration the shortest for lingering effect duration in the voiceprint being retained within effect duration, the finger print information duration as fourth estate decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation five;
Situation three: when voiceprint, encrypted message are all within effect duration, using the duration the shortest for lingering effect duration in the voiceprint being retained within effect duration, the encrypted message duration as tertiary gradient decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation five to situation six;
Situation four: when finger print information, encrypted message are all within effect duration, using the duration the shortest for lingering effect duration in the finger print information being retained within effect duration, the encrypted message duration as tertiary gradient decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation five to situation six;
Situation five: when voiceprint, finger print information one of which information are within effect duration, using the duration as the second grade decryption oprerations instruction of the lingering effect duration in the voiceprint being retained within effect duration, finger print information;
Situation six: when encrypted message is within effect duration, will be retained in the encrypted message within effect duration lingering effect duration as the duration of the first estate decryption oprerations instruction.
6., based on the comprehensive encryption system identified, it includes such as lower unit:
Authority dispensing unit, for the decryption information of the mobile terminal that prestores, described decryption information includes the voiceprint of validated user, finger print information and encrypted message;Each decryption information and the decrypted rights weights of decryption information combination are set;
Duration dispensing unit, for arranging the effect duration of each decryption information;
Monitoring unit, any one or several in real-time voiceprint, finger print information and the encrypted message monitored on mobile terminal;
Decryption unit, during for any one or several in listening to voiceprint, finger print information and the encrypted message mated with decryption information, judge whether within the effect duration of each decryption information, time within effect duration, the decrypted rights weights combined according to each decryption information and decryption information and the effect duration of each decryption information generate decryption oprerations instruction, performing decryption oprerations according to decryption oprerations instruction, otherwise prompting user cannot decipher.
7. according to claim 6 based on the comprehensive encryption system identified, it is characterised in that
In described authority dispensing unit:
The decrypted rights weights of each decryption information and decryption information combination are as follows: the weights that the weights that the weights of voiceprint are 1.5, the weights of finger print information are 1.5, the weights of encrypted message are 1, the weights of voiceprint and finger print information combination are 3, the weights of voiceprint and encrypted message combination are 2.5, finger print information and encrypted message combine are 2.5, voiceprint, voiceprint and finger print information and encrypted message combine are 4.
8. according to claim 7 based on the comprehensive encryption system identified, it is characterised in that
In described duration dispensing unit:
The effect duration of each decryption information and decryption information combination is as follows:
The effect duration of voiceprint be preset 2 times of duration of basis, the effect duration of finger print information be preset 2 times of duration of basis, encrypted message effect duration for presetting basis duration.
9. according to claim 8 based on the comprehensive encryption method identified, it is characterised in that
Described monitoring unit includes:
Monitor any one or several in the voiceprint on any one application program occurred on mobile terminal or main operation interface, finger print information and encrypted message in real time;
In listening to voiceprint, finger print information, encrypted message any one or several time, record voiceprint, finger print information, encrypted message occur time point and start timing.
10. according to claim 9 based on the comprehensive encryption method identified, it is characterised in that
Described decryption unit includes:
During any one or several in listening to voiceprint, finger print information and the encrypted message mated with decryption information, the time point and the clocking information that occur according to voiceprint, finger print information, encrypted message judge that voiceprint, finger print information, encrypted message are whether within the effect duration of each decryption information;
It is retained in the voiceprint within effect duration, finger print information, encrypted message;
The duration of configuration decryption oprerations instruction:
Situation one: when voiceprint, finger print information, encrypted message are all within effect duration, using the duration the shortest for lingering effect duration in the voiceprint being retained within effect duration, finger print information, the encrypted message duration as the 5th grade decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation two to situation six;
Situation two: when voiceprint, finger print information are all within effect duration, using the duration the shortest for lingering effect duration in the voiceprint being retained within effect duration, the finger print information duration as fourth estate decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation five;
Situation three: when voiceprint, encrypted message are all within effect duration, using the duration the shortest for lingering effect duration in the voiceprint being retained within effect duration, the encrypted message duration as tertiary gradient decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation five to situation six;
Situation four: when finger print information, encrypted message are all within effect duration, using the duration the shortest for lingering effect duration in the finger print information being retained within effect duration, the encrypted message duration as tertiary gradient decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation five to situation six;
