CN105809004B - A kind of communication means and system of the encryption technology based on comprehensive identification - Google Patents
A kind of communication means and system of the encryption technology based on comprehensive identification Download PDFInfo
- Publication number
- CN105809004B CN105809004B CN201610189733.3A CN201610189733A CN105809004B CN 105809004 B CN105809004 B CN 105809004B CN 201610189733 A CN201610189733 A CN 201610189733A CN 105809004 B CN105809004 B CN 105809004B
- Authority
- CN
- China
- Prior art keywords
- duration
- information
- voiceprint
- encrypted message
- finger print
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2113—Multi-level security, e.g. mandatory access control
Abstract
A kind of communication means and system of the encryption technology based on comprehensive identification.S1, the solution confidential information for prestoring the second mobile terminal, the decryption information include the voiceprint, finger print information and encrypted message of legitimate user;Each solution confidential information is set and solves the decrypted rights weight of confidential information combination;The effect duration of S2, each solution confidential information of setting;S3, in real time any one or more of voiceprint, finger print information and encrypted message on the second mobile terminal of monitoring;S4, when listening to any one or more of voiceprint, finger print information and the encrypted message with decryption information matches, judge whether in solution confidential information and solves within the effect duration that confidential information combines, when within effect duration, decryption oprerations instruction is generated according to each solution confidential information and the effect duration for solving decrypted rights weight and each solution confidential information that confidential information combines, according to decryption oprerations instruction execution decryption oprerations, otherwise prompt user that can not decrypt.The present invention also provides a kind of communication systems of encryption technology based on comprehensive identification.
Description
Technical field
The present invention relates to technical field of information encryption, in particular to the communication party of a kind of encryption technology based on comprehensive identification
Method and system.
Background technique
Improved day by day with the second mobile terminal function, the second mobile terminal is played the part of in people's daily life work
Role it is increasingly important, at the same time, the privacy concern of the safety of the second mobile terminal and user more and more attention has been paid to.
Currently, most of second mobile terminals all support encryption function, the encryption function including supporting the screen for the second mobile terminal
Can, such as current password screen locking function;Support the encryption function for the file in the second mobile terminal, such as current atlas,
Photograph album encryption function etc..
However existing Crypted password can not carry out general on first movement terminal, the second mobile terminal, can not also expire
The different encryption requirements of foot difference file.
Summary of the invention
In view of this, the present invention proposes the communication means and system of a kind of encryption technology based on comprehensive identification.
A kind of communication means of the encryption technology based on comprehensive identification comprising following steps:
S1, the second mobile terminal receive the encryption information that first movement terminal is sent;Prestore the decryption of the second mobile terminal
Information, the decryption information include the voiceprint, finger print information and encrypted message of legitimate user;Be arranged each solution confidential information with
And the decrypted rights weight of solution confidential information combination;
The effect duration of S2, each solution confidential information of setting;
S3, monitor in real time any one of voiceprint, finger print information and encrypted message on the second mobile terminal or
It is several;
S4, listen to any one of voiceprint, finger print information and encrypted message of decryption information matches or
When several, judge whether within the effect duration of each solution confidential information, when within effect duration, according to each solution confidential information and
The effect duration of the decrypted rights weight and each solution confidential information that solve confidential information combination generates decryption oprerations instruction, according to decryption oprerations
Otherwise instruction execution decryption oprerations pop up the corresponding clear crytpographic key input frame of encryption information, user are prompted to input clear crytpographic key,
When user inputs legal clear crytpographic key, corresponding encryption information is decrypted, when user inputs clear crytpographic key mistake, calls loudspeaker
Alarm sound is issued, the second mobile terminal feeds back decrypted result to first movement terminal.
In the communication means of the encryption technology of the present invention based on comprehensive identification,
In the step S1:
Each solution confidential information and the decrypted rights weight for solving confidential information combination are as follows: the weight of voiceprint is 1.5, fingerprint
The weight that the weight of information is 1.5, the weight of encrypted message is 1, voiceprint is combined with finger print information is 3, voiceprint with
Encrypted message combination weight be 2.5, the weight that finger print information combine with encrypted message is 2.5, voiceprint, voiceprint and
Finger print information and the weight of encrypted message combination are 4.
In the communication means of the encryption technology of the present invention based on comprehensive identification,
In the step S2:
Each solution confidential information and the effect duration for solving confidential information combination are as follows:
2 times of a length of default basic duration when the effect of voiceprint, when the effect of finger print information when a length of default basis
A length of default basic duration when long 2 times, the effect of encrypted message.
In the communication means of the encryption technology of the present invention based on comprehensive identification,
The step S3 includes:
Any application program occurred on the second mobile terminal of monitoring in real time or the voiceprint in main operation interface refer to
Any one or more of line information and encrypted message;
Listen to voiceprint, finger print information, it is any one or several in encrypted message when, record voiceprint, fingerprint
Information, encrypted message occur time point and start timing.
