CN105787329A - Encryption method and system based on synthetic recognition - Google Patents

Encryption method and system based on synthetic recognition Download PDF

Info

Publication number
CN105787329A
CN105787329A CN201610189735.2A CN201610189735A CN105787329A CN 105787329 A CN105787329 A CN 105787329A CN 201610189735 A CN201610189735 A CN 201610189735A CN 105787329 A CN105787329 A CN 105787329A
Authority
CN
China
Prior art keywords
duration
decryption
voiceprint
information
finger print
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610189735.2A
Other languages
Chinese (zh)
Other versions
CN105787329B (en
Inventor
徐阿宏
杨柳
何异
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Yueman Network Technology Co ltd
Original Assignee
NINGBO SANBO ELECTRONIC TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NINGBO SANBO ELECTRONIC TECHNOLOGY Co Ltd filed Critical NINGBO SANBO ELECTRONIC TECHNOLOGY Co Ltd
Priority to CN201610189735.2A priority Critical patent/CN105787329B/en
Publication of CN105787329A publication Critical patent/CN105787329A/en
Application granted granted Critical
Publication of CN105787329B publication Critical patent/CN105787329B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Telephonic Communication Services (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention provides an encryption method and system based on synthetic recognition. The method comprises steps as follows: S1, pre-storing decryption information of a mobile terminal, wherein the decryption information comprises voiceprint information, fingerprint information and password information of a valid user; setting all the decryption information and decryption authority weight of the decryption information combination; S2, setting efficacy duration of all the decryption information; S3, monitoring any one or more of the voiceprint information, the fingerprint information and the password information on the mobile terminal in real time; S4, when monitoring any one or more of the voiceprint information, the fingerprint information and the password information which are matched with the decryption information, judging whether the voiceprint information, the fingerprint information and the password information are within the efficacy duration of the decryption information and the decryption information combination, within the efficacy duration, generating a decryption operation instruction according to the decryption authority weight of all the decryption information and the decryption information combination as well as the efficacy duration of all the decryption information, executing the decryption operation according to the decryption operation instruction, and otherwise, promoting the user that decryption fails.

