CN106778294A - Information protecting method and device - Google Patents

Information protecting method and device Download PDF

Info

Publication number
CN106778294A
CN106778294A CN201611064352.9A CN201611064352A CN106778294A CN 106778294 A CN106778294 A CN 106778294A CN 201611064352 A CN201611064352 A CN 201611064352A CN 106778294 A CN106778294 A CN 106778294A
Authority
CN
China
Prior art keywords
information
matrix
finger print
encryption
secret key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611064352.9A
Other languages
Chinese (zh)
Inventor
顾辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201611064352.9A priority Critical patent/CN106778294A/en
Publication of CN106778294A publication Critical patent/CN106778294A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of information protecting method and device, the method includes:When the first encrypted instruction for treating encryption information triggering is detected, confidential information to be added is converted into coding information, coding information is converted into document matrix information according to default first matrix conversion condition, and determine document matrix number in document matrix information;The current finger print information for collecting of parsing, generates fingerprint matrices, and calculate the MD5 values of fingerprint matrices;According to MD5 value scramble fingerprint matrices, the scrambled matrix information that generation scrambled matrix number is matched with document matrix number;According to scrambled matrix information and document matrix information generation secret key, and it is encrypted according to secret key pair confidential information to be added, encryption information is obtained, by encryption information storage in the encryption information set associated with finger print information.Finger print information the invention allows to be based on user is directly treated encryption information and is encrypted, so as to realize conveniently protecting the confidential information to be added stored in mobile terminal.

