CN105809004B - A kind of communication means and system of the encryption technology based on comprehensive identification - Google Patents

A kind of communication means and system of the encryption technology based on comprehensive identification Download PDF

Info

Publication number
CN105809004B
CN105809004B CN201610189733.3A CN201610189733A CN105809004B CN 105809004 B CN105809004 B CN 105809004B CN 201610189733 A CN201610189733 A CN 201610189733A CN 105809004 B CN105809004 B CN 105809004B
Authority
CN
China
Prior art keywords
duration
information
voiceprint
encrypted message
finger print
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201610189733.3A
Other languages
Chinese (zh)
Other versions
CN105809004A (en
Inventor
杨柳
徐阿宏
何异
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Star Earth Communication Engineering Research Institute
Original Assignee
Shanghai Star Earth Communication Engineering Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Star Earth Communication Engineering Research Institute filed Critical Shanghai Star Earth Communication Engineering Research Institute
Priority to CN201610189733.3A priority Critical patent/CN105809004B/en
Publication of CN105809004A publication Critical patent/CN105809004A/en
Application granted granted Critical
Publication of CN105809004B publication Critical patent/CN105809004B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2113Multi-level security, e.g. mandatory access control

Abstract

A kind of communication means and system of the encryption technology based on comprehensive identification.S1, the solution confidential information for prestoring the second mobile terminal, the decryption information include the voiceprint, finger print information and encrypted message of legitimate user;Each solution confidential information is set and solves the decrypted rights weight of confidential information combination;The effect duration of S2, each solution confidential information of setting;S3, in real time any one or more of voiceprint, finger print information and encrypted message on the second mobile terminal of monitoring;S4, when listening to any one or more of voiceprint, finger print information and the encrypted message with decryption information matches, judge whether in solution confidential information and solves within the effect duration that confidential information combines, when within effect duration, decryption oprerations instruction is generated according to each solution confidential information and the effect duration for solving decrypted rights weight and each solution confidential information that confidential information combines, according to decryption oprerations instruction execution decryption oprerations, otherwise prompt user that can not decrypt.The present invention also provides a kind of communication systems of encryption technology based on comprehensive identification.