In the communication means of the encryption technology of the present invention based on comprehensive identification,
The step S4 includes:
Listening to any one or more of voiceprint, finger print information and encrypted message with decryption information matches
When, the time point and clocking information occurred according to voiceprint, finger print information, encrypted message judges that voiceprint, fingerprint are believed
Whether breath, encrypted message are within the effect duration of each solution confidential information;
Voiceprint, finger print information, the encrypted message being retained within effect duration;
Configure the duration of decryption oprerations instruction:
Situation one: when voiceprint, finger print information, encrypted message are within effect duration, when by being retained in effect
The shortest duration of lingering effect duration is grasped as the level decryptions such as 5th in voiceprint, finger print information, encrypted message within length
Make the duration instructed;Retain the duration that the decryption oprerations for meeting situation two to situation six instruct;
Situation two: when voiceprint, finger print information are within effect duration, the sound within effect duration will be retained in
The duration that the shortest duration of lingering effect duration is instructed as fourth estate decryption oprerations in line information, finger print information;Retain full
The duration of the decryption oprerations instruction of sufficient situation five;
Situation three: when voiceprint, encrypted message are within effect duration, the sound within effect duration will be retained in
The duration that the shortest duration of lingering effect duration is instructed as tertiary gradient decryption oprerations in line information, encrypted message;Retain full
The duration that the decryption oprerations of sufficient situation five to situation six instruct;
Situation four: when finger print information, encrypted message are within effect duration, the finger within effect duration will be retained in
The duration that the shortest duration of lingering effect duration is instructed as tertiary gradient decryption oprerations in line information, encrypted message;Retain full
The duration that the decryption oprerations of sufficient situation five to situation six instruct;
Situation five: when voiceprint, finger print information one of which information are within effect duration, when by being retained in effect
The duration that lingering effect duration is instructed as the second grade decryption oprerations in voiceprint, finger print information within length;
Situation six: when encrypted message is within effect duration, it will be retained in the encrypted message within effect duration and remain
The duration that residual effect power duration is instructed as the first estate decryption oprerations.
The present invention also provides a kind of communication systems of encryption technology based on comprehensive identification comprising such as lower unit:
Authority configuration unit receives the encryption information that first movement terminal is sent for the second mobile terminal;Prestore second
The solution confidential information of mobile terminal, the decryption information include the voiceprint, finger print information and encrypted message of legitimate user;If
It sets each solution confidential information and solves the decrypted rights weight of confidential information combination;
Duration configuration unit, for the effect duration of each solution confidential information to be arranged;
Monitoring unit, for being monitored in voiceprint, finger print information and encrypted message on the second mobile terminal in real time
It is any one or several;
Decryption unit, in listening to voiceprint, finger print information and encrypted message with decryption information matches
It is any one or several when, judge whether it is each solution confidential information effect duration within, when within effect duration, according to each solution
The effect duration of the decrypted rights weight and each solution confidential information of confidential information and solution confidential information combination generates decryption oprerations instruction, root
According to decryption oprerations instruction execution decryption oprerations, the corresponding clear crytpographic key input frame of encryption information is otherwise popped up, prompts user's input
Clear crytpographic key decrypts corresponding encryption information when user inputs legal clear crytpographic key, inputs clear crytpographic key mistake in user
When, call loudspeaker to issue alarm sound, the second mobile terminal feeds back decrypted result to first movement terminal.
In the communication system of the encryption technology of the present invention based on comprehensive identification,
In the authority configuration unit:
Each solution confidential information and the decrypted rights weight for solving confidential information combination are as follows: the weight of voiceprint is 1.5, fingerprint
The weight that the weight of information is 1.5, the weight of encrypted message is 1, voiceprint is combined with finger print information is 3, voiceprint with
Encrypted message combination weight be 2.5, the weight that finger print information combine with encrypted message is 2.5, voiceprint, voiceprint and
Finger print information and the weight of encrypted message combination are 4.
In the communication system of the encryption technology of the present invention based on comprehensive identification,
In the duration configuration unit:
Each solution confidential information and the effect duration for solving confidential information combination are as follows:
2 times of a length of default basic duration when the effect of voiceprint, when the effect of finger print information when a length of default basis
A length of default basic duration when long 2 times, the effect of encrypted message.
In the communication system of the encryption technology of the present invention based on comprehensive identification,
The monitoring unit includes:
Any application program occurred on the second mobile terminal of monitoring in real time or the voiceprint in main operation interface refer to
Any one or more of line information and encrypted message;
Listen to voiceprint, finger print information, it is any one or several in encrypted message when, record voiceprint, fingerprint
Information, encrypted message occur time point and start timing.