Description

Information protecting method and device
Technical field
The present invention relates to data encryption technology field, more particularly to a kind of information protecting method and device.
Background technology
At present, in order to protect the privacy information stored in the mobile terminals such as mobile phone, panel computer, user can be by the 3rd Square encryption software is encrypted to the privacy information of the mobile terminal, but encryption and decryption step complexity are cumbersome, behaviour Make extremely inconvenient.
The content of the invention
It is a primary object of the present invention to propose a kind of information protecting method and device, it is intended to which realization is conveniently protected The privacy information stored in mobile terminal.
To achieve the above object, a kind of information protection device that the present invention is provided, the information protection device includes:
First modular converter, for when the first encrypted instruction for treating encryption information triggering is detected, by secret letter to be added Breath is converted into coding information, and coding information is converted into document matrix information according to default first matrix conversion condition, and really Determine document matrix number in document matrix information;
First computing module, for parsing the current finger print information for collecting, generates fingerprint matrices, and calculate fingerprint matrices MD5 values;
First generation module, for according to MD5 value scramble fingerprint matrices, generation scrambled matrix number and document matrix number The scrambled matrix information of matching;
Encrypting module, for generating secret key according to scrambled matrix information and document matrix information, and treats according to secret key Encryption information is encrypted, and obtains encryption information, by encryption information storage in the encryption information set associated with finger print information.
Alternatively, the encrypting module includes:
First generation unit, for according to scrambled matrix information and document matrix information generation security coding information;
Second generation unit, for generating secret key according to security coding information, wherein, the generation of the security coding information Formula is:
Wherein, the Key' is security coding information, the KiIt is i-th scrambled matrix in scrambled matrix information, it is described PartiIt is i-th document matrix in the document matrix information, the i=1,2,3 ... n, n is positive integer.
Alternatively, described information protection device also includes:
Display module, for when the first decryption instructions are detected, the finger print information of the current collection of identification to show and fingerprint The encryption information set of information association;
Parsing module, for detecting the second decryption instructions triggered based on the encryption information in encryption information set When, the secret key associated with encryption information stored in mobile terminal is obtained, and parse secret key and obtain corresponding security coding information;
Second modular converter, for security coding information to be converted into secret key square according to default second matrix conversion condition Battle array information, and determine cipher key matrix number in secret key matrix information;
3rd computing module, for parsing finger print information, generates fingerprint matrices, and calculate the MD5 values of fingerprint matrices;
Second generation module, for the fingerprint matrices according to MD5 value scrambles, generates scrambled matrix number and cipher key matrix The scrambled matrix information of number matching;
Deciphering module, for according to scrambled matrix information and secret key matrix information generation coding information, believing with to encryption Breath is decrypted.
Alternatively, the generation formula of the coding information is:
Wherein, the B is coding information, the KiIt is i-th scrambled matrix in scrambled matrix information, the KeyiFor close I-th secret key matrix in spoon matrix information, the i=1,2,3 ... n, n is positive integer.
Alternatively, described information protection device also includes:
Output module, for when fingerprint preservation instruction is detected, calculating the first discrimination of the finger print information of collection, and Output is input into the prompt message of previous finger print information again;
4th computing module, for when previous finger print information input instruction is detected, gathering the previous finger being input into again Line information, and calculate the second discrimination of the previous finger print information being input into again;
Judge module, for judging the first discrimination and the second discrimination whether more than default discrimination;
Preserving module, for when the first discrimination and the second discrimination are more than the default discrimination, preserving the finger Line information.
Additionally, to achieve the above object, the present invention also proposes a kind of information protecting method, and the information protecting method includes:
When the first encrypted instruction for treating encryption information triggering is detected, confidential information to be added is converted into coding information, Coding information is converted into document matrix information according to default first matrix conversion condition, and determines document matrix information Chinese Part matrix number;
The current finger print information for collecting of parsing, generates fingerprint matrices, and calculate the MD5 values of fingerprint matrices;
According to MD5 value scramble fingerprint matrices, the scrambled matrix letter that generation scrambled matrix number is matched with document matrix number Breath;
According to scrambled matrix information and document matrix information generation secret key, and added according to secret key pair confidential information to be added It is close, encryption information is obtained, by encryption information storage in the encryption information set associated with finger print information.
Alternatively, it is described to be included according to the step of scrambled matrix information and document matrix information generation secret key:
According to scrambled matrix information and document matrix information generation security coding information;
Secret key is generated according to security coding information, wherein, the generation formula of the security coding information is:
Wherein, the Key' is security coding information, the KiIt is i-th scrambled matrix in scrambled matrix information, it is described PartiIt is i-th document matrix in the document matrix information, the i=1,2,3 ... n, n is positive integer.
Alternatively, it is described that secret key is generated according to scrambled matrix information and document matrix information and to be added according to secret key pair Confidential information is encrypted, and obtains encryption information, by encryption information storage in the encryption information set associated with finger print information Also include after step:
When the first decryption instructions are detected, the finger print information of the current collection of identification, what display was associated with finger print information adds Confidential information set;
When the second decryption instructions triggered based on the encryption information in encryption information set are detected, obtain it is mobile eventually The secret key associated with encryption information stored in end, and parse secret key and obtain corresponding security coding information;
Security coding information is converted into secret key matrix information according to default second matrix conversion condition, and determines secret key Cipher key matrix number in matrix information;
Parsing finger print information, generates fingerprint matrices, and calculate the MD5 values of fingerprint matrices;
The fingerprint matrices according to MD5 value scrambles, the encryption square that generation scrambled matrix number is matched with cipher key matrix number Battle array information;
According to scrambled matrix information and secret key matrix information generation coding information, it is decrypted with to encryption information.
Alternatively, the generation formula of the coding information is:
Wherein, the B is coding information, the KiIt is i-th scrambled matrix in scrambled matrix information, the KeyiFor close I-th secret key matrix in spoon matrix information, the i=1,2,3 ... n, n is positive integer.
Alternatively, it is described detect treat encryption information triggering the first encrypted instruction when, confidential information to be added is converted into Coding information, is converted into document matrix information, and determine file square by coding information according to default first matrix conversion condition Battle array information in document matrix number the step of before also include:
When fingerprint preservation instruction is detected, the first discrimination of the finger print information of collection is calculated, and output is input into again The prompt message of previous finger print information;
When previous finger print information input instruction is detected, the previous finger print information that collection is input into again, and calculate again Second discrimination of the previous finger print information of input;
Judge the first discrimination and the second discrimination whether more than default discrimination;
When the first discrimination and the second discrimination are more than the default discrimination, the finger print information is preserved.
The present invention by when mobile terminal receives user and treats the first encrypted instruction that encryption information is triggered, according to treating Encryption information generation document matrix information, and the finger print information of user is gathered, scrambled matrix information is generated according to finger print information, and Document matrix information is generated according to confidential information to be added, according to scrambled matrix information and document matrix information generation secret key, and root It is encrypted according to secret key pair confidential information to be added, obtains encryption information, and by encryption information storage in adding for being associated with finger print information In confidential information set, enabling the finger print information based on user is directly treated encryption information and is encrypted, so as to realize conveniently The confidential information to be added for efficiently being stored in protection mobile terminal.
Brief description of the drawings
Fig. 1 is the hardware architecture diagram for realizing the optional mobile terminal of each embodiment one of the invention;
Fig. 2 is the wireless communication system schematic diagram of mobile terminal as shown in Figure 1;
Fig. 3 is the high-level schematic functional block diagram of the first embodiment of information protection device of the present invention;
Fig. 4 be information protection device of the present invention second embodiment in encrypting module refinement high-level schematic functional block diagram;
Fig. 5 is the high-level schematic functional block diagram of the 3rd embodiment of information protection device of the present invention;
Fig. 6 is the high-level schematic functional block diagram of the fourth embodiment of information protection device of the present invention;
Fig. 7 is the schematic flow sheet of the first embodiment of information protecting method of the present invention;
Fig. 8 is according to the thin of scrambled matrix information and document matrix information generation secret key in information protecting method of the present invention Change the schematic flow sheet of step;
Fig. 9 is the schematic flow sheet of the second embodiment of information protecting method of the present invention;
Figure 10 is the schematic flow sheet of the 3rd embodiment of information protecting method of the present invention;
The realization of the object of the invention, functional characteristics and advantage will be described further referring to the drawings in conjunction with the embodiments.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The mobile terminal of each embodiment of the invention is realized referring now to Description of Drawings.In follow-up description, use For represent element such as " module ", " part " or " unit " suffix only for being conducive to explanation of the invention, itself Not specific meaning.Therefore, " module " can be used mixedly with " part ".
Mobile terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as moving Phone, smart phone, notebook computer, digit broadcasting receiver, PDA (personal digital assistant), PAD (panel computer), PMP The mobile terminal of (portable media player), guider etc. and such as numeral TV, desktop computer etc. are consolidated Determine terminal.Hereinafter it is assumed that terminal is mobile terminal.However, it will be understood by those skilled in the art that, except being used in particular for movement Outside the element of purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Fig. 1 is that the hardware configuration for realizing one optional mobile terminal of each embodiment of the invention is illustrated.
Mobile terminal 1 00 can include wireless communication unit 110, A/V (audio/video) input block 120, user input Unit 130, sensing unit 140, output unit 150, memory 160, interface unit 170, controller 180, power subsystem 190, First modular converter 10, the first computing module 20, the first generation module 30 and encrypting module 40 etc..Fig. 1 is shown with each The mobile terminal of component is planted, it should be understood that being not required for implementing all components for showing.Can alternatively implement more Or less component.The element of mobile terminal will be discussed in more detail below.