Description

A kind of communication means and system of the encryption technology based on comprehensive identification
Technical field
The present invention relates to technical field of information encryption, in particular to the communication party of a kind of encryption technology based on comprehensive identification Method and system.
Background technique
Improved day by day with the second mobile terminal function, the second mobile terminal is played the part of in people's daily life work Role it is increasingly important, at the same time, the privacy concern of the safety of the second mobile terminal and user more and more attention has been paid to. Currently, most of second mobile terminals all support encryption function, the encryption function including supporting the screen for the second mobile terminal Can, such as current password screen locking function;Support the encryption function for the file in the second mobile terminal, such as current atlas, Photograph album encryption function etc..
However existing Crypted password can not carry out general on first movement terminal, the second mobile terminal, can not also expire The different encryption requirements of foot difference file.
Summary of the invention
In view of this, the present invention proposes the communication means and system of a kind of encryption technology based on comprehensive identification.
A kind of communication means of the encryption technology based on comprehensive identification comprising following steps:
S1, the second mobile terminal receive the encryption information that first movement terminal is sent;Prestore the decryption of the second mobile terminal Information, the decryption information include the voiceprint, finger print information and encrypted message of legitimate user;Be arranged each solution confidential information with And the decrypted rights weight of solution confidential information combination;
The effect duration of S2, each solution confidential information of setting;
S3, monitor in real time any one of voiceprint, finger print information and encrypted message on the second mobile terminal or It is several;
S4, listen to any one of voiceprint, finger print information and encrypted message of decryption information matches or When several, judge whether within the effect duration of each solution confidential information, when within effect duration, according to each solution confidential information and The effect duration of the decrypted rights weight and each solution confidential information that solve confidential information combination generates decryption oprerations instruction, according to decryption oprerations Otherwise instruction execution decryption oprerations pop up the corresponding clear crytpographic key input frame of encryption information, user are prompted to input clear crytpographic key, When user inputs legal clear crytpographic key, corresponding encryption information is decrypted, when user inputs clear crytpographic key mistake, calls loudspeaker Alarm sound is issued, the second mobile terminal feeds back decrypted result to first movement terminal.
In the communication means of the encryption technology of the present invention based on comprehensive identification,
In the step S1:
Each solution confidential information and the decrypted rights weight for solving confidential information combination are as follows: the weight of voiceprint is 1.5, fingerprint The weight that the weight of information is 1.5, the weight of encrypted message is 1, voiceprint is combined with finger print information is 3, voiceprint with Encrypted message combination weight be 2.5, the weight that finger print information combine with encrypted message is 2.5, voiceprint, voiceprint and Finger print information and the weight of encrypted message combination are 4.
In the communication means of the encryption technology of the present invention based on comprehensive identification,
In the step S2:
Each solution confidential information and the effect duration for solving confidential information combination are as follows:
2 times of a length of default basic duration when the effect of voiceprint, when the effect of finger print information when a length of default basis A length of default basic duration when long 2 times, the effect of encrypted message.
In the communication means of the encryption technology of the present invention based on comprehensive identification,
The step S3 includes:
Any application program occurred on the second mobile terminal of monitoring in real time or the voiceprint in main operation interface refer to Any one or more of line information and encrypted message;
Listen to voiceprint, finger print information, it is any one or several in encrypted message when, record voiceprint, fingerprint Information, encrypted message occur time point and start timing.
In the communication means of the encryption technology of the present invention based on comprehensive identification,
The step S4 includes:
Listening to any one or more of voiceprint, finger print information and encrypted message with decryption information matches When, the time point and clocking information occurred according to voiceprint, finger print information, encrypted message judges that voiceprint, fingerprint are believed Whether breath, encrypted message are within the effect duration of each solution confidential information;
Voiceprint, finger print information, the encrypted message being retained within effect duration;
Configure the duration of decryption oprerations instruction:
Situation one: when voiceprint, finger print information, encrypted message are within effect duration, when by being retained in effect The shortest duration of lingering effect duration is grasped as the level decryptions such as 5th in voiceprint, finger print information, encrypted message within length Make the duration instructed;Retain the duration that the decryption oprerations for meeting situation two to situation six instruct;
Situation two: when voiceprint, finger print information are within effect duration, the sound within effect duration will be retained in The duration that the shortest duration of lingering effect duration is instructed as fourth estate decryption oprerations in line information, finger print information;Retain full The duration of the decryption oprerations instruction of sufficient situation five;
Situation three: when voiceprint, encrypted message are within effect duration, the sound within effect duration will be retained in The duration that the shortest duration of lingering effect duration is instructed as tertiary gradient decryption oprerations in line information, encrypted message;Retain full The duration that the decryption oprerations of sufficient situation five to situation six instruct;
Situation four: when finger print information, encrypted message are within effect duration, the finger within effect duration will be retained in The duration that the shortest duration of lingering effect duration is instructed as tertiary gradient decryption oprerations in line information, encrypted message;Retain full The duration that the decryption oprerations of sufficient situation five to situation six instruct;
Situation five: when voiceprint, finger print information one of which information are within effect duration, when by being retained in effect The duration that lingering effect duration is instructed as the second grade decryption oprerations in voiceprint, finger print information within length;
Situation six: when encrypted message is within effect duration, it will be retained in the encrypted message within effect duration and remain The duration that residual effect power duration is instructed as the first estate decryption oprerations.
The present invention also provides a kind of communication systems of encryption technology based on comprehensive identification comprising such as lower unit:
Authority configuration unit receives the encryption information that first movement terminal is sent for the second mobile terminal;Prestore second The solution confidential information of mobile terminal, the decryption information include the voiceprint, finger print information and encrypted message of legitimate user;If It sets each solution confidential information and solves the decrypted rights weight of confidential information combination;
Duration configuration unit, for the effect duration of each solution confidential information to be arranged;
Monitoring unit, for being monitored in voiceprint, finger print information and encrypted message on the second mobile terminal in real time It is any one or several;
Decryption unit, in listening to voiceprint, finger print information and encrypted message with decryption information matches It is any one or several when, judge whether it is each solution confidential information effect duration within, when within effect duration, according to each solution The effect duration of the decrypted rights weight and each solution confidential information of confidential information and solution confidential information combination generates decryption oprerations instruction, root According to decryption oprerations instruction execution decryption oprerations, the corresponding clear crytpographic key input frame of encryption information is otherwise popped up, prompts user's input Clear crytpographic key decrypts corresponding encryption information when user inputs legal clear crytpographic key, inputs clear crytpographic key mistake in user When, call loudspeaker to issue alarm sound, the second mobile terminal feeds back decrypted result to first movement terminal.
In the communication system of the encryption technology of the present invention based on comprehensive identification,
In the authority configuration unit:
Each solution confidential information and the decrypted rights weight for solving confidential information combination are as follows: the weight of voiceprint is 1.5, fingerprint The weight that the weight of information is 1.5, the weight of encrypted message is 1, voiceprint is combined with finger print information is 3, voiceprint with Encrypted message combination weight be 2.5, the weight that finger print information combine with encrypted message is 2.5, voiceprint, voiceprint and Finger print information and the weight of encrypted message combination are 4.
In the communication system of the encryption technology of the present invention based on comprehensive identification,
In the duration configuration unit:
Each solution confidential information and the effect duration for solving confidential information combination are as follows:
2 times of a length of default basic duration when the effect of voiceprint, when the effect of finger print information when a length of default basis A length of default basic duration when long 2 times, the effect of encrypted message.
In the communication system of the encryption technology of the present invention based on comprehensive identification,
The monitoring unit includes:
Any application program occurred on the second mobile terminal of monitoring in real time or the voiceprint in main operation interface refer to Any one or more of line information and encrypted message;
Listen to voiceprint, finger print information, it is any one or several in encrypted message when, record voiceprint, fingerprint Information, encrypted message occur time point and start timing.
In the communication system of the encryption technology of the present invention based on comprehensive identification,
The decryption unit includes:
Listening to any one or more of voiceprint, finger print information and encrypted message with decryption information matches When, the time point and clocking information occurred according to voiceprint, finger print information, encrypted message judges that voiceprint, fingerprint are believed Whether breath, encrypted message are within the effect duration of each solution confidential information;
Voiceprint, finger print information, the encrypted message being retained within effect duration;
Configure the duration of decryption oprerations instruction:
Situation one: when voiceprint, finger print information, encrypted message are within effect duration, when by being retained in effect The shortest duration of lingering effect duration is grasped as the level decryptions such as 5th in voiceprint, finger print information, encrypted message within length Make the duration instructed;Retain the duration that the decryption oprerations for meeting situation two to situation six instruct;
Situation two: when voiceprint, finger print information are within effect duration, the sound within effect duration will be retained in The duration that the shortest duration of lingering effect duration is instructed as fourth estate decryption oprerations in line information, finger print information;Retain full The duration of the decryption oprerations instruction of sufficient situation five;
Situation three: when voiceprint, encrypted message are within effect duration, the sound within effect duration will be retained in The duration that the shortest duration of lingering effect duration is instructed as tertiary gradient decryption oprerations in line information, encrypted message;Retain full The duration that the decryption oprerations of sufficient situation five to situation six instruct;
Situation four: when finger print information, encrypted message are within effect duration, the finger within effect duration will be retained in The duration that the shortest duration of lingering effect duration is instructed as tertiary gradient decryption oprerations in line information, encrypted message;Retain full The duration that the decryption oprerations of sufficient situation five to situation six instruct;
Situation five: when voiceprint, finger print information one of which information are within effect duration, when by being retained in effect The duration that lingering effect duration is instructed as the second grade decryption oprerations in voiceprint, finger print information within length;
Situation six: when encrypted message is within effect duration, it will be retained in the encrypted message within effect duration and remain The duration that residual effect power duration is instructed as the first estate decryption oprerations.
The communication means and system for implementing the encryption technology provided by the invention based on comprehensive identification are compared with prior art Have the advantages that the present invention passes through voiceprint, finger print information and the encrypted message monitored on the second mobile terminal, And these information are not exclusively for generation when decryption oprerations, and exist and user fingerprints unlock, making and receiving calls, Video chat Etc. among scenes, according to each solution confidential information and solve the decrypted rights weight of confidential information combination and the effect duration of each solution confidential information Decryption oprerations instruction is generated, according to decryption oprerations instruction execution decryption oprerations, so that user is not necessarily to special input clear crytpographic key, and And the grade of decryption can be dynamically adjusted, intelligence degree is high.In addition, calling loudspeaking when user inputs clear crytpographic key mistake Device issues alarm sound, so that the information protection safe coefficient of the second mobile terminal is higher.The present invention is applied in which can be convenient The bipartite secret communication of mobile terminal.
Detailed description of the invention
Fig. 1 is the communication means flow chart of the encryption technology based on comprehensive identification of the embodiment of the present invention;
Fig. 2 is the communication system architecture block diagram of the encryption technology based on comprehensive identification of the embodiment of the present invention.