In the communication system of the encryption technology of the present invention based on comprehensive identification,
The decryption unit includes:
Listening to any one or more of voiceprint, finger print information and encrypted message with decryption information matches
When, the time point and clocking information occurred according to voiceprint, finger print information, encrypted message judges that voiceprint, fingerprint are believed
Whether breath, encrypted message are within the effect duration of each solution confidential information;
Voiceprint, finger print information, the encrypted message being retained within effect duration;
Configure the duration of decryption oprerations instruction:
Situation one: when voiceprint, finger print information, encrypted message are within effect duration, when by being retained in effect
The shortest duration of lingering effect duration is grasped as the level decryptions such as 5th in voiceprint, finger print information, encrypted message within length
Make the duration instructed;Retain the duration that the decryption oprerations for meeting situation two to situation six instruct;
Situation two: when voiceprint, finger print information are within effect duration, the sound within effect duration will be retained in
The duration that the shortest duration of lingering effect duration is instructed as fourth estate decryption oprerations in line information, finger print information;Retain full
The duration of the decryption oprerations instruction of sufficient situation five;
Situation three: when voiceprint, encrypted message are within effect duration, the sound within effect duration will be retained in
The duration that the shortest duration of lingering effect duration is instructed as tertiary gradient decryption oprerations in line information, encrypted message;Retain full
The duration that the decryption oprerations of sufficient situation five to situation six instruct;
Situation four: when finger print information, encrypted message are within effect duration, the finger within effect duration will be retained in
The duration that the shortest duration of lingering effect duration is instructed as tertiary gradient decryption oprerations in line information, encrypted message;Retain full
The duration that the decryption oprerations of sufficient situation five to situation six instruct;
Situation five: when voiceprint, finger print information one of which information are within effect duration, when by being retained in effect
The duration that lingering effect duration is instructed as the second grade decryption oprerations in voiceprint, finger print information within length;
Situation six: when encrypted message is within effect duration, it will be retained in the encrypted message within effect duration and remain
The duration that residual effect power duration is instructed as the first estate decryption oprerations.
The communication means and system for implementing the encryption technology provided by the invention based on comprehensive identification are compared with prior art
Have the advantages that the present invention passes through voiceprint, finger print information and the encrypted message monitored on the second mobile terminal,
And these information are not exclusively for generation when decryption oprerations, and exist and user fingerprints unlock, making and receiving calls, Video chat
Etc. among scenes, according to each solution confidential information and solve the decrypted rights weight of confidential information combination and the effect duration of each solution confidential information
Decryption oprerations instruction is generated, according to decryption oprerations instruction execution decryption oprerations, so that user is not necessarily to special input clear crytpographic key, and
And the grade of decryption can be dynamically adjusted, intelligence degree is high.In addition, calling loudspeaking when user inputs clear crytpographic key mistake
Device issues alarm sound, so that the information protection safe coefficient of the second mobile terminal is higher.The present invention is applied in which can be convenient
The bipartite secret communication of mobile terminal.
Detailed description of the invention
Fig. 1 is the communication means flow chart of the encryption technology based on comprehensive identification of the embodiment of the present invention;
Fig. 2 is the communication system architecture block diagram of the encryption technology based on comprehensive identification of the embodiment of the present invention.
Specific embodiment
As shown in Figure 1, a kind of communication means of the encryption technology based on comprehensive identification comprising following steps:
S1, the second mobile terminal receive the encryption information that first movement terminal is sent;Prestore the decryption of the second mobile terminal
Information, the decryption information include the voiceprint, finger print information and encrypted message of legitimate user;Be arranged each solution confidential information with
And the decrypted rights weight of solution confidential information combination.
Optionally,
In the step S1:
Each solution confidential information and the decrypted rights weight for solving confidential information combination are as follows: the weight of voiceprint is 1.5, fingerprint
The weight that the weight of information is 1.5, the weight of encrypted message is 1, voiceprint is combined with finger print information is 3, voiceprint with
Encrypted message combination weight be 2.5, the weight that finger print information combine with encrypted message is 2.5, voiceprint, voiceprint and
Finger print information and the weight of encrypted message combination are 4.
Voiceprint, finger print information and the encrypted message of legitimate user refers to be encrypted for decrypting in the second mobile terminal
The information of information.Encryption information in second mobile terminal is divided into the first order to level V, correspondingly, weight be 1 it is close
Code information can decrypt the encryption information of the first order, corresponding the first estate decryption oprerations instruction.The encrypted message that weight is 1.5 can
To decrypt the encryption information of the second level, corresponding second grade decryption oprerations instruction.The encrypted message that weight is 2.5 can decrypt the
The encryption information of three-level, corresponding tertiary gradient decryption oprerations instruction.The encrypted message that weight is 3 can decrypt the encryption of the fourth stage
Information, corresponding fourth estate decryption oprerations instruction.The encrypted message that weight is 4 can decrypt the encryption information of the fourth stage, corresponding
Fourth estate decryption oprerations instruction.