Description

A kind of based on the comprehensive encryption method identified and system
Technical field
The present invention relates to technical field of information encryption, particularly to a kind of based on the comprehensive encryption method identified and system.
Background technology
Day by day perfect along with mobile terminal function, mobile terminal institute's role in people's daily life works is increasingly important, and meanwhile, the safety of mobile terminal and the privacy concern of user increasingly receive publicity.At present, most of mobile terminals all support encryption function, including the encryption function supporting the screen for mobile terminal, such as current password screen locking function;Support the encryption function for the file in mobile terminal, such as current atlas, photograph album encryption function etc..
But existing Crypted password cannot carry out general on mobile terminals, the different encryption requirements of different file also cannot be met.
Summary of the invention
In view of this, the present invention proposes a kind of based on the comprehensive encryption method identified and system.
A kind of based on the comprehensive encryption method identified, it comprises the steps:
S1, the mobile terminal that prestores decryption information, described decryption information includes the voiceprint of validated user, finger print information and encrypted message;Each decryption information and the decrypted rights weights of decryption information combination are set;
S2, the effect duration of each decryption information is set;
Any one or several in S3, real-time voiceprint, finger print information and the encrypted message monitored on mobile terminal;
When S4, any one or several in listening to voiceprint, finger print information and the encrypted message mated with decryption information, judge whether within the effect duration of each decryption information, time within effect duration, the decrypted rights weights combined according to each decryption information and decryption information and the effect duration of each decryption information generate decryption oprerations instruction, performing decryption oprerations according to decryption oprerations instruction, otherwise prompting user cannot decipher.
In the encryption method based on comprehensive identification of the present invention,
In described step S1:
The decrypted rights weights of each decryption information and decryption information combination are as follows: the weights that the weights that the weights of voiceprint are 1.5, the weights of finger print information are 1.5, the weights of encrypted message are 1, the weights of voiceprint and finger print information combination are 3, the weights of voiceprint and encrypted message combination are 2.5, finger print information and encrypted message combine are 2.5, voiceprint, voiceprint and finger print information and encrypted message combine are 4.
In the encryption method based on comprehensive identification of the present invention,
In described step S2:
The effect duration of each decryption information and decryption information combination is as follows:
The effect duration of voiceprint be preset 2 times of duration of basis, the effect duration of finger print information be preset 2 times of duration of basis, encrypted message effect duration for presetting basis duration.
In the encryption method based on comprehensive identification of the present invention,
Described step S3 includes:
Monitor any one or several in the voiceprint on any one application program occurred on mobile terminal or main operation interface, finger print information and encrypted message in real time;
In listening to voiceprint, finger print information, encrypted message any one or several time, record voiceprint, finger print information, encrypted message occur time point and start timing.
In the encryption method based on comprehensive identification of the present invention,
Described step S4 includes:
During any one or several in listening to voiceprint, finger print information and the encrypted message mated with decryption information, the time point and the clocking information that occur according to voiceprint, finger print information, encrypted message judge that voiceprint, finger print information, encrypted message are whether within the effect duration of each decryption information;
It is retained in the voiceprint within effect duration, finger print information, encrypted message;
The duration of configuration decryption oprerations instruction:
Situation one: when voiceprint, finger print information, encrypted message are all within effect duration, using the duration the shortest for lingering effect duration in the voiceprint being retained within effect duration, finger print information, the encrypted message duration as the 5th grade decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation two to situation six;
Situation two: when voiceprint, finger print information are all within effect duration, using the duration the shortest for lingering effect duration in the voiceprint being retained within effect duration, the finger print information duration as fourth estate decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation five;
Situation three: when voiceprint, encrypted message are all within effect duration, using the duration the shortest for lingering effect duration in the voiceprint being retained within effect duration, the encrypted message duration as tertiary gradient decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation five to situation six;
Situation four: when finger print information, encrypted message are all within effect duration, using the duration the shortest for lingering effect duration in the finger print information being retained within effect duration, the encrypted message duration as tertiary gradient decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation five to situation six;
Situation five: when voiceprint, finger print information one of which information are within effect duration, using the duration as the second grade decryption oprerations instruction of the lingering effect duration in the voiceprint being retained within effect duration, finger print information;
Situation six: when encrypted message is within effect duration, will be retained in the encrypted message within effect duration lingering effect duration as the duration of the first estate decryption oprerations instruction.
The present invention also provides for a kind of based on the comprehensive encryption system identified, it includes such as lower unit:
Authority dispensing unit, for the decryption information of the mobile terminal that prestores, described decryption information includes the voiceprint of validated user, finger print information and encrypted message;Each decryption information and the decrypted rights weights of decryption information combination are set;
Duration dispensing unit, for arranging the effect duration of each decryption information;
Monitoring unit, any one or several in real-time voiceprint, finger print information and the encrypted message monitored on mobile terminal;
Decryption unit, during for any one or several in listening to voiceprint, finger print information and the encrypted message mated with decryption information, judge whether within the effect duration of each decryption information, time within effect duration, the decrypted rights weights combined according to each decryption information and decryption information and the effect duration of each decryption information generate decryption oprerations instruction, performing decryption oprerations according to decryption oprerations instruction, otherwise prompting user cannot decipher.
In the encryption system based on comprehensive identification of the present invention,
In described authority dispensing unit:
The decrypted rights weights of each decryption information and decryption information combination are as follows: the weights that the weights that the weights of voiceprint are 1.5, the weights of finger print information are 1.5, the weights of encrypted message are 1, the weights of voiceprint and finger print information combination are 3, the weights of voiceprint and encrypted message combination are 2.5, finger print information and encrypted message combine are 2.5, voiceprint, voiceprint and finger print information and encrypted message combine are 4.
In the encryption system based on comprehensive identification of the present invention,
In described duration dispensing unit:
The effect duration of each decryption information and decryption information combination is as follows:
The effect duration of voiceprint be preset 2 times of duration of basis, the effect duration of finger print information be preset 2 times of duration of basis, encrypted message effect duration for presetting basis duration.
In the encryption system based on comprehensive identification of the present invention,
Described monitoring unit includes:
Monitor any one or several in the voiceprint on any one application program occurred on mobile terminal or main operation interface, finger print information and encrypted message in real time;
In listening to voiceprint, finger print information, encrypted message any one or several time, record voiceprint, finger print information, encrypted message occur time point and start timing.
In the encryption system based on comprehensive identification of the present invention,
Described decryption unit includes:
During any one or several in listening to voiceprint, finger print information and the encrypted message mated with decryption information, the time point and the clocking information that occur according to voiceprint, finger print information, encrypted message judge that voiceprint, finger print information, encrypted message are whether within the effect duration of each decryption information;
It is retained in the voiceprint within effect duration, finger print information, encrypted message;
The duration of configuration decryption oprerations instruction:
Situation one: when voiceprint, finger print information, encrypted message are all within effect duration, using the duration the shortest for lingering effect duration in the voiceprint being retained within effect duration, finger print information, the encrypted message duration as the 5th grade decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation two to situation six;
Situation two: when voiceprint, finger print information are all within effect duration, using the duration the shortest for lingering effect duration in the voiceprint being retained within effect duration, the finger print information duration as fourth estate decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation five;
Situation three: when voiceprint, encrypted message are all within effect duration, using the duration the shortest for lingering effect duration in the voiceprint being retained within effect duration, the encrypted message duration as tertiary gradient decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation five to situation six;
Situation four: when finger print information, encrypted message are all within effect duration, using the duration the shortest for lingering effect duration in the finger print information being retained within effect duration, the encrypted message duration as tertiary gradient decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation five to situation six;
Situation five: when voiceprint, finger print information one of which information are within effect duration, using the duration as the second grade decryption oprerations instruction of the lingering effect duration in the voiceprint being retained within effect duration, finger print information;
Situation six: when encrypted message is within effect duration, will be retained in the encrypted message within effect duration lingering effect duration as the duration of the first estate decryption oprerations instruction.
Implement the encryption method based on comprehensive identification provided by the invention and system compared with prior art has the advantages that the present invention passes through to monitor the voiceprint on mobile terminal, finger print information and encrypted message, and these information occur when being not exclusively for decryption oprerations, and exist and unlock with user fingerprints, take phone, among the scenes such as Video chat, the decrypted rights weights combined according to each decryption information and decryption information and the effect duration of each decryption information generate decryption oprerations instruction, decryption oprerations is performed according to decryption oprerations instruction, make user without inputting clear crytpographic key specially, and can dynamically adjust the grade of deciphering, intelligence degree is high.
Accompanying drawing explanation
Fig. 1 is the encryption method flow chart based on comprehensive identification of the embodiment of the present invention;
Fig. 2 is the encryption system structured flowchart based on comprehensive identification of the embodiment of the present invention.
Detailed description of the invention
As it is shown in figure 1, a kind of based on the comprehensive encryption method identified, it comprises the steps:
S1, the mobile terminal that prestores decryption information, described decryption information includes the voiceprint of validated user, finger print information and encrypted message;Each decryption information and the decrypted rights weights of decryption information combination are set.
Alternatively,
In described step S1:
The decrypted rights weights of each decryption information and decryption information combination are as follows: the weights that the weights that the weights of voiceprint are 1.5, the weights of finger print information are 1.5, the weights of encrypted message are 1, the weights of voiceprint and finger print information combination are 3, the weights of voiceprint and encrypted message combination are 2.5, finger print information and encrypted message combine are 2.5, voiceprint, voiceprint and finger print information and encrypted message combine are 4.
The voiceprint of validated user, finger print information and encrypted message refer to the information for encrypting file in decrypting mobile terminal.Be divided into the first order to level V the encryption file in mobile terminal, accordingly, weights be 1 encrypted message can decipher the encryption file of the first order, corresponding the first estate decryption oprerations instruction.Weights be 1.5 encrypted message can decipher the encryption file of the second level, corresponding second grade decryption oprerations instruction.Weights be 2.5 encrypted message can decipher the encryption file of the third level, corresponding tertiary gradient decryption oprerations instruction.Weights be 3 encrypted message can decipher the encryption file of the fourth stage, corresponding fourth estate decryption oprerations instruction.Weights be 4 encrypted message can decipher the encryption file of the fourth stage, corresponding fourth estate decryption oprerations instruction.
S2, the effect duration of each decryption information is set.
Alternatively,
In described step S2:
The effect duration of each decryption information and decryption information combination is as follows:
The effect duration of voiceprint be preset 2 times of duration of basis, the effect duration of finger print information be preset 2 times of duration of basis, encrypted message effect duration for presetting basis duration.
Any one or several in S3, real-time voiceprint, finger print information and the encrypted message monitored on mobile terminal.
Alternatively,
Described step S3 includes:
Monitor any one or several in the voiceprint on any one application program occurred on mobile terminal or main operation interface, finger print information and encrypted message in real time;
In listening to voiceprint, finger print information, encrypted message any one or several time, record voiceprint, finger print information, encrypted message occur time point and start timing.
When S4, any one or several in listening to voiceprint, finger print information and the encrypted message mated with decryption information, judge whether within the effect duration of each decryption information, time within effect duration, the decrypted rights weights combined according to each decryption information and decryption information and the effect duration of each decryption information generate decryption oprerations instruction, performing decryption oprerations according to decryption oprerations instruction, otherwise prompting user cannot decipher.
Alternatively,
Described step S4 includes:
During any one or several in listening to voiceprint, finger print information and the encrypted message mated with decryption information, the time point and the clocking information that occur according to voiceprint, finger print information, encrypted message judge that voiceprint, finger print information, encrypted message are whether within the effect duration of each decryption information;
It is retained in the voiceprint within effect duration, finger print information, encrypted message;
The duration of configuration decryption oprerations instruction:
Situation one: when voiceprint, finger print information, encrypted message are all within effect duration, using the duration the shortest for lingering effect duration in the voiceprint being retained within effect duration, finger print information, the encrypted message duration as the 5th grade decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation two to situation six;
Situation two: when voiceprint, finger print information are all within effect duration, using the duration the shortest for lingering effect duration in the voiceprint being retained within effect duration, the finger print information duration as fourth estate decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation five;
Situation three: when voiceprint, encrypted message are all within effect duration, using the duration the shortest for lingering effect duration in the voiceprint being retained within effect duration, the encrypted message duration as tertiary gradient decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation five to situation six;
Situation four: when finger print information, encrypted message are all within effect duration, using the duration the shortest for lingering effect duration in the finger print information being retained within effect duration, the encrypted message duration as tertiary gradient decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation five to situation six;
Situation five: when voiceprint, finger print information one of which information are within effect duration, using the duration as the second grade decryption oprerations instruction of the lingering effect duration in the voiceprint being retained within effect duration, finger print information;
Situation six: when encrypted message is within effect duration, will be retained in the encrypted message within effect duration lingering effect duration as the duration of the first estate decryption oprerations instruction.
By this step, the different grades of encryption document time that can decipher and grade are changeably, it is that listened to the voiceprint, finger print information and the encrypted message that mate with decryption information to mobile terminal relevant, and these decryption informations can be user's information when operating other application programs and carrying out the operations such as unlocking screen, because intelligence degree is higher.
As in figure 2 it is shown, the present invention also provides for a kind of based on the comprehensive encryption system identified, it includes such as lower unit:
Authority dispensing unit, for the decryption information of the mobile terminal that prestores, described decryption information includes the voiceprint of validated user, finger print information and encrypted message;Each decryption information and the decrypted rights weights of decryption information combination are set;