Specific embodiment
As shown in Figure 1, a kind of communication means of the encryption technology based on comprehensive identification comprising following steps:
S1, the second mobile terminal receive the encryption information that first movement terminal is sent;Prestore the decryption of the second mobile terminal Information, the decryption information include the voiceprint, finger print information and encrypted message of legitimate user;Be arranged each solution confidential information with And the decrypted rights weight of solution confidential information combination.
Optionally,
In the step S1:
Each solution confidential information and the decrypted rights weight for solving confidential information combination are as follows: the weight of voiceprint is 1.5, fingerprint The weight that the weight of information is 1.5, the weight of encrypted message is 1, voiceprint is combined with finger print information is 3, voiceprint with Encrypted message combination weight be 2.5, the weight that finger print information combine with encrypted message is 2.5, voiceprint, voiceprint and Finger print information and the weight of encrypted message combination are 4.
Voiceprint, finger print information and the encrypted message of legitimate user refers to be encrypted for decrypting in the second mobile terminal The information of information.Encryption information in second mobile terminal is divided into the first order to level V, correspondingly, weight be 1 it is close Code information can decrypt the encryption information of the first order, corresponding the first estate decryption oprerations instruction.The encrypted message that weight is 1.5 can To decrypt the encryption information of the second level, corresponding second grade decryption oprerations instruction.The encrypted message that weight is 2.5 can decrypt the The encryption information of three-level, corresponding tertiary gradient decryption oprerations instruction.The encrypted message that weight is 3 can decrypt the encryption of the fourth stage Information, corresponding fourth estate decryption oprerations instruction.The encrypted message that weight is 4 can decrypt the encryption information of the fourth stage, corresponding Fourth estate decryption oprerations instruction.
The effect duration of S2, each solution confidential information of setting.
Optionally,
In the step S2:
Each solution confidential information and the effect duration for solving confidential information combination are as follows:
2 times of a length of default basic duration when the effect of voiceprint, when the effect of finger print information when a length of default basis A length of default basic duration when long 2 times, the effect of encrypted message.
S3, monitor in real time any one of voiceprint, finger print information and encrypted message on the second mobile terminal or It is several.
Optionally,
The step S3 includes:
Any application program occurred on the second mobile terminal of monitoring in real time or the voiceprint in main operation interface refer to Any one or more of line information and encrypted message;
Listen to voiceprint, finger print information, it is any one or several in encrypted message when, record voiceprint, fingerprint Information, encrypted message occur time point and start timing.
S4, listen to any one of voiceprint, finger print information and encrypted message of decryption information matches or When several, judge whether within the effect duration of each solution confidential information, when within effect duration, according to each solution confidential information and The effect duration of the decrypted rights weight and each solution confidential information that solve confidential information combination generates decryption oprerations instruction, according to decryption oprerations Otherwise instruction execution decryption oprerations pop up the corresponding clear crytpographic key input frame of encryption information, user are prompted to input clear crytpographic key, When user inputs legal clear crytpographic key, corresponding encryption information is decrypted, when user inputs clear crytpographic key mistake, calls loudspeaker Alarm sound is issued, the second mobile terminal feeds back decrypted result to first movement terminal.
By implementing this step, can effectively be mended to by voiceprint, finger print information, encrypted message decryption It fills.
Optionally,
The step S4 includes:
Listening to any one or more of voiceprint, finger print information and encrypted message with decryption information matches When, the time point and clocking information occurred according to voiceprint, finger print information, encrypted message judges that voiceprint, fingerprint are believed Whether breath, encrypted message are within the effect duration of each solution confidential information;
Voiceprint, finger print information, the encrypted message being retained within effect duration;
Configure the duration of decryption oprerations instruction:
Situation one: when voiceprint, finger print information, encrypted message are within effect duration, when by being retained in effect The shortest duration of lingering effect duration is grasped as the level decryptions such as 5th in voiceprint, finger print information, encrypted message within length Make the duration instructed;Retain the duration that the decryption oprerations for meeting situation two to situation six instruct;
Situation two: when voiceprint, finger print information are within effect duration, the sound within effect duration will be retained in The duration that the shortest duration of lingering effect duration is instructed as fourth estate decryption oprerations in line information, finger print information;Retain full The duration of the decryption oprerations instruction of sufficient situation five;
Situation three: when voiceprint, encrypted message are within effect duration, the sound within effect duration will be retained in The duration that the shortest duration of lingering effect duration is instructed as tertiary gradient decryption oprerations in line information, encrypted message;Retain full The duration that the decryption oprerations of sufficient situation five to situation six instruct;
Situation four: when finger print information, encrypted message are within effect duration, the finger within effect duration will be retained in The duration that the shortest duration of lingering effect duration is instructed as tertiary gradient decryption oprerations in line information, encrypted message;Retain full The duration that the decryption oprerations of sufficient situation five to situation six instruct;
Situation five: when voiceprint, finger print information one of which information are within effect duration, when by being retained in effect The duration that lingering effect duration is instructed as the second grade decryption oprerations in voiceprint, finger print information within length;
Situation six: when encrypted message is within effect duration, it will be retained in the encrypted message within effect duration and remain The duration that residual effect power duration is instructed as the first estate decryption oprerations.
The different grades of encryption information time and grade that can be decrypted by this step be changeably, be and second move Dynamic terminal listens to, and these decryption relevant with the voiceprint, finger print information and encrypted message of information matches is decrypted Information can be information of the user when operating the operation such as other applications and progress unlocking screen, because intelligence degree is more It is high.
As shown in Fig. 2, the present invention also provides a kind of communication systems of encryption technology based on comprehensive identification comprising as follows Unit:
Authority configuration unit receives the encryption information that first movement terminal is sent for the second mobile terminal;Prestore second The solution confidential information of mobile terminal, the decryption information include the voiceprint, finger print information and encrypted message of legitimate user;If It sets each solution confidential information and solves the decrypted rights weight of confidential information combination;
Duration configuration unit, for the effect duration of each solution confidential information to be arranged;
Monitoring unit, for being monitored in voiceprint, finger print information and encrypted message on the second mobile terminal in real time It is any one or several;
Decryption unit, in listening to voiceprint, finger print information and encrypted message with decryption information matches It is any one or several when, judge whether it is each solution confidential information effect duration within, when within effect duration, according to each solution The effect duration of the decrypted rights weight and each solution confidential information of confidential information and solution confidential information combination generates decryption oprerations instruction, root According to decryption oprerations instruction execution decryption oprerations, the corresponding clear crytpographic key input frame of encryption information is otherwise popped up, prompts user's input Clear crytpographic key decrypts corresponding encryption information when user inputs legal clear crytpographic key, inputs clear crytpographic key mistake in user When, call loudspeaker to issue alarm sound, the second mobile terminal feeds back decrypted result to first movement terminal.
Optionally,
In the authority configuration unit:
Each solution confidential information and the decrypted rights weight for solving confidential information combination are as follows: the weight of voiceprint is 1.5, fingerprint The weight that the weight of information is 1.5, the weight of encrypted message is 1, voiceprint is combined with finger print information is 3, voiceprint with Encrypted message combination weight be 2.5, the weight that finger print information combine with encrypted message is 2.5, voiceprint, voiceprint and Finger print information and the weight of encrypted message combination are 4.
Optionally,
In the duration configuration unit:
Each solution confidential information and the effect duration for solving confidential information combination are as follows:
2 times of a length of default basic duration when the effect of voiceprint, when the effect of finger print information when a length of default basis A length of default basic duration when long 2 times, the effect of encrypted message.
Optionally,
The monitoring unit includes:
Any application program occurred on the second mobile terminal of monitoring in real time or the voiceprint in main operation interface refer to Any one or more of line information and encrypted message;
Listen to voiceprint, finger print information, it is any one or several in encrypted message when, record voiceprint, fingerprint Information, encrypted message occur time point and start timing.
Optionally,
The decryption unit includes:
Listening to any one or more of voiceprint, finger print information and encrypted message with decryption information matches When, the time point and clocking information occurred according to voiceprint, finger print information, encrypted message judges that voiceprint, fingerprint are believed Whether breath, encrypted message are within the effect duration of each solution confidential information;
Voiceprint, finger print information, the encrypted message being retained within effect duration;
Configure the duration of decryption oprerations instruction:
Situation one: when voiceprint, finger print information, encrypted message are within effect duration, when by being retained in effect The shortest duration of lingering effect duration is grasped as the level decryptions such as 5th in voiceprint, finger print information, encrypted message within length Make the duration instructed;Retain the duration that the decryption oprerations for meeting situation two to situation six instruct;
Situation two: when voiceprint, finger print information are within effect duration, the sound within effect duration will be retained in The duration that the shortest duration of lingering effect duration is instructed as fourth estate decryption oprerations in line information, finger print information;Retain full The duration of the decryption oprerations instruction of sufficient situation five;
Situation three: when voiceprint, encrypted message are within effect duration, the sound within effect duration will be retained in The duration that the shortest duration of lingering effect duration is instructed as tertiary gradient decryption oprerations in line information, encrypted message;Retain full The duration that the decryption oprerations of sufficient situation five to situation six instruct;
Situation four: when finger print information, encrypted message are within effect duration, the finger within effect duration will be retained in The duration that the shortest duration of lingering effect duration is instructed as tertiary gradient decryption oprerations in line information, encrypted message;Retain full The duration that the decryption oprerations of sufficient situation five to situation six instruct;
Situation five: when voiceprint, finger print information one of which information are within effect duration, when by being retained in effect The duration that lingering effect duration is instructed as the second grade decryption oprerations in voiceprint, finger print information within length;
Situation six: when encrypted message is within effect duration, it will be retained in the encrypted message within effect duration and remain The duration that residual effect power duration is instructed as the first estate decryption oprerations.
The communication means and system for implementing the encryption technology provided by the invention based on comprehensive identification are compared with prior art Have the advantages that the present invention passes through voiceprint, finger print information and the encrypted message monitored on the second mobile terminal, And these information are not exclusively for generation when decryption oprerations, and exist and user fingerprints unlock, making and receiving calls, Video chat Etc. among scenes, according to each solution confidential information and solve the decrypted rights weight of confidential information combination and the effect duration of each solution confidential information Decryption oprerations instruction is generated, according to decryption oprerations instruction execution decryption oprerations, so that user is not necessarily to special input clear crytpographic key, and And the grade of decryption can be dynamically adjusted, intelligence degree is high.In addition, calling loudspeaking when user inputs clear crytpographic key mistake Device issues alarm sound, so that the information protection safe coefficient of the second mobile terminal is higher.The present invention is applied in which can be convenient The bipartite secret communication of mobile terminal.
Above method embodiment and system embodiment are correspondingly that therefore, the extension of embodiment of the method is also applicable In the above system embodiment.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can directly be held with hardware, processor The combination of capable software module or the two is implemented.Software module can be placed in random access memory, memory, read-only memory, Institute is public in electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field In the storage medium for any other forms known.
It is understood that for those of ordinary skill in the art, can do in accordance with the technical idea of the present invention Various other changes and modifications out, and all these changes and deformation all should belong to the protection model of the claims in the present invention It encloses.