The effect duration of S2, each solution confidential information of setting.
Optionally,
In the step S2:
Each solution confidential information and the effect duration for solving confidential information combination are as follows:
2 times of a length of default basic duration when the effect of voiceprint, when the effect of finger print information when a length of default basis
A length of default basic duration when long 2 times, the effect of encrypted message.
S3, monitor in real time any one of voiceprint, finger print information and encrypted message on the second mobile terminal or
It is several.
Optionally,
The step S3 includes:
Any application program occurred on the second mobile terminal of monitoring in real time or the voiceprint in main operation interface refer to
Any one or more of line information and encrypted message;
Listen to voiceprint, finger print information, it is any one or several in encrypted message when, record voiceprint, fingerprint
Information, encrypted message occur time point and start timing.
S4, listen to any one of voiceprint, finger print information and encrypted message of decryption information matches or
When several, judge whether within the effect duration of each solution confidential information, when within effect duration, according to each solution confidential information and
The effect duration of the decrypted rights weight and each solution confidential information that solve confidential information combination generates decryption oprerations instruction, according to decryption oprerations
Otherwise instruction execution decryption oprerations pop up the corresponding clear crytpographic key input frame of encryption information, user are prompted to input clear crytpographic key,
When user inputs legal clear crytpographic key, corresponding encryption information is decrypted, when user inputs clear crytpographic key mistake, calls loudspeaker
Alarm sound is issued, the second mobile terminal feeds back decrypted result to first movement terminal.
By implementing this step, can effectively be mended to by voiceprint, finger print information, encrypted message decryption
It fills.
Optionally,
The step S4 includes:
Listening to any one or more of voiceprint, finger print information and encrypted message with decryption information matches
When, the time point and clocking information occurred according to voiceprint, finger print information, encrypted message judges that voiceprint, fingerprint are believed
Whether breath, encrypted message are within the effect duration of each solution confidential information;
Voiceprint, finger print information, the encrypted message being retained within effect duration;
Configure the duration of decryption oprerations instruction:
Situation one: when voiceprint, finger print information, encrypted message are within effect duration, when by being retained in effect
The shortest duration of lingering effect duration is grasped as the level decryptions such as 5th in voiceprint, finger print information, encrypted message within length
Make the duration instructed;Retain the duration that the decryption oprerations for meeting situation two to situation six instruct;
Situation two: when voiceprint, finger print information are within effect duration, the sound within effect duration will be retained in
The duration that the shortest duration of lingering effect duration is instructed as fourth estate decryption oprerations in line information, finger print information;Retain full
The duration of the decryption oprerations instruction of sufficient situation five;
Situation three: when voiceprint, encrypted message are within effect duration, the sound within effect duration will be retained in
The duration that the shortest duration of lingering effect duration is instructed as tertiary gradient decryption oprerations in line information, encrypted message;Retain full
The duration that the decryption oprerations of sufficient situation five to situation six instruct;
Situation four: when finger print information, encrypted message are within effect duration, the finger within effect duration will be retained in
The duration that the shortest duration of lingering effect duration is instructed as tertiary gradient decryption oprerations in line information, encrypted message;Retain full
The duration that the decryption oprerations of sufficient situation five to situation six instruct;
Situation five: when voiceprint, finger print information one of which information are within effect duration, when by being retained in effect
The duration that lingering effect duration is instructed as the second grade decryption oprerations in voiceprint, finger print information within length;
Situation six: when encrypted message is within effect duration, it will be retained in the encrypted message within effect duration and remain
The duration that residual effect power duration is instructed as the first estate decryption oprerations.
The different grades of encryption information time and grade that can be decrypted by this step be changeably, be and second move
Dynamic terminal listens to, and these decryption relevant with the voiceprint, finger print information and encrypted message of information matches is decrypted
Information can be information of the user when operating the operation such as other applications and progress unlocking screen, because intelligence degree is more
It is high.