Wireless communication unit 110 generally includes one or more assemblies, and it allows mobile terminal 1 00 and wireless communication system Or the radio communication between network.For example, wireless communication unit 110 can include broadcasting reception module 111, mobile communication mould At least one of block 112, wireless Internet module 113, short range communication module 114 and location information module 115.
Broadcasting reception module 111 receives broadcast singal and/or broadcast via broadcast channel from external broadcast management server Relevant information.Broadcast channel can include satellite channel and/or terrestrial channel.Broadcast management server can be generated and sent The broadcast singal and/or broadcast related information generated before the server or reception of broadcast singal and/or broadcast related information And send it to the server of terminal.Broadcast singal can include TV broadcast singals, radio signals, data broadcasting Signal etc..And, broadcast singal may further include the broadcast singal combined with TV or radio signals.Broadcast phase Pass information can also be provided via mobile communications network, and in this case, broadcast related information can be by mobile communication mould Block 112 is received.Broadcast singal can exist in a variety of manners, for example, it can be with the electronics of DMB (DMB) The form of program guide (EPG), the electronic service guidebooks (ESG) of digital video broadcast-handheld (DVB-H) etc. and exist.Broadcast Receiver module 111 can receive signal and broadcast by using various types of broadcast systems.Especially, broadcasting reception module 111 Can be wide by using such as multimedia broadcasting-ground (DMB-T), DMB-satellite (DMB-S), digital video Broadcast-hand-held (DVB-H), forward link media (MediaFLO@) Radio Data System, received terrestrial digital broadcasting integrated service Etc. (ISDB-T) digit broadcasting system receives digital broadcasting.Broadcasting reception module 111 may be constructed such that and be adapted to provide for extensively Broadcast the various broadcast systems and above-mentioned digit broadcasting system of signal.Via broadcasting reception module 111 receive broadcast singal and/ Or broadcast related information can be stored in memory 160 (or other types of storage medium).
Mobile communication module 112 sends radio signals to base station (for example, access point, node B etc.), exterior terminal And at least one of server and/or receive from it radio signal.Such radio signal can be logical including voice Words signal, video calling signal or the various types of data for sending and/or receiving according to text and/or Multimedia Message.
Wireless Internet module 113 supports the Wi-Fi (Wireless Internet Access) of mobile terminal.The module can be internally or externally It is couple to terminal.Wi-Fi (Wireless Internet Access) technology involved by the module can include WLAN (WLAN) (Wi-Fi), Wibro (WiMAX), Wimax (worldwide interoperability for microwave accesses), HSDPA (high-speed downlink packet access) etc..
Short range communication module 114 is the module for supporting junction service.Some examples of short-range communication technology include indigo plant ToothTM, radio frequency identification (RFID), Infrared Data Association (IrDA), ultra wide band (UWB), purple honeybeeTMEtc..
Location information module 115 is the module for checking or obtaining the positional information of mobile terminal.Location information module Typical case be GPS (global positioning system).According to current technology, GPS module is calculated from three or more satellites Range information and correct time information and the Information application triangulation for calculating, so as to according to longitude, latitude and Highly accurately calculate three-dimensional current location information.Currently, three satellites are used for calculating the method for position and temporal information And the position calculated by using other satellite correction and the error of temporal information.Additionally, GPS module can lead to Carry out calculating speed information after Continuous plus current location information in real time.
A/V input blocks 120 are used to receive audio or video signal.A/V input blocks 120 can include the He of camera 121 Microphone 122, the static images that 121 pairs, camera is obtained in Video Capture pattern or image capture mode by image capture apparatus Or the view data of video is processed.Picture frame after treatment may be displayed on display unit 151.Processed through camera 121 Picture frame afterwards can be stored in memory 160 (or other storage mediums) or sent out via wireless communication unit 110 Send, two or more cameras 1210 can be provided according to the construction of mobile terminal.Microphone 122 can telephone calling model, Sound (voice data) is received via microphone in logging mode, speech recognition mode etc. operational mode, and can be by this The acoustic processing of sample is voice data.Audio (voice) data after treatment can be converted in the case of telephone calling model The form that mobile communication base station can be sent to via mobile communication module 112 is exported.Microphone 122 can be implemented various types of Noise eliminate (or suppress) algorithm eliminating (or suppression) in the noise for receiving and producing during sending audio signal or Interference.
User input unit 130 can generate key input data to control each of mobile terminal according to the order of user input Plant operation.User input unit 130 allows the various types of information of user input, and can include keyboard, metal dome, touch Plate (for example, detection due to being touched caused by resistance, pressure, electric capacity etc. change sensitive component), roller, rocking bar etc. Deng.Especially, when touch pad is superimposed upon on display unit 151 in the form of layer, touch-screen can be formed.
Sensing unit 140 detects the current state of mobile terminal 1 00, (for example, mobile terminal 1 00 opens or closes shape State), the presence or absence of the contact (that is, touch input) of the position of mobile terminal 1 00, user for mobile terminal 1 00, mobile terminal The acceleration or deceleration movement of 100 orientation, mobile terminal 1 00 and direction etc., and generate for controlling mobile terminal 1 00 The order of operation or signal.For example, when mobile terminal 1 00 is embodied as sliding-type mobile phone, sensing unit 140 can be sensed The sliding-type phone is opened or closed.In addition, sensing unit 140 can detect power subsystem 190 whether provide electric power or Whether person's interface unit 170 couples with external device (ED).
Interface unit 170 is connected the interface that can pass through with mobile terminal 1 00 as at least one external device (ED).For example, External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing Line FPDP, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end Mouth, video i/o port, ear port etc..Identification module can be that storage uses each of mobile terminal 1 00 for verifying user Kind of information and subscriber identification module (UIM), client identification module (SIM), Universal Subscriber identification module (USIM) can be included Etc..In addition, the device (hereinafter referred to as " identifying device ") with identification module can take the form of smart card, therefore, know Other device can be connected via port or other attachment means with mobile terminal 1 00.Interface unit 170 can be used for reception and come from The input (for example, data message, electric power etc.) of the external device (ED) and input that will be received is transferred in mobile terminal 1 00 One or more elements can be used for transmitting data between mobile terminal and external device (ED).
In addition, when mobile terminal 1 00 is connected with external base, interface unit 170 can serve as allowing by it by electricity Power provides to the path of mobile terminal 1 00 from base or can serve as allowing the various command signals being input into from base to pass through it It is transferred to the path of mobile terminal.Be can serve as recognizing that mobile terminal is from the various command signals or electric power of base input The no signal being accurately fitted within base.Output unit 150 is configured to provide defeated with vision, audio and/or tactile manner Go out signal (for example, audio signal, vision signal, alarm signal, vibration signal etc.).Output unit 150 can include display Unit 151, dio Output Modules 152 etc..
Display unit 151 may be displayed on the information processed in mobile terminal 1 00.For example, when mobile terminal 1 00 is in electricity During words call mode, display unit 151 can show and converse or other communicate (for example, text messaging, multimedia file Download etc.) related user interface (UI) or graphic user interface (GUI).When mobile terminal 1 00 is in video calling pattern Or during image capture mode, display unit 151 can show the image of capture and/or the image of reception, show video or figure UI or GUI of picture and correlation function etc..
Meanwhile, when display unit 151 and touch pad in the form of layer it is superposed on one another to form touch-screen when, display unit 151 can serve as input unit and output device.Display unit 151 can include liquid crystal display (LCD), thin film transistor (TFT) In LCD (TFT-LCD), Organic Light Emitting Diode (OLED) display, flexible display, three-dimensional (3D) display etc. at least It is a kind of.Some in these displays may be constructed such that transparence to allow user to be watched from outside, and this is properly termed as transparent Display, typical transparent display can be, for example, TOLED (transparent organic light emitting diode) display etc..According to specific Desired implementation method, mobile terminal 1 00 can include two or more display units (or other display devices), for example, moving Dynamic terminal can include outernal display unit (not shown) and inner display unit (not shown).Touch-screen can be used to detect touch Input pressure and touch input position and touch input area.
Dio Output Modules 152 can mobile terminal be in call signal reception pattern, call mode, logging mode, It is that wireless communication unit 110 is received or in memory 160 when under the isotypes such as speech recognition mode, broadcast reception mode The voice data transducing audio signal of middle storage and it is output as sound.And, dio Output Modules 152 can be provided and movement The audio output (for example, call signal receives sound, message sink sound etc.) of the specific function correlation that terminal 100 is performed. Dio Output Modules 152 can include loudspeaker, buzzer etc..
Memory 160 can store software program for the treatment and control operation performed by controller 180 etc., Huo Zheke Temporarily to store oneself data (for example, telephone directory, message, still image, video etc.) through exporting or will export.And And, memory 160 can store the vibration of various modes on being exported when touching and being applied to touch-screen and audio signal Data.
Memory 160 can include the storage medium of at least one type, and the storage medium includes flash memory, hard disk, many Media card, card-type memory (for example, SD or DX memories etc.), random access storage device (RAM), static random-access storage Device (SRAM), read-only storage (ROM), Electrically Erasable Read Only Memory (EEPROM), programmable read only memory (PROM), magnetic storage, disk, CD etc..And, mobile terminal 1 00 can perform memory with by network connection The network storage device cooperation of 160 store function.
The overall operation of the generally control mobile terminal of controller 180.For example, controller 180 is performed and voice call, data Communication, video calling etc. related control and treatment.In addition, controller 180 can be included for reproducing (or playback) many matchmakers The multi-media module 181 of volume data, multi-media module 181 can be constructed in controller 180, or can be structured as and control Device 180 is separated.Controller 180 can be with execution pattern identifying processing, the handwriting input that will be performed on the touchscreen or picture Draw input and be identified as character or image.
Power subsystem 190 receives external power or internal power under the control of controller 180 and provides operation each unit Appropriate electric power needed for part and component.
Various implementation methods described herein can be with use such as computer software, hardware or its any combination of calculating Machine computer-readable recording medium is implemented.Implement for hardware, implementation method described herein can be by using application-specific IC (ASIC), digital signal processor (DSP), digital signal processing device (DSPD), programmable logic device (PLD), scene can Programming gate array (FPGA), processor, controller, microcontroller, microprocessor, it is designed to perform function described herein At least one in electronic unit is implemented, and in some cases, such implementation method can be implemented in controller 180. For software implementation, the implementation method of such as process or function can with allow to perform the single of at least one function or operation Software module is implemented.Software code can be come by the software application (or program) write with any appropriate programming language Implement, software code can be stored in memory 160 and performed by controller 180.
So far, oneself according to its function through describing mobile terminal.Below, for the sake of brevity, will description such as folded form, Slide type mobile terminal in various types of mobile terminals of board-type, oscillating-type, slide type mobile terminal etc. is used as showing Example.Therefore, the present invention can be applied to any kind of mobile terminal, and be not limited to slide type mobile terminal.
Mobile terminal 1 00 as shown in Figure 1 may be constructed such that using via frame or packet transmission data it is all if any Line and wireless communication system and satellite-based communication system are operated.
The communication system that mobile terminal wherein of the invention can be operated is described referring now to Fig. 2.