Duration dispensing unit, for arranging the effect duration of each decryption information;
Monitoring unit, any one or several in real-time voiceprint, finger print information and the encrypted message monitored on mobile terminal;
Decryption unit, during for any one or several in listening to voiceprint, finger print information and the encrypted message mated with decryption information, judge whether within the effect duration of each decryption information, time within effect duration, the decrypted rights weights combined according to each decryption information and decryption information and the effect duration of each decryption information generate decryption oprerations instruction, performing decryption oprerations according to decryption oprerations instruction, otherwise prompting user cannot decipher.
Alternatively,
In described authority dispensing unit:
The decrypted rights weights of each decryption information and decryption information combination are as follows: the weights that the weights that the weights of voiceprint are 1.5, the weights of finger print information are 1.5, the weights of encrypted message are 1, the weights of voiceprint and finger print information combination are 3, the weights of voiceprint and encrypted message combination are 2.5, finger print information and encrypted message combine are 2.5, voiceprint, voiceprint and finger print information and encrypted message combine are 4.
Alternatively,
In described duration dispensing unit:
The effect duration of each decryption information and decryption information combination is as follows:
The effect duration of voiceprint be preset 2 times of duration of basis, the effect duration of finger print information be preset 2 times of duration of basis, encrypted message effect duration for presetting basis duration.
Alternatively,
Described monitoring unit includes:
Monitor any one or several in the voiceprint on any one application program occurred on mobile terminal or main operation interface, finger print information and encrypted message in real time;
In listening to voiceprint, finger print information, encrypted message any one or several time, record voiceprint, finger print information, encrypted message occur time point and start timing.
Alternatively,
Described decryption unit includes:
During any one or several in listening to voiceprint, finger print information and the encrypted message mated with decryption information, the time point and the clocking information that occur according to voiceprint, finger print information, encrypted message judge that voiceprint, finger print information, encrypted message are whether within the effect duration of each decryption information;
It is retained in the voiceprint within effect duration, finger print information, encrypted message;
The duration of configuration decryption oprerations instruction:
Situation one: when voiceprint, finger print information, encrypted message are all within effect duration, using the duration the shortest for lingering effect duration in the voiceprint being retained within effect duration, finger print information, the encrypted message duration as the 5th grade decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation two to situation six;
Situation two: when voiceprint, finger print information are all within effect duration, using the duration the shortest for lingering effect duration in the voiceprint being retained within effect duration, the finger print information duration as fourth estate decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation five;
Situation three: when voiceprint, encrypted message are all within effect duration, using the duration the shortest for lingering effect duration in the voiceprint being retained within effect duration, the encrypted message duration as tertiary gradient decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation five to situation six;
Situation four: when finger print information, encrypted message are all within effect duration, using the duration the shortest for lingering effect duration in the finger print information being retained within effect duration, the encrypted message duration as tertiary gradient decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation five to situation six;
Situation five: when voiceprint, finger print information one of which information are within effect duration, using the duration as the second grade decryption oprerations instruction of the lingering effect duration in the voiceprint being retained within effect duration, finger print information;
Situation six: when encrypted message is within effect duration, will be retained in the encrypted message within effect duration lingering effect duration as the duration of the first estate decryption oprerations instruction.
Implement the encryption method based on comprehensive identification provided by the invention and system compared with prior art has the advantages that the present invention passes through to monitor the voiceprint on mobile terminal, finger print information and encrypted message, and these information occur when being not exclusively for decryption oprerations, and exist and unlock with user fingerprints, take phone, among the scenes such as Video chat, the decrypted rights weights combined according to each decryption information and decryption information and the effect duration of each decryption information generate decryption oprerations instruction, decryption oprerations is performed according to decryption oprerations instruction, make user without inputting clear crytpographic key specially, and can dynamically adjust the grade of deciphering, intelligence degree is high.
Said method embodiment and system embodiment are one to one, and therefore, the extension of embodiment of the method is equally applicable to said system embodiment.
The method described in conjunction with the embodiments described herein or the step of algorithm can directly use the software module that hardware, processor perform, or the combination of the two is implemented.Software module can be placed in the storage medium of other forms any known in random access memory, internal memory, read only memory, electrically programmable ROM, electrically erasable ROM, depositor, hard disk, moveable magnetic disc, CD-ROM or technical field.
It is understood that for the person of ordinary skill of the art, it is possible to conceive according to the technology of the present invention and make other various corresponding changes and deformation, and all these change and deform the protection domain that all should belong to the claims in the present invention.