As shown in Fig. 2, the present invention also provides a kind of communication systems of encryption technology based on comprehensive identification comprising as follows
Unit:
Authority configuration unit receives the encryption information that first movement terminal is sent for the second mobile terminal;Prestore second
The solution confidential information of mobile terminal, the decryption information include the voiceprint, finger print information and encrypted message of legitimate user;If
It sets each solution confidential information and solves the decrypted rights weight of confidential information combination;
Duration configuration unit, for the effect duration of each solution confidential information to be arranged;
Monitoring unit, for being monitored in voiceprint, finger print information and encrypted message on the second mobile terminal in real time
It is any one or several;
Decryption unit, in listening to voiceprint, finger print information and encrypted message with decryption information matches
It is any one or several when, judge whether it is each solution confidential information effect duration within, when within effect duration, according to each solution
The effect duration of the decrypted rights weight and each solution confidential information of confidential information and solution confidential information combination generates decryption oprerations instruction, root
According to decryption oprerations instruction execution decryption oprerations, the corresponding clear crytpographic key input frame of encryption information is otherwise popped up, prompts user's input
Clear crytpographic key decrypts corresponding encryption information when user inputs legal clear crytpographic key, inputs clear crytpographic key mistake in user
When, call loudspeaker to issue alarm sound, the second mobile terminal feeds back decrypted result to first movement terminal.
Optionally,
In the authority configuration unit:
Each solution confidential information and the decrypted rights weight for solving confidential information combination are as follows: the weight of voiceprint is 1.5, fingerprint
The weight that the weight of information is 1.5, the weight of encrypted message is 1, voiceprint is combined with finger print information is 3, voiceprint with
Encrypted message combination weight be 2.5, the weight that finger print information combine with encrypted message is 2.5, voiceprint, voiceprint and
Finger print information and the weight of encrypted message combination are 4.
Optionally,
In the duration configuration unit:
Each solution confidential information and the effect duration for solving confidential information combination are as follows:
2 times of a length of default basic duration when the effect of voiceprint, when the effect of finger print information when a length of default basis
A length of default basic duration when long 2 times, the effect of encrypted message.
Optionally,
The monitoring unit includes:
Any application program occurred on the second mobile terminal of monitoring in real time or the voiceprint in main operation interface refer to
Any one or more of line information and encrypted message;
Listen to voiceprint, finger print information, it is any one or several in encrypted message when, record voiceprint, fingerprint
Information, encrypted message occur time point and start timing.
Optionally,
The decryption unit includes:
Listening to any one or more of voiceprint, finger print information and encrypted message with decryption information matches
When, the time point and clocking information occurred according to voiceprint, finger print information, encrypted message judges that voiceprint, fingerprint are believed
Whether breath, encrypted message are within the effect duration of each solution confidential information;
Voiceprint, finger print information, the encrypted message being retained within effect duration;
Configure the duration of decryption oprerations instruction:
Situation one: when voiceprint, finger print information, encrypted message are within effect duration, when by being retained in effect
The shortest duration of lingering effect duration is grasped as the level decryptions such as 5th in voiceprint, finger print information, encrypted message within length
Make the duration instructed;Retain the duration that the decryption oprerations for meeting situation two to situation six instruct;
Situation two: when voiceprint, finger print information are within effect duration, the sound within effect duration will be retained in
The duration that the shortest duration of lingering effect duration is instructed as fourth estate decryption oprerations in line information, finger print information;Retain full
The duration of the decryption oprerations instruction of sufficient situation five;
Situation three: when voiceprint, encrypted message are within effect duration, the sound within effect duration will be retained in
The duration that the shortest duration of lingering effect duration is instructed as tertiary gradient decryption oprerations in line information, encrypted message;Retain full
The duration that the decryption oprerations of sufficient situation five to situation six instruct;
Situation four: when finger print information, encrypted message are within effect duration, the finger within effect duration will be retained in
The duration that the shortest duration of lingering effect duration is instructed as tertiary gradient decryption oprerations in line information, encrypted message;Retain full
The duration that the decryption oprerations of sufficient situation five to situation six instruct;
Situation five: when voiceprint, finger print information one of which information are within effect duration, when by being retained in effect
The duration that lingering effect duration is instructed as the second grade decryption oprerations in voiceprint, finger print information within length;
Situation six: when encrypted message is within effect duration, it will be retained in the encrypted message within effect duration and remain
The duration that residual effect power duration is instructed as the first estate decryption oprerations.
The communication means and system for implementing the encryption technology provided by the invention based on comprehensive identification are compared with prior art
Have the advantages that the present invention passes through voiceprint, finger print information and the encrypted message monitored on the second mobile terminal,
And these information are not exclusively for generation when decryption oprerations, and exist and user fingerprints unlock, making and receiving calls, Video chat
Etc. among scenes, according to each solution confidential information and solve the decrypted rights weight of confidential information combination and the effect duration of each solution confidential information
Decryption oprerations instruction is generated, according to decryption oprerations instruction execution decryption oprerations, so that user is not necessarily to special input clear crytpographic key, and
And the grade of decryption can be dynamically adjusted, intelligence degree is high.In addition, calling loudspeaking when user inputs clear crytpographic key mistake
Device issues alarm sound, so that the information protection safe coefficient of the second mobile terminal is higher.The present invention is applied in which can be convenient
The bipartite secret communication of mobile terminal.