Claims (8)

1. a kind of communication means of the encryption technology based on comprehensive identification comprising following steps:
S1, the second mobile terminal receive the encryption information that first movement terminal is sent;The solution confidential information of the second mobile terminal is prestored, The decryption information includes the voiceprint, finger print information and encrypted message of legitimate user;Each solution confidential information and solution are set The decrypted rights weight of confidential information combination;
The effect duration of S2, each solution confidential information of setting;
S3, in real time any one or more of voiceprint, finger print information and encrypted message on the second mobile terminal of monitoring;
S4, any one or more of voiceprint, finger print information and encrypted message with decryption information matches are being listened to When, judge whether within the effect duration of each solution confidential information, when within effect duration, according to each solution confidential information and decryption The effect duration of the decrypted rights weight of information combination and each solution confidential information generates decryption oprerations instruction, is instructed according to decryption oprerations Decryption oprerations are executed, if it fails, then popping up the corresponding clear crytpographic key input frame of encryption file, prompt user to input decryption close Code decrypts corresponding encryption information when user inputs legal clear crytpographic key, when user inputs clear crytpographic key mistake, calls Loudspeaker issues alarm sound, and the second mobile terminal feeds back decrypted result to first movement terminal;
The step S4 includes:
When listening to any one or more of voiceprint, finger print information and the encrypted message with decryption information matches, According to voiceprint, finger print information, encrypted message occur time point and clocking information judge voiceprint, finger print information, Whether encrypted message is within the effect duration of each solution confidential information;
Voiceprint, finger print information, the encrypted message being retained within effect duration;
Configure the duration of decryption oprerations instruction:
Situation one: when voiceprint, finger print information, encrypted message are within effect duration, will be retained in effect duration it Interior voiceprint, finger print information, the shortest duration of lingering effect duration refers to as the 5th grade decryption oprerations in encrypted message The duration of order;Retain the duration that the decryption oprerations for meeting situation two to situation six instruct;
Situation two: when voiceprint, finger print information are within effect duration, the vocal print being retained within effect duration is believed The duration that the shortest duration of lingering effect duration is instructed as fourth estate decryption oprerations in breath, finger print information;Reservation meets feelings The duration of the decryption oprerations instruction of shape five;
Situation three: when voiceprint, encrypted message are within effect duration, the vocal print being retained within effect duration is believed The duration that the shortest duration of lingering effect duration is instructed as tertiary gradient decryption oprerations in breath, encrypted message;Reservation meets feelings The duration that the decryption oprerations of shape five to situation six instruct;
Situation four: when finger print information, encrypted message are within effect duration, the fingerprint being retained within effect duration is believed The duration that the shortest duration of lingering effect duration is instructed as tertiary gradient decryption oprerations in breath, encrypted message;Reservation meets feelings The duration that the decryption oprerations of shape five to situation six instruct;
Situation five: when voiceprint, finger print information one of which information are within effect duration, will be retained in effect duration it The duration that lingering effect duration is instructed as the second grade decryption oprerations in interior voiceprint, finger print information;
Situation six: when encrypted message is within effect duration, remaining effect will be retained in the encrypted message within effect duration The duration that power duration is instructed as the first estate decryption oprerations.
2. the communication means of the encryption technology according to claim 1 based on comprehensive identification, which is characterized in that
In the step S1:
Each solution confidential information and the decrypted rights weight for solving confidential information combination are as follows: the weight of voiceprint is 1.5, finger print information Weight be 1.5, the weight that the weight of encrypted message is 1, voiceprint is combined with finger print information is 3, voiceprint and password The weight of information combination is 2.5, the weight that finger print information is combined with encrypted message is 2.5, voiceprint and finger print information and close The weight of code information combination is 4.
3. the communication means of the encryption technology according to claim 2 based on comprehensive identification, which is characterized in that
In the step S2:
Each solution confidential information and the effect duration for solving confidential information combination are as follows:
2 times of a length of default basic duration when the effect of voiceprint, when the effect of finger print information a length of default basic duration 2 Again, a length of default basic duration when the effect of encrypted message.
4. the communication means of the encryption technology according to claim 3 based on comprehensive identification, which is characterized in that
The step S3 includes:
Any application program occurred on the second mobile terminal or voiceprint, fingerprint letter in main operation interface are monitored in real time Any one or more of breath and encrypted message;
Listen to voiceprint, finger print information, it is any one or several in encrypted message when, record voiceprint, finger print information, The time point of encrypted message generation simultaneously starts timing.
5. a kind of communication system of the encryption technology based on comprehensive identification comprising such as lower unit:
Authority configuration unit receives the encryption information that first movement terminal is sent for the second mobile terminal;It is mobile to prestore second The solution confidential information of terminal, the decryption information include the voiceprint, finger print information and encrypted message of legitimate user;Setting is each It solves confidential information and solves the decrypted rights weight of confidential information combination;