Such communication system can use different air interface and/or physical layer.For example, used by communication system Air interface includes such as frequency division multiple access (FDMA), time division multiple acess (TDMA), CDMA (CDMA) and universal mobile communications system System (UMTS) (especially, Long Term Evolution (LTE)), global system for mobile communications (GSM) etc..As non-limiting example, under The description in face is related to cdma communication system, but such teaching is equally applicable to other types of system.
With reference to Fig. 2, cdma wireless communication system can include multiple mobile terminal 1s 00, multiple base station (BS) 270, base station Controller (BSC) 275 and mobile switching centre (MSC) 280.MSC280 is configured to and Public Switched Telephony Network (PSTN) 290 form interface.MSC280 is also structured to form interface with the BSC275 that can be couple to base station 270 via back haul link. If any one in the interface that back haul link can be known according to Ganji is constructed, the interface includes such as E1/T1, ATM, IP, PPP, frame relay, HDSL, ADSL or xDSL.It will be appreciated that system can include multiple BSC275 as shown in Figure 2.
Each BS270 can service one or more subregions (or region), by multidirectional antenna or the day of sensing specific direction Each subregion of line covering is radially away from BS270.Or, each subregion can be by two or more for diversity reception Antenna is covered.Each BS270 may be constructed such that the multiple frequency distribution of support, and the distribution of each frequency has specific frequency spectrum (for example, 1.25MHz, 5MHz etc.).
What subregion and frequency were distributed intersects can be referred to as CDMA Channel.BS270 can also be referred to as base station transceiver System (BTS) or other equivalent terms.In this case, term " base station " can be used for broadly representing single BSC275 and at least one BS270.Base station can also be referred to as " cellular station ".Or, each subregion of specific BS270 can be claimed It is multiple cellular stations.
As shown in Figure 2, broadcast singal is sent to broadcsting transmitter (BT) 295 mobile terminal operated in system 100.Broadcasting reception module 111 as shown in Figure 1 is arranged at mobile terminal 1 00 to receive the broadcast sent by BT295 Signal.In fig. 2 it is shown that several global positioning system (GPS) satellites 300.Satellite 300 helps position multiple mobile terminals At least one of 100.
In fig. 2, multiple satellites 300 are depicted, it is understood that be, it is possible to use any number of satellite obtains useful Location information.Location information module 115 as shown in Figure 1 is generally configured to coordinate desired to obtain with satellite 300 Location information, the typical case of the location information module 115 is GPS.Substitute GPS tracking techniques or GPS tracking techniques it Outward, it is possible to use other technologies of the position of mobile terminal can be tracked.In addition, at least one gps satellite 300 can be selective Ground or the extraly transmission for the treatment of satellite dmb.
Used as a typical operation of wireless communication system, BS270 receives the reverse link from various mobile terminal 1s 00 Signal.Mobile terminal 1 00 generally participates in call, information receiving and transmitting and other types of communication.Each of the reception of certain base station 270 is anti- Processed in specific BS270 to link signal.The data of acquisition are forwarded to the BSC275 of correlation.BSC provides call Resource allocation and the mobile management function of the coordination including the soft switching process between BS270.The number that BSC275 will also be received According to MSC280 is routed to, it provides the extra route service for forming interface with PSTN290.Similarly, PSTN290 with MSC280 forms interface, and MSC and BSC275 form interface, and BSC275 correspondingly controls BS270 with by forward link signals It is sent to mobile terminal 1 00.
Based on the hardware configuration of above-mentioned mobile terminal 1 00 and communication system, the present invention provides a kind of information protection device.
Reference picture 3, Fig. 3 is the high-level schematic functional block diagram of the first embodiment of information protection device of the present invention.
In the present embodiment, described information protection device includes:First modular converter 10, the first computing module 20, first Generation module 30 and encrypting module 40.
First modular converter 10, for when the first encrypted instruction for treating encryption information triggering is detected, will treat Encryption information is converted into coding information, and coding information is converted into document matrix according to default first matrix conversion condition believes Breath, and determine document matrix number in document matrix information;
In the present embodiment, user is wanted when to this, certain information to be encrypted is encrypted, and the sustainable pressing of user should To be encrypted information 5-10 seconds, triggers the first encrypted instruction.When the first modular converter 10 receives user to this in mobile terminal During the first encrypted instruction of encryption information triggering, the finger print information of user is gathered, and confidential information to be added is converted into coding information, The confidential information to be added is read with binary system, binary sequence B, such as binary sequence B " 10010111 ", the i.e. coding letter is obtained Breath can be understood as binary sequence B, and coding information is converted into document matrix according to default first matrix conversion condition believes Breath, will binary sequence B insert the binary matrix Part of n 64 × 64bit line by line respectively in units of 4096bit1~ PartnIn, obtain document matrix informationThe size of n determines by the actual size of file to be encrypted, for example, File is 128.3KB, because the size of data of each circular treatment is 4096bit, 128KB files can be at 256 times before institute Processed in circulation, and remaining 0.3KB also needs to a circulation and is processed, therefore, n=256+1=257.
First computing module 20, for parsing the current finger print information for collecting, generates fingerprint matrices, and calculating refers to The MD5 values of line matrix;
First computing module 20 parses the current finger print information for collecting, and generates fingerprint matrices, and calculate fingerprint matrices MD5 values, for example, when the finger print information is collected, the finger print information of user are read by fingerprint reader, produce one 64 × The binary matrix Z of 64bit, calculates the MD5 values of Z, such as MD5 values " 1234 ".
First generation module 30, for according to MD5 value scramble fingerprint matrices, generation scrambled matrix number and file square The scrambled matrix information of battle array number matching;
The encrypting module 40, for generating secret key according to scrambled matrix information and document matrix information, and according to close Spoon is treated encryption information and is encrypted, and obtains encryption information, by encryption information storage in the encryption information associated with finger print information In set.
When the MD5 values of fingerprint matrices are calculated, the MD5 disorder methods of fingerprint matrices of the first generation module 30 are by fingerprint Matrix scrambling, and the scrambled matrix information matched with document matrix number by chain algorithm conversion generation scrambled matrix number, such as The scrambled matrix information of generation includes K1~KnN scrambled matrix altogether.Encrypting module 40 is according to scrambled matrix information and text Part matrix information generates secret key Key, and is encrypted according to secret key pair confidential information to be added, obtains encryption information, and encryption is believed Breath storage is in the encryption information set associated with finger print information.
It should be noted that mobile terminal can create different encryption information set, the encryption to different finger print informations Comprising all encryption information created based on the finger print information in information aggregate, for example, mobile terminal is created to finger print information A adding Confidential information set A, comprising all encryption information created based on finger print information A in encryption information set A, is created to finger print information B Encryption information set B is built, is believed comprising all encryption information created based on finger print information B, and the encryption in encryption information set B Breath set is hiding, and the encryption information that the encryption information set is included is stored classifiedly, can be according to the category of encryption information Property classification or classified according to the encryption times of encryption information, for example, by attribute for the encryption information of picture is stored in text In part folder A, and by attribute for the encryption information of application program is stored in file B.
The present embodiment by mobile terminal receive user treat encryption information trigger the first encrypted instruction when, according to Confidential information generation document matrix information to be added, and the finger print information of user is gathered, scrambled matrix information is generated according to finger print information, And document matrix information is generated according to confidential information to be added, according to scrambled matrix information and document matrix information generation secret key, and It is encrypted according to secret key pair confidential information to be added, obtains encryption information, and encryption information storage is being associated with finger print information In encryption information set, enabling the finger print information based on user is directly treated encryption information and is encrypted, so that the side of realization Just the confidential information to be added for efficiently being stored in protection mobile terminal.
Further, based on above-mentioned first embodiment, the second embodiment of information protection device of the present invention is proposed, in this reality Apply in example, reference picture 4, the encrypting module 40 includes:First generation unit 41, the second generation unit 42.
First generation unit 41, for according to scrambled matrix information and document matrix information generation security coding letter Breath;
Second generation unit 42, for generating secret key according to security coding information, wherein, the security coding information Generation formula be:
Wherein, the Key' is security coding information, the KiIt is i-th scrambled matrix in scrambled matrix information, it is described PartiIt is i-th document matrix in the document matrix information, the i=1,2,3 ... n, n is positive integer.
First generation unit 41 generates security coding information Key' according to scrambled matrix information and document matrix information D, Second generation unit 42 adds BMP, the original document suffix of confidential information to be added on the file header of security coding information Key' The original document length of name and confidential information to be added, that is, the secret key Key for being needed so that realize according to scrambled matrix information and Document matrix information generation secret key Key.
The present embodiment generates security coding information by according to scrambled matrix information and document matrix information, according to secret key Coding information generates secret key so that treat the encrypting step simple and fast of encryption information, improves Consumer's Experience.
Further, based on above-mentioned first embodiment, the 3rd embodiment of information protection device of the present invention is proposed, in this reality Apply in example, reference picture 5, described information protection device also includes:Display module 50, parsing module 60, the second modular converter 70, Three computing modules 80, the second generation module 90 and deciphering module 100.
The display module 50, for when the first decryption instructions are detected, the finger print information of the current collection of identification to show The encryption information set associated with finger print information;
In the present embodiment, when first class paper information corresponding by the encryption information with the head of a household, triggering first is decrypted Instruction, the first class paper information can be understood as the general act information corresponding to the encryption information, for example, working as the encryption information During for pictorial information, the first class paper information of the pictorial information is photograph album (or mutually thin), after user opens the photograph album, and During the project column of family Continued depression photograph album 5-10 seconds, the first decryption instructions are triggered;When the encryption information is application program, should The first class paper information of application program is desktop, and when user's Continued depression desktop blank space 5-10 second, triggering first was decrypted and referred to Order.When mobile terminal receives the first decryption instructions of user's triggering, display module 50 gathers the finger print information of user.Display The encryption information set associated with the finger print information, the encryption information set can be understood as below the first class paper information Second level fileinfo, one or more encryption information is included in the second level fileinfo, for example, when first order text Part information is photograph album, and the second level fileinfo is the fileinfo being hidden in the photograph album, in the fileinfo being hidden Comprising one or more encryption picture, such as after user opens the photograph album, and the family Continued depression photograph album project column 5-10 During the second, the multiple encryption pictures being hidden in the photograph album are shown;When first fileinfo is desktop, the second level fileinfo Be comprising one or more encryption application program in the fileinfo being hidden on the desktop, the fileinfo being hidden, Such as user's Continued depression desktop blank space 5-10 seconds, shows the multiple encryption application programs being hidden on the desktop.