Above method embodiment and system embodiment are correspondingly that therefore, the extension of embodiment of the method is also applicable
In the above system embodiment.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can directly be held with hardware, processor
The combination of capable software module or the two is implemented.Software module can be placed in random access memory, memory, read-only memory,
Institute is public in electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field
In the storage medium for any other forms known.
It is understood that for those of ordinary skill in the art, can do in accordance with the technical idea of the present invention
Various other changes and modifications out, and all these changes and deformation all should belong to the protection model of the claims in the present invention
It encloses.
Claims (8)
1. a kind of communication means of the encryption technology based on comprehensive identification comprising following steps:
S1, the second mobile terminal receive the encryption information that first movement terminal is sent;The solution confidential information of the second mobile terminal is prestored,
The decryption information includes the voiceprint, finger print information and encrypted message of legitimate user;Each solution confidential information and solution are set
The decrypted rights weight of confidential information combination;
The effect duration of S2, each solution confidential information of setting;
S3, in real time any one or more of voiceprint, finger print information and encrypted message on the second mobile terminal of monitoring;
S4, any one or more of voiceprint, finger print information and encrypted message with decryption information matches are being listened to
When, judge whether within the effect duration of each solution confidential information, when within effect duration, according to each solution confidential information and decryption
The effect duration of the decrypted rights weight of information combination and each solution confidential information generates decryption oprerations instruction, is instructed according to decryption oprerations
Decryption oprerations are executed, if it fails, then popping up the corresponding clear crytpographic key input frame of encryption file, prompt user to input decryption close
Code decrypts corresponding encryption information when user inputs legal clear crytpographic key, when user inputs clear crytpographic key mistake, calls
Loudspeaker issues alarm sound, and the second mobile terminal feeds back decrypted result to first movement terminal;
The step S4 includes:
When listening to any one or more of voiceprint, finger print information and the encrypted message with decryption information matches,
According to voiceprint, finger print information, encrypted message occur time point and clocking information judge voiceprint, finger print information,
Whether encrypted message is within the effect duration of each solution confidential information;
Voiceprint, finger print information, the encrypted message being retained within effect duration;
Configure the duration of decryption oprerations instruction:
Situation one: when voiceprint, finger print information, encrypted message are within effect duration, will be retained in effect duration it
Interior voiceprint, finger print information, the shortest duration of lingering effect duration refers to as the 5th grade decryption oprerations in encrypted message
The duration of order;Retain the duration that the decryption oprerations for meeting situation two to situation six instruct;
Situation two: when voiceprint, finger print information are within effect duration, the vocal print being retained within effect duration is believed
The duration that the shortest duration of lingering effect duration is instructed as fourth estate decryption oprerations in breath, finger print information;Reservation meets feelings
The duration of the decryption oprerations instruction of shape five;
Situation three: when voiceprint, encrypted message are within effect duration, the vocal print being retained within effect duration is believed
The duration that the shortest duration of lingering effect duration is instructed as tertiary gradient decryption oprerations in breath, encrypted message;Reservation meets feelings
The duration that the decryption oprerations of shape five to situation six instruct;
Situation four: when finger print information, encrypted message are within effect duration, the fingerprint being retained within effect duration is believed
The duration that the shortest duration of lingering effect duration is instructed as tertiary gradient decryption oprerations in breath, encrypted message;Reservation meets feelings
The duration that the decryption oprerations of shape five to situation six instruct;
Situation five: when voiceprint, finger print information one of which information are within effect duration, will be retained in effect duration it
The duration that lingering effect duration is instructed as the second grade decryption oprerations in interior voiceprint, finger print information;
Situation six: when encrypted message is within effect duration, remaining effect will be retained in the encrypted message within effect duration
The duration that power duration is instructed as the first estate decryption oprerations.
2. the communication means of the encryption technology according to claim 1 based on comprehensive identification, which is characterized in that
In the step S1:
Each solution confidential information and the decrypted rights weight for solving confidential information combination are as follows: the weight of voiceprint is 1.5, finger print information
Weight be 1.5, the weight that the weight of encrypted message is 1, voiceprint is combined with finger print information is 3, voiceprint and password
The weight of information combination is 2.5, the weight that finger print information is combined with encrypted message is 2.5, voiceprint and finger print information and close
The weight of code information combination is 4.
3. the communication means of the encryption technology according to claim 2 based on comprehensive identification, which is characterized in that
In the step S2:
Each solution confidential information and the effect duration for solving confidential information combination are as follows:
2 times of a length of default basic duration when the effect of voiceprint, when the effect of finger print information a length of default basic duration 2
Again, a length of default basic duration when the effect of encrypted message.