Claims (10)

1., based on the comprehensive encryption method identified, it comprises the steps:
S1, the mobile terminal that prestores decryption information, described decryption information includes the voiceprint of validated user, finger print information and encrypted message;Each decryption information and the decrypted rights weights of decryption information combination are set;
S2, the effect duration of each decryption information is set;
Any one or several in S3, real-time voiceprint, finger print information and the encrypted message monitored on mobile terminal;
When S4, any one or several in listening to voiceprint, finger print information and the encrypted message mated with decryption information, judge whether within the effect duration of each decryption information, time within effect duration, the decrypted rights weights combined according to each decryption information and decryption information and the effect duration of each decryption information generate decryption oprerations instruction, performing decryption oprerations according to decryption oprerations instruction, otherwise prompting user cannot decipher.
2. according to claim 1 based on the comprehensive encryption method identified, it is characterised in that
In described step S1:
The decrypted rights weights of each decryption information and decryption information combination are as follows: the weights that the weights that the weights of voiceprint are 1.5, the weights of finger print information are 1.5, the weights of encrypted message are 1, the weights of voiceprint and finger print information combination are 3, the weights of voiceprint and encrypted message combination are 2.5, finger print information and encrypted message combine are 2.5, voiceprint, voiceprint and finger print information and encrypted message combine are 4.
3. according to claim 2 based on the comprehensive encryption method identified, it is characterised in that
In described step S2:
The effect duration of each decryption information and decryption information combination is as follows:
The effect duration of voiceprint be preset 2 times of duration of basis, the effect duration of finger print information be preset 2 times of duration of basis, encrypted message effect duration for presetting basis duration.
4. according to claim 3 based on the comprehensive encryption method identified, it is characterised in that
Described step S3 includes:
Monitor any one or several in the voiceprint on any one application program occurred on mobile terminal or main operation interface, finger print information and encrypted message in real time;
In listening to voiceprint, finger print information, encrypted message any one or several time, record voiceprint, finger print information, encrypted message occur time point and start timing.
5. according to claim 3 based on the comprehensive encryption method identified, it is characterised in that
Described step S4 includes:
During any one or several in listening to voiceprint, finger print information and the encrypted message mated with decryption information, the time point and the clocking information that occur according to voiceprint, finger print information, encrypted message judge that voiceprint, finger print information, encrypted message are whether within the effect duration of each decryption information;
It is retained in the voiceprint within effect duration, finger print information, encrypted message;
The duration of configuration decryption oprerations instruction:
Situation one: when voiceprint, finger print information, encrypted message are all within effect duration, using the duration the shortest for lingering effect duration in the voiceprint being retained within effect duration, finger print information, the encrypted message duration as the 5th grade decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation two to situation six;
Situation two: when voiceprint, finger print information are all within effect duration, using the duration the shortest for lingering effect duration in the voiceprint being retained within effect duration, the finger print information duration as fourth estate decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation five;
Situation three: when voiceprint, encrypted message are all within effect duration, using the duration the shortest for lingering effect duration in the voiceprint being retained within effect duration, the encrypted message duration as tertiary gradient decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation five to situation six;
Situation four: when finger print information, encrypted message are all within effect duration, using the duration the shortest for lingering effect duration in the finger print information being retained within effect duration, the encrypted message duration as tertiary gradient decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation five to situation six;
Situation five: when voiceprint, finger print information one of which information are within effect duration, using the duration as the second grade decryption oprerations instruction of the lingering effect duration in the voiceprint being retained within effect duration, finger print information;
Situation six: when encrypted message is within effect duration, will be retained in the encrypted message within effect duration lingering effect duration as the duration of the first estate decryption oprerations instruction.
6., based on the comprehensive encryption system identified, it includes such as lower unit:
Authority dispensing unit, for the decryption information of the mobile terminal that prestores, described decryption information includes the voiceprint of validated user, finger print information and encrypted message;Each decryption information and the decrypted rights weights of decryption information combination are set;