If it is understood that in the mobile terminal, what the encryption information was associated is the finger print information of user's forefinger, then The mobile terminal only detect user input be the finger print information of forefinger when, place can be just decrypted to the encryption information Reason.Different finger print informations associates different encryption information set, for example, the finger print information of different user associates different encryptions Information aggregate, and the different finger print informations of same user associate different encryption information set.
The parsing module 60, for detecting the second solution triggered based on the encryption information in encryption information set During close instruction, the secret key associated with encryption information of storage in mobile terminal is obtained, and parse secret key and obtain corresponding secret key volume Code information;
When mobile terminal shows the encryption information set associated with the finger print information, the user can be from the encryption information collection The encryption information that decryption is wanted in selection is closed, when user's Continued depression encryption information 5-10 second, the second decryption instructions of triggering. When detecting the second decryption instructions triggered based on the encryption information in encryption information set, parsing module 60 obtains the movement The secret key Key associated with the encryption information prestored in terminal, and remove BMP of secret key Key, log file suffix name and text After the file header of part size, the corresponding security coding information of secret key Key is obtained.
Second modular converter 70, for security coding information to be converted into according to default second matrix conversion condition Secret key matrix information, and determine cipher key matrix number in secret key matrix information;
Security coding information is converted into secret key matrix information according to default second matrix conversion condition, for example, second Security coding information is filled into modular converter 70 the n binary system of 64 × 64bit respectively in units of the data volume of 4096bit Matrix K ey1~Keyn, binary matrix Key1~KeynComposition secret key matrix information, the size of the n is by security coding information Actual size determine.For example, the file size recorded in security coding information is 128.3KB, and preceding 128KB security codings are believed Breath has been processed in being circulated at 256 times, and remaining 0.3KB also needs to a circulation and processed, so, n=256+1= 257。
3rd computing module 80, for parsing finger print information, generates fingerprint matrices, and calculate the MD5 of fingerprint matrices Value;
Second generation module 90, for the fingerprint matrices according to MD5 value scrambles, generation scrambled matrix number with it is close The scrambled matrix information of key matrix number matching;
3rd computing module 80 parses finger print information, generation fingerprint matrices, and calculates the MD5 values of fingerprint matrices, for example, When collecting the finger print information, the finger print information of user is read by fingerprint reader, produce a binary system square of 64 × 64bit Battle array Z, calculates the MD5 values of Z, and MD5 values are the character string of 128.When the MD5 values of fingerprint matrices are calculated, the second generation module 90 with the MD5 disorder methods of fingerprint matrices by fingerprint matrices scramble, and by chain algorithm conversion generation scrambled matrix number with it is close The scrambled matrix information of key matrix number matching, the scrambled matrix information of such as generation includes K1~KnN scrambled matrix altogether.
The deciphering module 100, for according to scrambled matrix information and secret key matrix information generation coding information, with right Encryption information is decrypted.
Deciphering module 100 generates coding information according to the scrambled matrix information and the secret key matrix information, with to encryption Information is decrypted.I.e. according to the n scrambled matrix K1~KiAnd secret key matrix information Key1~KeyiDetermine the encryption information Coding information, i.e., according to the n scrambled matrix K1~KiAnd secret key matrix information Key1~KeyiDetermine the encryption information Binary sequence B, the generation formula of the coding information is as follows:
Wherein, the KeyiIt is i-th secret key matrix, the K in the secret key matrix information1It is i-th encryption in the scrambled matrix Matrix, the i=1,2,3 ... n, n is positive integer.
When coding information (the binary sequence B) is obtained, the coding information (binary sequence B) is write into movement end The disk at end, you can obtain original document, so as to realize being decrypted the encryption information.
The present embodiment is by the way that when mobile terminal receives the first decryption instructions that user triggers, the fingerprint for gathering user is believed Breath, the encryption information set that display is associated with finger print information, when mobile terminal receives the second decryption instructions of user's triggering, The encryption information in encryption information set is decrypted according to finger print information, enabling the finger print information based on user is direct The encryption information stored in decrypting mobile terminal, so that decrypting process is convenient and swift, safe and reliable.
Further, based on above-mentioned first embodiment, the fourth embodiment of information protection device of the present invention is proposed, in this reality Apply in example, reference picture 6, described information protection device also includes:Output module 200, the 4th computing module 300, judge module 400 And preserving module 500.
The output module 200, for when fingerprint preservation instruction is detected, calculating the first knowledge of the finger print information of collection Not other rate, and export the prompt message for being input into previous finger print information again;
4th computing module 300, for when previous finger print information input instruction is detected, gathering what is be input into again Previous finger print information, and calculate the second discrimination of the previous finger print information being input into again;
The judge module 400, for judging the first discrimination and the second discrimination whether more than default discrimination;
The preserving module 500, for when the first discrimination and the second discrimination are more than the default discrimination, preserving The finger print information.
In the present embodiment, firstly, it is necessary to carry out the fingerprint collecting of user.Fingerprint capturer is arranged at and is easy to contact user At the position of finger print information, such as Home key, mobile phone back, mobile phone frame position, mainly for gathering the fingerprint letter of contact person Breath.User is finger print or the collection that fingerprint is carried out by way of long of rubbing.Because mobile terminal is to each hand of user Refer to that the discrimination of fingerprint is different, in order to improve the accuracy of fingerprint recognition, the fingerprint of multiple fingers can be gathered, pick out identification The fingerprint of rate highest finger, for subsequent calls., it is necessary to the identification for carrying out user fingerprints is distinguished after user fingerprints have been gathered Recognize.Output module 200 can show the finger print information of correlation after fingerprint has been gathered, and calculate the first discrimination of finger print information, Now, the 4th computing module 300 exports the prompt message for being input into previous finger print information again, and user can select corresponding fingerprint Information is recognized.During user is recognized, the second discrimination of the finger print information that calculating is input into again, Judge module 400 judges that whether the first discrimination and being more than for the second discrimination preset discrimination, when the first discrimination and second Discrimination more than default discrimination when, preserving module 500 preserve the finger print information.User for acquiring multiple fingerprints can To select discrimination highest fingerprint to carry out encryption and decryption.And the fingerprint not high for discrimination, user can re-start fingerprint Collection.For example, when mobile terminal collects the index fingerprint of user, the first discrimination for calculating the index fingerprint is 80%, now, mobile terminal output is input into the prompt message of index fingerprint again, and index fingerprint is input into again when user is detected When after information, it is 90% to calculate the second discrimination of the index fingerprint information being input into again, due to first discrimination and Second discrimination is both greater than default discrimination (if default discrimination is 60%), therefore preserves the index fingerprint information, and right In discrimination fingerprint not high, user can re-start fingerprint collecting, for example, work as detecting user input index fingerprint information When afterwards, it is 50% to calculate first discrimination (or second discrimination) of the index fingerprint information of input, due to first knowledge Rate (or second discrimination) is not less than default discrimination (if default discrimination is 60%), and now, mobile terminal can be pointed out User is input into index fingerprint information again, or mobile terminal can also point out user to abandon the guarantor to the index fingerprint information Deposit, and point out user to select to preserve the finger print information of other fingers.
The present embodiment exports the prompting letter of input finger print information again by calculating the first discrimination of finger print information Breath, when the finger print information input instruction of user's triggering is detected, the finger print information that collection user is input into again, and calculate again Second discrimination of the finger print information of input, judges that whether the first discrimination and being more than for the second discrimination preset discrimination, when First discrimination and the second discrimination more than default discrimination when, preserve finger print information, improve the accuracy of fingerprint recognition, Ensure the Stability and veracity of later stage encryption and decryption.
Present invention further propose that information protecting method each embodiment.
Reference picture 7, Fig. 7 is the schematic flow sheet of the first embodiment of information protecting method of the present invention.
Step S10, when the first encrypted instruction for treating encryption information triggering is detected, confidential information to be added is converted into compile Code information, is converted into document matrix information, and determine document matrix by coding information according to default first matrix conversion condition Document matrix number in information;
In the present embodiment, user is wanted when to this, certain information to be encrypted is encrypted, and the sustainable pressing of user should To be encrypted information 5-10 seconds, triggers the first encrypted instruction.When mobile terminal receives user triggers to the encryption information During one encrypted instruction, gather the finger print information of user, and confidential information to be added be converted into coding information, by the confidential information to be added with Binary system reads, and obtains binary sequence B, and such as binary sequence B " 10010111 " is that the coding information can be understood as two and enter Sequence B processed, document matrix information is converted into by coding information according to default first matrix conversion condition, will binary sequence B inserts the n binary matrix Part of 64 × 64bit line by line respectively in units of 4096bit1~PartnIn, obtain file square Battle array informationThe size of n is determined by the actual size of file to be encrypted, for example, file is 128.3KB, because The size of data of each circular treatment is 4096bit, and 128KB files have been processed in being circulated at 256 times before institute, and remaining 0.3KB also need to a circulation and processed, therefore, n=256+1=257.
Step S20, the current finger print information for collecting of parsing, generates fingerprint matrices, and calculate the MD5 values of fingerprint matrices;
The current finger print information for collecting of parsing, generates fingerprint matrices, and calculates the MD5 values of fingerprint matrices, for example, adopting When collecting the finger print information, the finger print information of user is read by fingerprint reader, produce a binary matrix of 64 × 64bit Z, calculates the MD5 values of Z, and MD5 values are the character string of 128.
Step S30, according to MD5 value scramble fingerprint matrices, what generation scrambled matrix number was matched with document matrix number adds Close matrix information;
Step S40, according to scrambled matrix information and document matrix information generation secret key, and according to secret key pair secret letter to be added Breath is encrypted, and obtains encryption information, by encryption information storage in the encryption information set associated with finger print information.