4. the communication means of the encryption technology according to claim 3 based on comprehensive identification, which is characterized in that
The step S3 includes:
Any application program occurred on the second mobile terminal or voiceprint, fingerprint letter in main operation interface are monitored in real time
Any one or more of breath and encrypted message;
Listen to voiceprint, finger print information, it is any one or several in encrypted message when, record voiceprint, finger print information,
The time point of encrypted message generation simultaneously starts timing.
5. a kind of communication system of the encryption technology based on comprehensive identification comprising such as lower unit:
Authority configuration unit receives the encryption information that first movement terminal is sent for the second mobile terminal;It is mobile to prestore second
The solution confidential information of terminal, the decryption information include the voiceprint, finger print information and encrypted message of legitimate user;Setting is each
It solves confidential information and solves the decrypted rights weight of confidential information combination;
Duration configuration unit, for the effect duration of each solution confidential information to be arranged;
Monitoring unit, for monitoring appointing in voiceprint, finger print information and encrypted message on the second mobile terminal in real time
It is one or more of;
Decryption unit, for listening to appointing in voiceprint, finger print information and encrypted message with decryption information matches
When one or more of, judge whether within the effect duration of each solution confidential information, when within effect duration, according to each solution secret letter
The effect duration of the decrypted rights weight and each solution confidential information of breath and solution confidential information combination generates decryption oprerations instruction, according to solution
Close operational order executes decryption oprerations, if it fails, then popping up the corresponding clear crytpographic key input frame of encryption file, prompts user defeated
Enter clear crytpographic key, when user inputs legal clear crytpographic key, decrypt corresponding encryption information, inputs clear crytpographic key mistake in user
When, call loudspeaker to issue alarm sound, the second mobile terminal feeds back decrypted result to first movement terminal;
The decryption unit includes:
When listening to any one or more of voiceprint, finger print information and the encrypted message with decryption information matches,
According to voiceprint, finger print information, encrypted message occur time point and clocking information judge voiceprint, finger print information,
Whether encrypted message is within the effect duration of each solution confidential information;
Voiceprint, finger print information, the encrypted message being retained within effect duration;
Configure the duration of decryption oprerations instruction:
Situation one: when voiceprint, finger print information, encrypted message are within effect duration, will be retained in effect duration it
Interior voiceprint, finger print information, the shortest duration of lingering effect duration refers to as the 5th grade decryption oprerations in encrypted message
The duration of order;Retain the duration that the decryption oprerations for meeting situation two to situation six instruct;
Situation two: when voiceprint, finger print information are within effect duration, the vocal print being retained within effect duration is believed
The duration that the shortest duration of lingering effect duration is instructed as fourth estate decryption oprerations in breath, finger print information;Reservation meets feelings
The duration of the decryption oprerations instruction of shape five;
Situation three: when voiceprint, encrypted message are within effect duration, the vocal print being retained within effect duration is believed
The duration that the shortest duration of lingering effect duration is instructed as tertiary gradient decryption oprerations in breath, encrypted message;Reservation meets feelings
The duration that the decryption oprerations of shape five to situation six instruct;
Situation four: when finger print information, encrypted message are within effect duration, the fingerprint being retained within effect duration is believed
The duration that the shortest duration of lingering effect duration is instructed as tertiary gradient decryption oprerations in breath, encrypted message;Reservation meets feelings
The duration that the decryption oprerations of shape five to situation six instruct;
Situation five: when voiceprint, finger print information one of which information are within effect duration, will be retained in effect duration it
The duration that lingering effect duration is instructed as the second grade decryption oprerations in interior voiceprint, finger print information;
Situation six: when encrypted message is within effect duration, remaining effect will be retained in the encrypted message within effect duration
The duration that power duration is instructed as the first estate decryption oprerations.
6. the communication system of the encryption technology according to claim 5 based on comprehensive identification, which is characterized in that
In the authority configuration unit:
Each solution confidential information and the decrypted rights weight for solving confidential information combination are as follows: the weight of voiceprint is 1.5, finger print information
Weight be 1.5, the weight that the weight of encrypted message is 1, voiceprint is combined with finger print information is 3, voiceprint and password
The weight of information combination is 2.5, the weight that finger print information is combined with encrypted message is 2.5, voiceprint and finger print information and close
The weight of code information combination is 4.
7. the communication system of the encryption technology according to claim 6 based on comprehensive identification, which is characterized in that
In the duration configuration unit:
Each solution confidential information and the effect duration for solving confidential information combination are as follows:
2 times of a length of default basic duration when the effect of voiceprint, when the effect of finger print information a length of default basic duration 2
Again, a length of default basic duration when the effect of encrypted message.