Duration configuration unit, for the effect duration of each solution confidential information to be arranged;
Monitoring unit, for monitoring appointing in voiceprint, finger print information and encrypted message on the second mobile terminal in real time It is one or more of;
Decryption unit, for listening to appointing in voiceprint, finger print information and encrypted message with decryption information matches When one or more of, judge whether within the effect duration of each solution confidential information, when within effect duration, according to each solution secret letter The effect duration of the decrypted rights weight and each solution confidential information of breath and solution confidential information combination generates decryption oprerations instruction, according to solution Close operational order executes decryption oprerations, if it fails, then popping up the corresponding clear crytpographic key input frame of encryption file, prompts user defeated Enter clear crytpographic key, when user inputs legal clear crytpographic key, decrypt corresponding encryption information, inputs clear crytpographic key mistake in user When, call loudspeaker to issue alarm sound, the second mobile terminal feeds back decrypted result to first movement terminal;
The decryption unit includes:
When listening to any one or more of voiceprint, finger print information and the encrypted message with decryption information matches, According to voiceprint, finger print information, encrypted message occur time point and clocking information judge voiceprint, finger print information, Whether encrypted message is within the effect duration of each solution confidential information;
Voiceprint, finger print information, the encrypted message being retained within effect duration;
Configure the duration of decryption oprerations instruction:
Situation one: when voiceprint, finger print information, encrypted message are within effect duration, will be retained in effect duration it Interior voiceprint, finger print information, the shortest duration of lingering effect duration refers to as the 5th grade decryption oprerations in encrypted message The duration of order;Retain the duration that the decryption oprerations for meeting situation two to situation six instruct;
Situation two: when voiceprint, finger print information are within effect duration, the vocal print being retained within effect duration is believed The duration that the shortest duration of lingering effect duration is instructed as fourth estate decryption oprerations in breath, finger print information;Reservation meets feelings The duration of the decryption oprerations instruction of shape five;
Situation three: when voiceprint, encrypted message are within effect duration, the vocal print being retained within effect duration is believed The duration that the shortest duration of lingering effect duration is instructed as tertiary gradient decryption oprerations in breath, encrypted message;Reservation meets feelings The duration that the decryption oprerations of shape five to situation six instruct;
Situation four: when finger print information, encrypted message are within effect duration, the fingerprint being retained within effect duration is believed The duration that the shortest duration of lingering effect duration is instructed as tertiary gradient decryption oprerations in breath, encrypted message;Reservation meets feelings The duration that the decryption oprerations of shape five to situation six instruct;
Situation five: when voiceprint, finger print information one of which information are within effect duration, will be retained in effect duration it The duration that lingering effect duration is instructed as the second grade decryption oprerations in interior voiceprint, finger print information;
Situation six: when encrypted message is within effect duration, remaining effect will be retained in the encrypted message within effect duration The duration that power duration is instructed as the first estate decryption oprerations.
6. the communication system of the encryption technology according to claim 5 based on comprehensive identification, which is characterized in that
In the authority configuration unit:
Each solution confidential information and the decrypted rights weight for solving confidential information combination are as follows: the weight of voiceprint is 1.5, finger print information Weight be 1.5, the weight that the weight of encrypted message is 1, voiceprint is combined with finger print information is 3, voiceprint and password The weight of information combination is 2.5, the weight that finger print information is combined with encrypted message is 2.5, voiceprint and finger print information and close The weight of code information combination is 4.
7. the communication system of the encryption technology according to claim 6 based on comprehensive identification, which is characterized in that
In the duration configuration unit:
Each solution confidential information and the effect duration for solving confidential information combination are as follows:
2 times of a length of default basic duration when the effect of voiceprint, when the effect of finger print information a length of default basic duration 2 Again, a length of default basic duration when the effect of encrypted message.
8. the communication system of the encryption technology according to claim 7 based on comprehensive identification, which is characterized in that
The monitoring unit includes:
Any application program occurred on the second mobile terminal or voiceprint, fingerprint letter in main operation interface are monitored in real time Any one or more of breath and encrypted message;
Listen to voiceprint, finger print information, it is any one or several in encrypted message when, record voiceprint, finger print information, The time point of encrypted message generation simultaneously starts timing.
CN201610189733.3A 2016-03-30 2016-03-30 A kind of communication means and system of the encryption technology based on comprehensive identification Expired - Fee Related CN105809004B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610189733.3A CN105809004B (en) 2016-03-30 2016-03-30 A kind of communication means and system of the encryption technology based on comprehensive identification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610189733.3A CN105809004B (en) 2016-03-30 2016-03-30 A kind of communication means and system of the encryption technology based on comprehensive identification