When the MD5 values of fingerprint matrices are calculated, with the MD5 disorder methods of fingerprint matrices by fingerprint matrices scramble, and by The scrambled matrix information that chain algorithm conversion generation scrambled matrix number is matched with document matrix number, such as scrambled matrix of generation Information includes K1~KnN scrambled matrix altogether.According to scrambled matrix information and document matrix information generation secret key Key, and It is encrypted according to secret key pair confidential information to be added, obtains encryption information, and encryption information storage is being associated with finger print information In encryption information set.
It should be noted that mobile terminal can create different encryption information set, the encryption to different finger print informations Comprising all encryption information created based on the finger print information in information aggregate, for example, mobile terminal is created to finger print information A adding Confidential information set A, comprising all encryption information created based on finger print information A in encryption information set A, is created to finger print information B Encryption information set B is built, is believed comprising all encryption information created based on finger print information B, and the encryption in encryption information set B Breath set is hiding, and the encryption information that the encryption information set is included is stored classifiedly, can be according to the category of encryption information Property classification or classified according to the encryption times of encryption information, for example, by attribute for the encryption information of picture is stored in text In part folder A, and by attribute for the encryption information of application program is stored in file B.
The present embodiment by mobile terminal receive user treat encryption information trigger the first encrypted instruction when, according to Confidential information generation document matrix information to be added, and the finger print information of user is gathered, scrambled matrix information is generated according to finger print information, And document matrix information is generated according to confidential information to be added, according to scrambled matrix information and document matrix information generation secret key, and It is encrypted according to secret key pair confidential information to be added, obtains encryption information, and encryption information storage is being associated with finger print information In encryption information set, enabling the finger print information based on user is directly treated encryption information and is encrypted, so that the side of realization Just the confidential information to be added for efficiently being stored in protection mobile terminal.
Further, Fig. 8 is referred to, is the schematic flow sheet of the refinement step of step S40 in first embodiment of the invention, This includes according to scrambled matrix information and document matrix information generation secret key:
Step S41, according to scrambled matrix information and document matrix information generation security coding information;
Step S42, secret key is generated according to security coding information, wherein, the generation formula of the security coding information is:
Wherein, the Key' is security coding information, the KiIt is i-th scrambled matrix in scrambled matrix information, it is described PartiIt is i-th document matrix in the document matrix information, the i=1,2,3 ... n, n is positive integer.
According to scrambled matrix information and document matrix information D generation security coding information Key', in security coding information Plus BMP, the original document length of the original document suffix name of confidential information to be added and confidential information to be added on the file header of Key', The secret key Key for being needed, so as to realize according to scrambled matrix information and document matrix information generation secret key Key.
The present embodiment generates security coding information by according to scrambled matrix information and document matrix information, according to secret key Coding information generates secret key so that treat the encrypting step simple and fast of encryption information, improves Consumer's Experience.
Further, based on above-mentioned first embodiment, Fig. 9 is referred to, is the of information protecting method proposed by the present invention The schematic flow sheet of two embodiments, in this second embodiment, after S40, the information protecting method includes:
Step S50, when the first decryption instructions are detected, the finger print information of the current collection of identification shows and finger print information The encryption information set of association;
In the present embodiment, when first class paper information corresponding by the encryption information with the head of a household, triggering first is decrypted Instruction, the first class paper information can be understood as the general act information corresponding to the encryption information, for example, working as the encryption information During for pictorial information, the first class paper information of the pictorial information is photograph album (or mutually thin), after user opens the photograph album, and During the project column of family Continued depression photograph album 5-10 seconds, the first decryption instructions are triggered;When the encryption information is application program, should The first class paper information of application program is desktop, and when user's Continued depression desktop blank space 5-10 second, triggering first was decrypted and referred to Order.When mobile terminal receives the first decryption instructions of user's triggering, the finger print information of user is gathered.Display and fingerprint letter The encryption information set of association is ceased, the encryption information set can be understood as the second level file below the first class paper information Information, one or more encryption information is included in the second level fileinfo, for example, when the first class paper information is phase Volume, the second level fileinfo is the fileinfo being hidden in the photograph album, in the fileinfo being hidden comprising one or The multiple encryption pictures of person, such as after user opens the photograph album, and during project column 5-10 second of the family Continued depression photograph album, show this The multiple encryption pictures being hidden in photograph album;When first fileinfo is desktop, the second level fileinfo is on the desktop Comprising one or more encryption application program in the fileinfo being hidden, the fileinfo being hidden, such as user continues Pressing desktop blank space 5-10 seconds, shows the multiple encryption application programs being hidden on the desktop.
If it is understood that in the mobile terminal, what the encryption information was associated is the finger print information of user's forefinger, then The mobile terminal only detect user input be the finger print information of forefinger when, place can be just decrypted to the encryption information Reason.Different finger print informations associates different encryption information set, for example, the finger print information of different user associates different encryptions Information aggregate, and the different finger print informations of same user associate different encryption information set.
Step S60, when the second decryption instructions triggered based on the encryption information in encryption information set are detected, is obtained The secret key associated with encryption information stored in mobile terminal is taken, and parses secret key and obtain corresponding security coding information;
When mobile terminal shows the encryption information set associated with the finger print information, the user can be from the encryption information collection The encryption information that decryption is wanted in selection is closed, when user's Continued depression encryption information 5-10 second, the second decryption instructions of triggering. When detecting the second decryption instructions triggered based on the encryption information in encryption information set, obtain and prestore in the mobile terminal The secret key Key associated with the encryption information, and remove BMP of secret key Key, the text of log file suffix name and file size After part head, the corresponding security coding information of secret key Key is obtained.
Step S70, secret key matrix information is converted into by security coding information according to default second matrix conversion condition, and Determine cipher key matrix number in secret key matrix information;
Security coding information is converted into secret key matrix information according to default second matrix conversion condition, for example, will be close Spoon coding information is filled into the n binary matrix Key of 64 × 64bit respectively in units of the data volume of 4096bit1~Keyn, Binary matrix Key1~KeynComposition secret key matrix information, the size of the n is determined by the actual size of security coding information. For example, the file size recorded in security coding information is 128.3KB, and preceding 128KB security codings information can be followed at 256 times Processed in ring, and remaining 0.3KB also needs to a circulation and is processed, so, n=256+1=257.
Step S80, parses finger print information, generates fingerprint matrices, and calculate the MD5 values of fingerprint matrices;
Step S90, the fingerprint matrices according to MD5 value scrambles, generation scrambled matrix number is matched with cipher key matrix number Scrambled matrix information;
Parsing finger print information, generates fingerprint matrices, and calculates the MD5 values of fingerprint matrices, for example, collecting fingerprint letter During breath, the finger print information of user is read by fingerprint reader, produce a binary matrix Z of 64 × 64bit, calculate the MD5 of Z Value, MD5 values are the character string of 128.When the MD5 values of fingerprint matrices are calculated, will be referred to the MD5 disorder methods of fingerprint matrices Line matrix scrambling, and the scrambled matrix information matched with cipher key matrix number by chain algorithm conversion generation scrambled matrix number, Scrambled matrix information such as generation includes K1~KnN scrambled matrix altogether.
Step S100, according to scrambled matrix information and secret key matrix information generation coding information, enters with to encryption information Row decryption.
According to the scrambled matrix information and secret key matrix information generation coding information, solved with to encryption information It is close.I.e. according to the n scrambled matrix K1~KiAnd secret key matrix information Key1~KeyiDetermine the coding letter of the encryption information Breath, i.e., according to the n scrambled matrix K1~KiAnd secret key matrix information Key1~KeyiDetermine the binary system sequence of the encryption information Row B, the generation formula of the coding information is as follows:
Wherein, the KeyiIt is i-th secret key matrix, the K in the secret key matrix information1It is i-th encryption in the scrambled matrix Matrix, the i=1,2,3 ... n, n is positive integer.
When coding information (the binary sequence B) is obtained, the coding information (binary sequence B) is write into movement end The disk at end, you can obtain original document, so as to realize being decrypted the encryption information.
The present embodiment is by the way that when mobile terminal receives the first decryption instructions that user triggers, the fingerprint for gathering user is believed Breath, the encryption information set that display is associated with finger print information, when mobile terminal receives the second decryption instructions of user's triggering, The encryption information in encryption information set is decrypted according to finger print information, enabling the finger print information based on user is direct The encryption information stored in decrypting mobile terminal, so that decrypting process is convenient and swift, safe and reliable.
Further, based on any of the above-described embodiment, Figure 10 is referred to, is the of information protecting method proposed by the present invention The schematic flow sheet of three embodiments, in the 3rd embodiment, before S10, the information protecting method includes:
Step S200, when fingerprint preservation instruction is detected, calculates the first discrimination of the finger print information of collection, and export The prompt message of previous finger print information is input into again;
Step S300, when previous finger print information input instruction is detected, the previous finger print information that collection is input into again, and Second discrimination of the previous finger print information that calculating is input into again;
Whether step S400, judge the first discrimination and the second discrimination more than default discrimination;
Step S500, when the first discrimination and the second discrimination are more than the default discrimination, preserves the fingerprint letter Breath.