Duration dispensing unit, for arranging the effect duration of each decryption information;
Monitoring unit, any one or several in real-time voiceprint, finger print information and the encrypted message monitored on mobile terminal;
Decryption unit, during for any one or several in listening to voiceprint, finger print information and the encrypted message mated with decryption information, judge whether within the effect duration of each decryption information, time within effect duration, the decrypted rights weights combined according to each decryption information and decryption information and the effect duration of each decryption information generate decryption oprerations instruction, performing decryption oprerations according to decryption oprerations instruction, otherwise prompting user cannot decipher.
7. according to claim 6 based on the comprehensive encryption system identified, it is characterised in that
In described authority dispensing unit:
The decrypted rights weights of each decryption information and decryption information combination are as follows: the weights that the weights that the weights of voiceprint are 1.5, the weights of finger print information are 1.5, the weights of encrypted message are 1, the weights of voiceprint and finger print information combination are 3, the weights of voiceprint and encrypted message combination are 2.5, finger print information and encrypted message combine are 2.5, voiceprint, voiceprint and finger print information and encrypted message combine are 4.
8. according to claim 7 based on the comprehensive encryption system identified, it is characterised in that
In described duration dispensing unit:
The effect duration of each decryption information and decryption information combination is as follows:
The effect duration of voiceprint be preset 2 times of duration of basis, the effect duration of finger print information be preset 2 times of duration of basis, encrypted message effect duration for presetting basis duration.
9. according to claim 8 based on the comprehensive encryption method identified, it is characterised in that
Described monitoring unit includes:
Monitor any one or several in the voiceprint on any one application program occurred on mobile terminal or main operation interface, finger print information and encrypted message in real time;
In listening to voiceprint, finger print information, encrypted message any one or several time, record voiceprint, finger print information, encrypted message occur time point and start timing.
10. according to claim 9 based on the comprehensive encryption method identified, it is characterised in that
Described decryption unit includes:
During any one or several in listening to voiceprint, finger print information and the encrypted message mated with decryption information, the time point and the clocking information that occur according to voiceprint, finger print information, encrypted message judge that voiceprint, finger print information, encrypted message are whether within the effect duration of each decryption information;
It is retained in the voiceprint within effect duration, finger print information, encrypted message;
The duration of configuration decryption oprerations instruction:
Situation one: when voiceprint, finger print information, encrypted message are all within effect duration, using the duration the shortest for lingering effect duration in the voiceprint being retained within effect duration, finger print information, the encrypted message duration as the 5th grade decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation two to situation six;
Situation two: when voiceprint, finger print information are all within effect duration, using the duration the shortest for lingering effect duration in the voiceprint being retained within effect duration, the finger print information duration as fourth estate decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation five;
Situation three: when voiceprint, encrypted message are all within effect duration, using the duration the shortest for lingering effect duration in the voiceprint being retained within effect duration, the encrypted message duration as tertiary gradient decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation five to situation six;
Situation four: when finger print information, encrypted message are all within effect duration, using the duration the shortest for lingering effect duration in the finger print information being retained within effect duration, the encrypted message duration as tertiary gradient decryption oprerations instruction;Retain the duration of the decryption oprerations instruction meeting situation five to situation six;
Situation five: when voiceprint, finger print information one of which information are within effect duration, using the duration as the second grade decryption oprerations instruction of the lingering effect duration in the voiceprint being retained within effect duration, finger print information;
Situation six: when encrypted message is within effect duration, will be retained in the encrypted message within effect duration lingering effect duration as the duration of the first estate decryption oprerations instruction.
CN201610189735.2A 2016-03-30 2016-03-30 A kind of encryption method and system based on comprehensive identification Expired - Fee Related CN105787329B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610189735.2A CN105787329B (en) 2016-03-30 2016-03-30 A kind of encryption method and system based on comprehensive identification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610189735.2A CN105787329B (en) 2016-03-30 2016-03-30 A kind of encryption method and system based on comprehensive identification