8. the communication system of the encryption technology according to claim 7 based on comprehensive identification, which is characterized in that
The monitoring unit includes:
Any application program occurred on the second mobile terminal or voiceprint, fingerprint letter in main operation interface are monitored in real time
Any one or more of breath and encrypted message;
Listen to voiceprint, finger print information, it is any one or several in encrypted message when, record voiceprint, finger print information,
The time point of encrypted message generation simultaneously starts timing.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610189733.3A CN105809004B (en) | 2016-03-30 | 2016-03-30 | A kind of communication means and system of the encryption technology based on comprehensive identification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610189733.3A CN105809004B (en) | 2016-03-30 | 2016-03-30 | A kind of communication means and system of the encryption technology based on comprehensive identification |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105809004A CN105809004A (en) | 2016-07-27 |
CN105809004B true CN105809004B (en) | 2019-05-17 |
Family
ID=56454964
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610189733.3A Expired - Fee Related CN105809004B (en) | 2016-03-30 | 2016-03-30 | A kind of communication means and system of the encryption technology based on comprehensive identification |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105809004B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104243160A (en) * | 2014-07-24 | 2014-12-24 | 秦锋 | Identity authentication management method and identity authentication method and device |
CN104573550A (en) * | 2014-12-27 | 2015-04-29 | 小米科技有限责任公司 | Method and device for protecting data |
CN105072249A (en) * | 2015-07-07 | 2015-11-18 | 百度在线网络技术(北京)有限公司 | Method and device of preventing mobile device from being stolen, and corresponding mobile device |
CN105335672A (en) * | 2014-06-16 | 2016-02-17 | 华为技术有限公司 | Security mode prompting method and apparatus |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4519963B2 (en) * | 1999-06-21 | 2010-08-04 | 富士通株式会社 | Biometric information encryption / decryption method and apparatus, and personal authentication system using biometric information |
-
2016
- 2016-03-30 CN CN201610189733.3A patent/CN105809004B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105335672A (en) * | 2014-06-16 | 2016-02-17 | 华为技术有限公司 | Security mode prompting method and apparatus |
CN104243160A (en) * | 2014-07-24 | 2014-12-24 | 秦锋 | Identity authentication management method and identity authentication method and device |
CN104573550A (en) * | 2014-12-27 | 2015-04-29 | 小米科技有限责任公司 | Method and device for protecting data |
CN105072249A (en) * | 2015-07-07 | 2015-11-18 | 百度在线网络技术(北京)有限公司 | Method and device of preventing mobile device from being stolen, and corresponding mobile device |
Also Published As
Publication number | Publication date |
---|---|
CN105809004A (en) | 2016-07-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105117663B (en) | The encrypted object display methods and device of a kind of application | |
US7792296B2 (en) | Access-controlled encrypted recording method for site, interaction and process monitoring | |
US20110055891A1 (en) | Device security | |
CN105653986B (en) | A kind of data guard method and device based on microSD card | |
CN107169374A (en) | Encryption and decryption system and method based on vocal print and speech recognition technology | |
CN102932540A (en) | Mobile terminal and stealing prevention method thereof | |
CN104393994B (en) | Audio data secure transmission method, system and terminal | |
CN108900296B (en) | Secret key storage method based on biological feature identification | |
WO2017161724A1 (en) | Voice processing method and device, and terminal | |
CN103973696A (en) | Data processing method of voice communication | |
US20170091483A1 (en) | Method and Device for Protecting Address Book, and Communication System | |
WO2013182103A2 (en) | Encryption and decryption terminal and encryption and decryption method applied to same | |
CN104363087A (en) | Encryption and decryption method and device | |
CN105787329B (en) | A kind of encryption method and system based on comprehensive identification | |
US7177425B2 (en) | Device and method for securing information associated with a subscriber in a communication apparatus | |
WO2015196642A1 (en) | Data encryption method, decryption method and device | |
CN105809004B (en) | A kind of communication means and system of the encryption technology based on comprehensive identification | |
CN106503503A (en) | A kind of user behavior encryption method and system based on computer big data | |
CN103974243A (en) | Data processing system of voice communication | |
CN107920153A (en) | A kind of mobile terminal and fingerprint recording operation processing method and storage medium | |
CN103974242B (en) | A kind of data processing method of voice call | |
CN105868595A (en) | Improved encryption method and system based on comprehensive recognition | |
CN104080080B (en) | A kind of data handling system of voice call | |
CN103986711A (en) | Data processing method for voice communication | |
JP2009093256A (en) | Authentication device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20190417 Address after: 201800 No. 1288 Yecheng Road, Jiading District Industrial Development Zone, Shanghai Applicant after: Shanghai star earth Communication Engineering Research Institute Address before: 315000 Second Floor of Building 1, Lingyun Industrial Park, 1177 Lingyun Road, Ningbo High-tech Zone, Zhejiang Province Applicant before: NINGBO 3B ELECTRONIC TECHNOLOGY CO.,LTD. |
|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190517 |