Publications (2)

Publication Number Publication Date
CN105809004A CN105809004A (en) 2016-07-27
CN105809004B true CN105809004B (en) 2019-05-17

Family

ID=56454964

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610189733.3A Expired - Fee Related CN105809004B (en) 2016-03-30 2016-03-30 A kind of communication means and system of the encryption technology based on comprehensive identification

Country Status (1)

Country Link
CN (1) CN105809004B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104243160A (en) * 2014-07-24 2014-12-24 秦锋 Identity authentication management method and identity authentication method and device
CN104573550A (en) * 2014-12-27 2015-04-29 小米科技有限责任公司 Method and device for protecting data
CN105072249A (en) * 2015-07-07 2015-11-18 百度在线网络技术(北京)有限公司 Method and device of preventing mobile device from being stolen, and corresponding mobile device
CN105335672A (en) * 2014-06-16 2016-02-17 华为技术有限公司 Security mode prompting method and apparatus

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4519963B2 (en) * 1999-06-21 2010-08-04 富士通株式会社 Biometric information encryption / decryption method and apparatus, and personal authentication system using biometric information

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105335672A (en) * 2014-06-16 2016-02-17 华为技术有限公司 Security mode prompting method and apparatus
CN104243160A (en) * 2014-07-24 2014-12-24 秦锋 Identity authentication management method and identity authentication method and device
CN104573550A (en) * 2014-12-27 2015-04-29 小米科技有限责任公司 Method and device for protecting data
CN105072249A (en) * 2015-07-07 2015-11-18 百度在线网络技术(北京)有限公司 Method and device of preventing mobile device from being stolen, and corresponding mobile device

Also Published As

Publication number Publication date
CN105809004A (en) 2016-07-27

Similar Documents

Publication Publication Date Title
CN105117663B (en) The encrypted object display methods and device of a kind of application
US7792296B2 (en) Access-controlled encrypted recording method for site, interaction and process monitoring
US20110055891A1 (en) Device security
CN105653986B (en) A kind of data guard method and device based on microSD card
CN107169374A (en) Encryption and decryption system and method based on vocal print and speech recognition technology
CN102932540A (en) Mobile terminal and stealing prevention method thereof
CN104393994B (en) Audio data secure transmission method, system and terminal
CN108900296B (en) Secret key storage method based on biological feature identification
WO2017161724A1 (en) Voice processing method and device, and terminal
CN103973696A (en) Data processing method of voice communication
US20170091483A1 (en) Method and Device for Protecting Address Book, and Communication System
WO2013182103A2 (en) Encryption and decryption terminal and encryption and decryption method applied to same
CN104363087A (en) Encryption and decryption method and device
CN105787329B (en) A kind of encryption method and system based on comprehensive identification
US7177425B2 (en) Device and method for securing information associated with a subscriber in a communication apparatus
WO2015196642A1 (en) Data encryption method, decryption method and device
CN105809004B (en) A kind of communication means and system of the encryption technology based on comprehensive identification
CN106503503A (en) A kind of user behavior encryption method and system based on computer big data
CN103974243A (en) Data processing system of voice communication
CN107920153A (en) A kind of mobile terminal and fingerprint recording operation processing method and storage medium
CN103974242B (en) A kind of data processing method of voice call
CN105868595A (en) Improved encryption method and system based on comprehensive recognition
CN104080080B (en) A kind of data handling system of voice call
CN103986711A (en) Data processing method for voice communication
JP2009093256A (en) Authentication device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20190417

Address after: 201800 No. 1288 Yecheng Road, Jiading District Industrial Development Zone, Shanghai

Applicant after: Shanghai star earth Communication Engineering Research Institute

Address before: 315000 Second Floor of Building 1, Lingyun Industrial Park, 1177 Lingyun Road, Ningbo High-tech Zone, Zhejiang Province

Applicant before: NINGBO 3B ELECTRONIC TECHNOLOGY CO.,LTD.

GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190517