Situation five: when voiceprint, finger print information one of which information are within effect duration, using the duration as the second grade decryption oprerations instruction of the lingering effect duration in the voiceprint being retained within effect duration, finger print information;
Situation six: when encrypted message is within effect duration, will be retained in the encrypted message within effect duration lingering effect duration as the duration of the first estate decryption oprerations instruction.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610189735.2A CN105787329B (en) | 2016-03-30 | 2016-03-30 | A kind of encryption method and system based on comprehensive identification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610189735.2A CN105787329B (en) | 2016-03-30 | 2016-03-30 | A kind of encryption method and system based on comprehensive identification |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105787329A true CN105787329A (en) | 2016-07-20 |
CN105787329B CN105787329B (en) | 2019-06-25 |
Family
ID=56391331
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610189735.2A Expired - Fee Related CN105787329B (en) | 2016-03-30 | 2016-03-30 | A kind of encryption method and system based on comprehensive identification |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105787329B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106231594A (en) * | 2016-09-19 | 2016-12-14 | 惠州Tcl移动通信有限公司 | A kind of information of mobile terminal guard method and system |
CN108881712A (en) * | 2018-04-28 | 2018-11-23 | Oppo广东移动通信有限公司 | Image processing method, device, computer readable storage medium and electronic equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050229009A1 (en) * | 1999-06-21 | 2005-10-13 | Fujitsu Limited | Method and equipment for encrypting/decrypting physical characteristic information, and identification system utilizing the physical characteristic information |
CN104573550A (en) * | 2014-12-27 | 2015-04-29 | 小米科技有限责任公司 | Method and device for protecting data |
CN104598795A (en) * | 2015-01-30 | 2015-05-06 | 科大讯飞股份有限公司 | Authentication method and system |
CN105072249A (en) * | 2015-07-07 | 2015-11-18 | 百度在线网络技术(北京)有限公司 | Method and device of preventing mobile device from being stolen, and corresponding mobile device |
-
2016
- 2016-03-30 CN CN201610189735.2A patent/CN105787329B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050229009A1 (en) * | 1999-06-21 | 2005-10-13 | Fujitsu Limited | Method and equipment for encrypting/decrypting physical characteristic information, and identification system utilizing the physical characteristic information |
CN104573550A (en) * | 2014-12-27 | 2015-04-29 | 小米科技有限责任公司 | Method and device for protecting data |
CN104598795A (en) * | 2015-01-30 | 2015-05-06 | 科大讯飞股份有限公司 | Authentication method and system |
CN105072249A (en) * | 2015-07-07 | 2015-11-18 | 百度在线网络技术(北京)有限公司 | Method and device of preventing mobile device from being stolen, and corresponding mobile device |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106231594A (en) * | 2016-09-19 | 2016-12-14 | 惠州Tcl移动通信有限公司 | A kind of information of mobile terminal guard method and system |
CN106231594B (en) * | 2016-09-19 | 2019-12-10 | 惠州Tcl移动通信有限公司 | Mobile terminal information protection method and system |
CN108881712A (en) * | 2018-04-28 | 2018-11-23 | Oppo广东移动通信有限公司 | Image processing method, device, computer readable storage medium and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN105787329B (en) | 2019-06-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11310058B2 (en) | Methods for digitally signing an electronic file and authentication method | |
US8930700B2 (en) | Remote device secure data file storage system and method | |
WO2016061899A1 (en) | Fingerprint decryption method and device | |
US20160100314A1 (en) | Mobile data communication using biometric encryption | |
CN101674575B (en) | Method for protecting security of mobile communication terminal data and device thereof | |
CN104239815A (en) | Electronic document encryption and decryption method and method based on iris identification | |
CN105429761A (en) | Key generation method and device | |
CN103236930A (en) | Data encryption method and system | |
CN111191289A (en) | Method for displaying and storing private data | |
CN104468937A (en) | Data encryption and decryption methods and devices for mobile terminal and protection system | |
CN103560892A (en) | Secret key generation method and secret key generation device | |
CN106650373A (en) | SIM card information protection method and device | |
CN104363087A (en) | Encryption and decryption method and device | |
US9225514B2 (en) | Method for image encryption and decryption incorporating physiological features and image capture device thereof | |
CN105337742A (en) | LFSR (Linear Feedback Shift Register) file encryption and decryption methods based on human face image features and GPS (Global Position System) information | |
CN106921489A (en) | A kind of data ciphering method and device | |
US7177425B2 (en) | Device and method for securing information associated with a subscriber in a communication apparatus | |
CN103873521A (en) | Cloud architecture-based mobile phone privacy file protection system and method | |
CN105787329A (en) | Encryption method and system based on synthetic recognition | |
CN105279447A (en) | Method and device for data encryption, and method and device for data decryption | |
CN111859423A (en) | Information security encryption method and device | |
CN106503503A (en) | A kind of user behavior encryption method and system based on computer big data | |
Ashish et al. | Biometric Temp | |
CN105868595A (en) | Improved encryption method and system based on comprehensive recognition | |
JP2015233263A (en) | Authentication system and authentication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20190527 Address after: Room 5827, Building 3, 112-118 Gaoyi Road, Baoshan District, Shanghai, 201900 Applicant after: Shanghai Yueman Network Technology Co.,Ltd. Address before: 315000 Second Floor of Building 1, Lingyun Industrial Park, 1177 Lingyun Road, Ningbo High-tech Zone, Zhejiang Province Applicant before: NINGBO 3B ELECTRONIC TECHNOLOGY CO.,LTD. |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190625 |
|
CF01 | Termination of patent right due to non-payment of annual fee |