In the present embodiment, firstly, it is necessary to carry out the fingerprint collecting of user.Fingerprint capturer is arranged at and is easy to contact user At the position of finger print information, such as Home key, mobile phone back, mobile phone frame position, mainly for gathering the fingerprint letter of contact person Breath.User is finger print or the collection that fingerprint is carried out by way of long of rubbing.Because mobile terminal is to each hand of user Refer to that the discrimination of fingerprint is different, in order to improve the accuracy of fingerprint recognition, the fingerprint of multiple fingers can be gathered, pick out identification The fingerprint of rate highest finger, for subsequent calls., it is necessary to the identification for carrying out user fingerprints is distinguished after user fingerprints have been gathered Recognize.The method can show the finger print information of correlation after fingerprint has been gathered, and calculate the first discrimination of finger print information, now, And the prompt message for being input into previous finger print information again is exported, user can select corresponding finger print information to be recognized. During user is recognized, the second discrimination of finger print information that calculating is input into again, judge the first discrimination and Second discrimination whether more than default discrimination, when the first discrimination and the second discrimination are more than default discrimination, guarantor Deposit the finger print information.User for acquiring multiple fingerprints can select the discrimination highest fingerprint to carry out encryption and decryption.And it is right In discrimination fingerprint not high, user can re-start the collection of fingerprint.For example, the forefinger that mobile terminal collects user refers to During line, it is 80% to calculate the first discrimination of the index fingerprint, and now, mobile terminal output is input into carrying for index fingerprint again Show information, when detecting user and being input into again after index fingerprint information, calculate the of the index fingerprint information being input into again Two discriminations are 90%, because first discrimination and second discrimination are both greater than default discrimination (such as default discrimination For 60%), therefore the index fingerprint information is preserved, and the fingerprint not high for discrimination, user can re-start fingerprint and adopt Collection, for example, when detecting after user input index fingerprint information, calculating the first discrimination of the index fingerprint information of input (or second discrimination) is 50%, because first discrimination (or second discrimination) is less than default discrimination (as preset Discrimination is that 60%), now, mobile terminal can point out user to be input into index fingerprint information again, or mobile terminal also may be used To point out user to abandon the preservation to the index fingerprint information, and user is pointed out to select to preserve the finger print information of other fingers.
The present embodiment exports the prompting letter of input finger print information again by calculating the first discrimination of finger print information Breath, when the finger print information input instruction of user's triggering is detected, the finger print information that collection user is input into again, and calculate again Second discrimination of the finger print information of input, judges that whether the first discrimination and being more than for the second discrimination preset discrimination, when First discrimination and the second discrimination more than default discrimination when, preserve finger print information, improve the accuracy of fingerprint recognition, Ensure the Stability and veracity of later stage encryption and decryption.
It should be noted that herein, term " including ", "comprising" or its any other variant be intended to non-row His property is included, so that process, method, article or device including a series of key elements not only include those key elements, and And also include other key elements being not expressly set out, or also include for this process, method, article or device institute are intrinsic Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this Also there is other identical element in the process of key element, method, article or device.
The embodiments of the present invention are for illustration only, and the quality of embodiment is not represented.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably implementation method.Based on such understanding, technical scheme is substantially done to prior art in other words The part for going out contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions are used to so that a station terminal equipment (can be mobile phone, computer, clothes Business device, air-conditioner, or network equipment etc.) perform method described in each embodiment of the invention.
The preferred embodiments of the present invention are these are only, the scope of the claims of the invention is not thereby limited, it is every to utilize this hair Equivalent structure or equivalent flow conversion that bright specification and accompanying drawing content are made, or directly or indirectly it is used in other related skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of information protection device, it is characterised in that described information protection device includes:
First modular converter, for when the first encrypted instruction for treating encryption information triggering is detected, confidential information to be added being turned Change coding information into, coding information is converted into document matrix information according to default first matrix conversion condition, and determine text Document matrix number in part matrix information;
First computing module, for parsing the current finger print information for collecting, generates fingerprint matrices, and calculate fingerprint matrices MD5 values;
First generation module, for according to MD5 value scramble fingerprint matrices, generation scrambled matrix number to be matched with document matrix number Scrambled matrix information;
Encrypting module for generating secret key and to be encrypted according to secret key pair according to scrambled matrix information and document matrix information Information is encrypted, and obtains encryption information, by encryption information storage in the encryption information set associated with finger print information.
2. information protection device as claimed in claim 1, it is characterised in that the encrypting module includes:
First generation unit, for according to scrambled matrix information and document matrix information generation security coding information;
Second generation unit, for generating secret key according to security coding information, wherein, the generation formula of the security coding information For:
Key ′ = Σ i = 1 n ( Part i ⊕ K i )
Wherein, the Key' is security coding information, the KiIt is i-th scrambled matrix in scrambled matrix information, the Parti It is i-th document matrix in the document matrix information, the i=1,2,3 ... n, n is positive integer.
3. information protection device as claimed in claim 2, it is characterised in that described information protection device also includes:
Display module, for when the first decryption instructions are detected, the finger print information of the current collection of identification to show and finger print information The encryption information set of association;
Parsing module, for when the second decryption instructions triggered based on the encryption information in encryption information set are detected, The secret key associated with encryption information stored in mobile terminal is obtained, and parses secret key and obtain corresponding security coding information;
Second modular converter, believes for security coding information to be converted into secret key matrix according to default second matrix conversion condition Breath, and determine cipher key matrix number in secret key matrix information;
3rd computing module, for parsing finger print information, generates fingerprint matrices, and calculate the MD5 values of fingerprint matrices;
Second generation module, for the fingerprint matrices according to MD5 value scrambles, generates scrambled matrix number and cipher key matrix number The scrambled matrix information of matching;
Deciphering module, for according to scrambled matrix information and secret key matrix information generation coding information, entering with to encryption information Row decryption.
4. information protection device as claimed in claim 3, it is characterised in that the generation formula of the coding information is:
B = Σ i = 1 n ( Key i ⊕ K i )
Wherein, the B is coding information, the KiIt is i-th scrambled matrix in scrambled matrix information, the KeyiIt is secret key square I-th secret key matrix in battle array information, the i=1,2,3 ... n, n is positive integer.
5. the information protection device as described in claim any one of 1-4, it is characterised in that described information protection device is also wrapped Include:
Output module, for when fingerprint preservation instruction is detected, calculating the first discrimination of the finger print information of collection, and export The prompt message of previous finger print information is input into again;
4th computing module, for the previous fingerprint letter that when previous finger print information input instruction is detected, collection is input into again Breath, and calculate the second discrimination of the previous finger print information being input into again;
Judge module, for judging the first discrimination and the second discrimination whether more than default discrimination;
Preserving module, for when the first discrimination and the second discrimination are more than the default discrimination, preserving the fingerprint letter Breath.
6. a kind of information protecting method, it is characterised in that described information guard method includes step:
When the first encrypted instruction for treating encryption information triggering is detected, confidential information to be added is converted into coding information, will compiled Code information is converted into document matrix information according to default first matrix conversion condition, and determines file square in document matrix information Battle array number;
The current finger print information for collecting of parsing, generates fingerprint matrices, and calculate the MD5 values of fingerprint matrices;
According to MD5 value scramble fingerprint matrices, the scrambled matrix information that generation scrambled matrix number is matched with document matrix number;
According to scrambled matrix information and document matrix information generation secret key, and it is encrypted according to secret key pair confidential information to be added, Encryption information is obtained, by encryption information storage in the encryption information set associated with finger print information.
7. information protecting method as claimed in claim 6, it is characterised in that described according to scrambled matrix information and file square The step of battle array information generation secret key, includes:
According to scrambled matrix information and document matrix information generation security coding information;
Secret key is generated according to security coding information, wherein, the generation formula of the security coding information is:
Key ′ = Σ i = 1 n ( Part i ⊕ K i )
Wherein, the Key' is security coding information, the KiIt is i-th scrambled matrix in scrambled matrix information, the Parti It is i-th document matrix in the document matrix information, the i=1,2,3 ... n, n is positive integer.
8. information protecting method as claimed in claim 7, it is characterised in that institute is according to scrambled matrix information and document matrix Information generates secret key, and is encrypted according to secret key pair confidential information to be added, obtains encryption information, by encryption information storage with finger Step in the encryption information set of line information association also includes:
When the first decryption instructions are detected, the finger print information of the current collection of identification, the encryption letter that display is associated with finger print information Breath set;
When the second decryption instructions triggered based on the encryption information in encryption information set are detected, in obtaining mobile terminal The secret key associated with encryption information of storage, and parse secret key and obtain corresponding security coding information;
Security coding information is converted into secret key matrix information according to default second matrix conversion condition, and determines secret key matrix Cipher key matrix number in information;
Parsing finger print information, generates fingerprint matrices, and calculate the MD5 values of fingerprint matrices;
The fingerprint matrices according to MD5 value scrambles, the scrambled matrix letter that generation scrambled matrix number is matched with cipher key matrix number Breath;
According to scrambled matrix information and secret key matrix information generation coding information, it is decrypted with to encryption information.
9. information protecting method as claimed in claim 8, it is characterised in that the generation formula of the coding information is:
B = Σ i = 1 n ( Key i ⊕ K i )
Wherein, the B is coding information, the KiIt is i-th scrambled matrix in scrambled matrix information, the KeyiIt is secret key square I-th secret key matrix in battle array information, the i=1,2,3 ... n, n is positive integer.
10. the information protecting method as described in claim any one of 6-9, it is characterised in that described to detect to letter to be encrypted When ceasing the first encrypted instruction of triggering, confidential information to be added is converted into coding information, by coding information according to default first square Battle array switch condition is converted into document matrix information, and the step of determine document matrix number in document matrix information before also wrap Include:
Detect fingerprint preserve instruction when, calculate collection finger print information the first discrimination, and export be input into again it is previous The prompt message of finger print information;
When previous finger print information input instruction is detected, the previous finger print information being input into again is gathered, and calculating is input into again Previous finger print information the second discrimination;
Judge the first discrimination and the second discrimination whether more than default discrimination;
When the first discrimination and the second discrimination are more than the default discrimination, the finger print information is preserved.
CN201611064352.9A 2016-11-25 2016-11-25 Information protecting method and device Pending CN106778294A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611064352.9A CN106778294A (en) 2016-11-25 2016-11-25 Information protecting method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611064352.9A CN106778294A (en) 2016-11-25 2016-11-25 Information protecting method and device