Publications (2)

Publication Number Publication Date
CN105787329A true CN105787329A (en) 2016-07-20
CN105787329B CN105787329B (en) 2019-06-25

Family

ID=56391331

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610189735.2A Expired - Fee Related CN105787329B (en) 2016-03-30 2016-03-30 A kind of encryption method and system based on comprehensive identification

Country Status (1)

Country Link
CN (1) CN105787329B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106231594A (en) * 2016-09-19 2016-12-14 惠州Tcl移动通信有限公司 A kind of information of mobile terminal guard method and system
CN108881712A (en) * 2018-04-28 2018-11-23 Oppo广东移动通信有限公司 Image processing method, device, computer readable storage medium and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050229009A1 (en) * 1999-06-21 2005-10-13 Fujitsu Limited Method and equipment for encrypting/decrypting physical characteristic information, and identification system utilizing the physical characteristic information
CN104573550A (en) * 2014-12-27 2015-04-29 小米科技有限责任公司 Method and device for protecting data
CN104598795A (en) * 2015-01-30 2015-05-06 科大讯飞股份有限公司 Authentication method and system
CN105072249A (en) * 2015-07-07 2015-11-18 百度在线网络技术(北京)有限公司 Method and device of preventing mobile device from being stolen, and corresponding mobile device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050229009A1 (en) * 1999-06-21 2005-10-13 Fujitsu Limited Method and equipment for encrypting/decrypting physical characteristic information, and identification system utilizing the physical characteristic information
CN104573550A (en) * 2014-12-27 2015-04-29 小米科技有限责任公司 Method and device for protecting data
CN104598795A (en) * 2015-01-30 2015-05-06 科大讯飞股份有限公司 Authentication method and system
CN105072249A (en) * 2015-07-07 2015-11-18 百度在线网络技术(北京)有限公司 Method and device of preventing mobile device from being stolen, and corresponding mobile device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106231594A (en) * 2016-09-19 2016-12-14 惠州Tcl移动通信有限公司 A kind of information of mobile terminal guard method and system
CN106231594B (en) * 2016-09-19 2019-12-10 惠州Tcl移动通信有限公司 Mobile terminal information protection method and system
CN108881712A (en) * 2018-04-28 2018-11-23 Oppo广东移动通信有限公司 Image processing method, device, computer readable storage medium and electronic equipment

Also Published As

Publication number Publication date
CN105787329B (en) 2019-06-25

Similar Documents

Publication Publication Date Title
US11310058B2 (en) Methods for digitally signing an electronic file and authentication method
US8930700B2 (en) Remote device secure data file storage system and method
WO2016061899A1 (en) Fingerprint decryption method and device
US20160100314A1 (en) Mobile data communication using biometric encryption
CN101674575B (en) Method for protecting security of mobile communication terminal data and device thereof
CN104239815A (en) Electronic document encryption and decryption method and method based on iris identification
CN105429761A (en) Key generation method and device
CN103236930A (en) Data encryption method and system
CN111191289A (en) Method for displaying and storing private data
CN104468937A (en) Data encryption and decryption methods and devices for mobile terminal and protection system
CN103560892A (en) Secret key generation method and secret key generation device
CN106650373A (en) SIM card information protection method and device
CN104363087A (en) Encryption and decryption method and device
US9225514B2 (en) Method for image encryption and decryption incorporating physiological features and image capture device thereof
CN105337742A (en) LFSR (Linear Feedback Shift Register) file encryption and decryption methods based on human face image features and GPS (Global Position System) information
CN106921489A (en) A kind of data ciphering method and device
US7177425B2 (en) Device and method for securing information associated with a subscriber in a communication apparatus
CN103873521A (en) Cloud architecture-based mobile phone privacy file protection system and method
CN105787329A (en) Encryption method and system based on synthetic recognition
CN105279447A (en) Method and device for data encryption, and method and device for data decryption
CN111859423A (en) Information security encryption method and device
CN106503503A (en) A kind of user behavior encryption method and system based on computer big data
Ashish et al. Biometric Temp
CN105868595A (en) Improved encryption method and system based on comprehensive recognition
JP2015233263A (en) Authentication system and authentication method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20190527

Address after: Room 5827, Building 3, 112-118 Gaoyi Road, Baoshan District, Shanghai, 201900

Applicant after: Shanghai Yueman Network Technology Co.,Ltd.

Address before: 315000 Second Floor of Building 1, Lingyun Industrial Park, 1177 Lingyun Road, Ningbo High-tech Zone, Zhejiang Province

Applicant before: NINGBO 3B ELECTRONIC TECHNOLOGY CO.,LTD.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190625

CF01 Termination of patent right due to non-payment of annual fee