Publications (1)

Publication Number Publication Date
CN106778294A true CN106778294A (en) 2017-05-31

Family

ID=58901846

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611064352.9A Pending CN106778294A (en) 2016-11-25 2016-11-25 Information protecting method and device

Country Status (1)

Country Link
CN (1) CN106778294A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109766703A (en) * 2017-11-09 2019-05-17 北京京东尚科信息技术有限公司 Information processing system, method and apparatus
CN110378139A (en) * 2019-07-25 2019-10-25 江苏芯盛智能科技有限公司 A kind of data key guard method, system and electronic equipment and storage medium
CN111310513A (en) * 2018-12-11 2020-06-19 上海耕岩智能科技有限公司 Biological feature recognition structure, system and method under coding mask type screen
CN113055184A (en) * 2021-03-22 2021-06-29 中国工商银行股份有限公司 Data encryption and decryption method and device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103236930A (en) * 2013-04-27 2013-08-07 深圳市中兴移动通信有限公司 Data encryption method and system
US20150089665A1 (en) * 2013-09-24 2015-03-26 Kyocera Document Solutions Inc. Document Management Server That Reduces Information Leakage of Non-Public Document Information

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103236930A (en) * 2013-04-27 2013-08-07 深圳市中兴移动通信有限公司 Data encryption method and system
US20150089665A1 (en) * 2013-09-24 2015-03-26 Kyocera Document Solutions Inc. Document Management Server That Reduces Information Leakage of Non-Public Document Information

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
林文峰等: "基于指纹的数字信息加密算法", 《计算机工程》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109766703A (en) * 2017-11-09 2019-05-17 北京京东尚科信息技术有限公司 Information processing system, method and apparatus
CN109766703B (en) * 2017-11-09 2021-01-26 西安京迅递供应链科技有限公司 Information processing system, method and device
CN111310513A (en) * 2018-12-11 2020-06-19 上海耕岩智能科技有限公司 Biological feature recognition structure, system and method under coding mask type screen
CN110378139A (en) * 2019-07-25 2019-10-25 江苏芯盛智能科技有限公司 A kind of data key guard method, system and electronic equipment and storage medium
CN113055184A (en) * 2021-03-22 2021-06-29 中国工商银行股份有限公司 Data encryption and decryption method and device
CN113055184B (en) * 2021-03-22 2022-11-29 中国工商银行股份有限公司 Data encryption and decryption method and device

Similar Documents

Publication Publication Date Title
CN104732133B (en) Electronic contract signs method and system
CN105160264B (en) Photo encryption device and method
CN105099669B (en) Recording encipher-decipher method and device
CN106778294A (en) Information protecting method and device
CN105893866A (en) Screen capture method and device
CN106817377A (en) A kind of data encryption device, decryption device and method
CN105681326A (en) Multilink data transmission device and method
CN106657606A (en) Photograph processing method, device and terminal
CN105099701B (en) A kind of method of terminal and terminal authentication
CN106453056A (en) Mobile terminal and method for safely sharing picture
CN104915606A (en) File encryption and decryption methods and devices
CN106453652A (en) Log file uploading method and system
CN104732162A (en) File encryption processing method and device
CN106570365A (en) Application management device, mobile terminal and method
CN106899418A (en) Information acquisition device and method
CN106856541A (en) A kind of terminal and method for secret protection
CN105578459A (en) Data encryption apparatus and data encryption method under cellular network
CN105117627A (en) Method and device for hiding information
CN105101187A (en) Method and system for processing encrypted information
CN106919840A (en) The detection method and device of a kind of Malware
CN105095705B (en) A kind of information processing method and device
CN106548081A (en) A kind of end message display packing and device
CN104980436B (en) A kind of encryption transmission system, method, terminal and intermediate server
CN106507343A (en) A kind of information processing method, mobile terminal and server
CN106604271A (en) Mobile terminal and message check method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170531